Fuzzy Rules Based Solution for System Administration Security Management via a Blockchain

作者: Arnaud Castelltort , Antoine Chabert , Nicolas Hersog , Anne Laurent , Michel Sala

DOI: 10.1007/978-3-030-23813-1_9

关键词: Private networkContext (language use)Computer securityOrder (exchange)Fuzzy logicBlockchainSystem administrationComputer scienceDigital transformationSecurity management

摘要: Digital transformation has led to the fact that almost all organizations and companies are provided with internal private networks manage sensitive data applications. In this context, system administrators superusers who can access material. As it is known many frauds caused by actions, we argue important be strong automated logging systems even for superusers. For purpose, blockchains an efficient solution as they cannot overwritten administrators. However, not store introduce in paper a novel based on fuzzy rules order efficiently blockchain.

参考文章(11)
S. Al Amro, F. Chiclana, D. A. Elizondo, Application of Fuzzy Logic in Computer Security and Forensics Computational Intelligence for Privacy and Security. pp. 35- 49 ,(2012) , 10.1007/978-3-642-25237-2_4
Hong Xu, Rong Tang, Study and improvements for the real-time performance of Linux kernel biomedical engineering and informatics. ,vol. 7, pp. 2766- 2769 ,(2010) , 10.1109/BMEI.2010.5639840
L. Spitzner, Honeypots: catching the insider threat annual computer security applications conference. pp. 170- 179 ,(2003) , 10.1109/CSAC.2003.1254322
Kuo Zhao, Qiang Li, Jian Kang, Dapeng Jiang, Liang Hu, Design and Implementation of Secure Auditing System in Linux Kernel international conference on anti-counterfeiting, security, and identification. pp. 232- 236 ,(2007) , 10.1109/IWASID.2007.373733
Salvatore J. Stolfo, Malek Ben Salem, Angelos D. Keromytis, Fog Computing: Mitigating Insider Data Theft Attacks in the Cloud ieee symposium on security and privacy. pp. 125- 128 ,(2012) , 10.1109/SPW.2012.19
R. E. Bellman, L. A. Zadeh, Decision-making in a fuzzy environment ,(1970)
Sultan Alneyadi, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy, A survey on data leakage prevention systems Journal of Network and Computer Applications. ,vol. 62, pp. 137- 152 ,(2016) , 10.1016/J.JNCA.2016.01.008
Yosuke Kaga, Masakazu Fujio, Ken Naganuma, Kenta Takahashi, Takao Murakami, Tetsushi Ohki, Masakatsu Nishigaki, A Secure and Practical Signature Scheme for Blockchain Based on Biometrics international conference on information security. pp. 877- 891 ,(2017) , 10.1007/978-3-319-72359-4_55
Tshilidzi Marwala, Bo Xing, Blockchain and Artificial Intelligence. arXiv: Artificial Intelligence. ,(2018)