{"title":"Basic clustering algorithms used for monitoring the processes of the ATM's OS","authors":"Michal Maliszewski, U. Boryczka","doi":"10.1109/INISTA.2017.8001128","DOIUrl":null,"url":null,"abstract":"The number of highly sophisticated software-based attacks on ATMs is growing these days. New types of threats require new ways of system protection. Most secure solutions are based on whitelists and sandboxes, which unlike antivirus solutions are able to protect the system against any new threat. Sadly, they are hard to configure therefore require an expert-level knowledge of operating system mechanisms and software security techniques. The main purpose of this article is to present the possibilities of using clustering algorithms in a configuration process of a sandbox-based security solution. Results of the experimental studies show that even basic clustering algorithms can be used as a part of the configuration process. Achieved results were deemed promising by the control algorithm and thus can be used as a base for future research.","PeriodicalId":314687,"journal":{"name":"2017 IEEE International Conference on INnovations in Intelligent SysTems and Applications (INISTA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE International Conference on INnovations in Intelligent SysTems and Applications (INISTA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INISTA.2017.8001128","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The number of highly sophisticated software-based attacks on ATMs is growing these days. New types of threats require new ways of system protection. Most secure solutions are based on whitelists and sandboxes, which unlike antivirus solutions are able to protect the system against any new threat. Sadly, they are hard to configure therefore require an expert-level knowledge of operating system mechanisms and software security techniques. The main purpose of this article is to present the possibilities of using clustering algorithms in a configuration process of a sandbox-based security solution. Results of the experimental studies show that even basic clustering algorithms can be used as a part of the configuration process. Achieved results were deemed promising by the control algorithm and thus can be used as a base for future research.