Research on Audit Model of Users’ Operation Normalization Based on Graph Theory in Power System

Article Preview

Abstract:

Users’ correct operations should be abstracted into the data which can be stored in computer. So we need model users’ operation. Power industrial control system is a closed system. It has specific operations. By analyzing, abstracting, modeling the manual of users’ operation procedures and storing it in the computer, we can audit users’ procedures through the already defined operation flow.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

109-113

Citation:

Online since:

June 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] CaoHui , Wang Qingqing, Ma Yizhong, et al. A New Type of Database Security Audit System [J]. Computer Engineer and Application, 2007, 43 (5): 163- 166.

Google Scholar

[2] Zhang X F, Sun Y F, Zhao Q S. Intrusion detection based on sub-set of system calls [J]. Act Electronic Sonica, 2004:1339-1341.

Google Scholar

[3] Daniels TE, Safford EH. A Network Audit System for Host basted Intrusion Detection (NASHID) in Linux. Purdue University, (2000).

Google Scholar

[4] CRISTIANINI N, TAYLOR J S. An Introduction to SVM and Other Kernel-based Learning Methods [M]. Cambridge Univ Press, (2000).

Google Scholar

[5] HuangChen, Huhongyun, JianGandong, et al. The Design and Implementation about Distributed Security Audit System [J]. Computer Engineering and Design, 2007, 28(4): 811- 813.

Google Scholar

[6] Abdel-Salam M, Abdallah H, et al. Graph theory as a guide for planning of power distribution networks[M]. IEEE, (1982).

Google Scholar

[7] U.S. National Computer Security Center. A Guide to Understanding Audit in Trusted Systems, (1988).

Google Scholar