Metrika članka

  • citati u SCindeksu: 0
  • citati u CrossRef-u:[5]
  • citati u Google Scholaru:[=>]
  • posete u poslednjih 30 dana:5
  • preuzimanja u poslednjih 30 dana:3
članak: 1 od 1  
Telfor Journal
2016, vol. 8, br. 1, str. 14-19
jezik rada: engleski
vrsta rada: neklasifikovan
objavljeno: 30/12/2016
doi: 10.5937/telfor1601014C
Improving security incidents detection for networked multilevel intelligent control systems in railway transport
(naslov ne postoji na srpskom)
Information Technologies of Controlling Faculty of Rostov State Transport University, Rostov-na-Donu, Russia



Russian Foundation for Basic Research (projects 15-01-3067-a)
Russian Foundation for Basic Research (projects 15-01-4995-a)
Russian Foundation for Basic Research (projects 16-07-00888-a)
Russian Foundation for Basic Research (projects 16-01-00597-a)


(ne postoji na srpskom)
Security monitoring and incident management systems have become the main research focus in the area of intelligent railway control systems. In this work, we discuss a system architecture of multilevel intelligent control system in Russian Railway transport and security incident classification and the handling of the process. We make a detailed explanation of problems and tasks of security information and event management system as an important part of a multilevel intelligent control system. We use a rough sets theory to detect an abnormal activity in the considered system. Our main result consists in the development of simple and fast detection techniques that are based on rough sets theory and allow investigating a new type of incidents.

Ključne reči

intelligent transport systems; railway control systems; rough set theory; security information and event management


Chernov, A.V., Butakova, M.A., Karpenko, E.V. (2015) Security incident detection technique for multilevel intelligent control systems on railway transport in Russia. u: 23rd Telecommunications Forum Telfor (TELFOR), Belgrade, pp. 1-4
Grzymala-Busse, J.W., Werbrouck, P. (1998) On the best search method in the LEM1 and LEM2 algorithms in incomplete information: Rough set analysis. Studies in Fuzziness and Soft Computing, Physica-Verlag HD, v. 13, pp. 75-91
Miller, D., Harris, S., Harper, A., Vandyke, S., Blask, C. (2011) Security Information and Event Management (SIEM) Implementation. Columbus, OH: McGraw-Hill
Pawlak, Z. (1982) Rough sets. International Journal of Computer & Information Sciences, 11(5): 341-356
Rummler, G.A., Brache, A.P. (2013) Improving performance: How to manage the white space on the organization chart. Jossey-Bass a Wiley Imprint, Third Edition
Santos, O. (2015) Network security with NetFlow and IPFIX: Big data analytics for information security. Indianapolis: Cisco Press, 1nd ed
Yisheng, L., Yanjie, D., Wenwen, K., Zhengxi, L., Fei-Yue, W. (2015) Traffic flow prediction with big data: A deep learning approach. IEEE Transactions on Intelligent Transportation Systems, vol. 16, no. 2, pp. 865-873, April