Reference Hub3
A Proposal for Information Systems Security Monitoring Based on Large Datasets

A Proposal for Information Systems Security Monitoring Based on Large Datasets

Hai Van Pham, Philip Moore
Copyright: © 2018 |Volume: 9 |Issue: 2 |Pages: 11
ISSN: 1947-3532|EISSN: 1947-3540|EISBN13: 9781522545330|DOI: 10.4018/IJDST.2018040102
Cite Article Cite Article

MLA

Van Pham, Hai, and Philip Moore. "A Proposal for Information Systems Security Monitoring Based on Large Datasets." IJDST vol.9, no.2 2018: pp.16-26. http://doi.org/10.4018/IJDST.2018040102

APA

Van Pham, H. & Moore, P. (2018). A Proposal for Information Systems Security Monitoring Based on Large Datasets. International Journal of Distributed Systems and Technologies (IJDST), 9(2), 16-26. http://doi.org/10.4018/IJDST.2018040102

Chicago

Van Pham, Hai, and Philip Moore. "A Proposal for Information Systems Security Monitoring Based on Large Datasets," International Journal of Distributed Systems and Technologies (IJDST) 9, no.2: 16-26. http://doi.org/10.4018/IJDST.2018040102

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

This article describes how the objective of recent advances in soft computing and machine learning models is the resolution of issues related to security monitoring for information systems. Most current techniques and models face significant limitations, in the monitoring of information systems. To address these limitations, the authors propose a new model designed to detect potential security breaches at an early stage using logging data. The proposed model uses unsupervised training techniques with a rule-based system to analyse data file logs. The proposed approach has been evaluated using a case study based on the learning of data file logs to determine the effectiveness of the proposed approach. Experimental results show that the proposed approach performs well, the results demonstrate that the proposed approach performs better than other conventional security methods in the identification of the correct decisions related to potential security in information systems.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.