HFL reduces the size of the required fuzzy knowledge base system of the HFL data classification. This paper demonstrates the use of a HFL to improve data classification. This paper considers the application of a hierarchical fuzzy logic (HFL) classification method for categorizing organisational data based on governmental and business data policies. The method employed is based on Mohammadian et al. Fuzzy logic based categorisation is explored in this paper. Organisational data needs to be evaluated. Classifying data provides organizations the facilities to categorise organisational data based on organisational policies. the required data security levels based on various government and business policies. One novel method used to achieve data security is to use fuzzy logic based data classification to determine. Therefore data security and privacy is a significant activity for large organizations. Organizations need to protect their data in the areas of data security and privacy. The Octave Fuzzy Logic Toolkit is available as a free, open-source package on both Octave-Forge and Sourceforge and is shared under the GNU General Public License (GPLv3+).ĭata security and privacy plays a key role in carrying out day to day and long term business operations successfully. The fuzzy-logic-based design was chosen over competing algorithms, such as support vector machines, in order to make the behavior of the intelligent modules as transparent as possible to human security administrators. Both of these systems use fuzzy -logic-based algorithms to cluster unlabeled data and automatically generate a fuzzy inference system. ![]() The Octave Fuzzy Logic Toolkit was developed as the basis for implementing the smart modules of the SELinuxSentry and SmartSentry. A preliminary version of the SmartSentry was shown to resist hostile enumeration. The two prototypes provide platforms at two levels in a layered security strategy on which to test the effectiveness of leveraging existing system messages to create smart, lightweight, non-signature based defenses. The SELinuxSentry and SmartSentry, two proof-of-concept prototypes, were designed and partially implemented. This thesis builds toward a defensive system designed to prevent many such attacks in real time on nearly any host running Linux. Many zero-day and polymorphic cyberattacks effectively evade signature-based defenses.
0 Comments
Leave a Reply. |