Customers Voice Concerns Over Rule-Based Systems in APAC

 
Thread Tools Search this Thread
Special Forums News, Links, Events and Announcements Complex Event Processing RSS News Customers Voice Concerns Over Rule-Based Systems in APAC
# 1  
Old 11-26-2007
Customers Voice Concerns Over Rule-Based Systems in APAC

Tim Bass
Mon, 26 Nov 2007 03:39:12 +0000
We just completed the 7th Cyber Defense Initiative Conference 2007 in Bangkok.** There were*more than*700 attendees in the main conference hall and*nearly*300 people in the exhibition areas, bringing the total of attendees to approximately 1000 people, according to the conference organizers.
I had many opportunities to discuss event processing and security*with a number of Thai business executives, most of whom have*technology-related doctorate degrees from the US and Europe,*including*directors from the*National Science and Technology Development Agency (NSTDA), the National National Electronics and Computer Technology Center (NECTEC) and some of the largest telecommuncations and financial services*providers in Thailand.
Most of the business leaders*expressed an interest in Bayesian and Neural networks for event processing applications related to security and cyber defense initiatives.**** These business and technology leaders*also mentioned that rule-based event processing systems are not feasible for most enterprise classes of cyber defense applications.** This seems to confirm what I have been*posting on this blog, expressed by customers and scientists who are hands-on experts*-*rules-based systems are useful for some cyber security and cyber defense applications, but most advanced detection techniques require a self-learning, statistical approach.
I also heard from experts that you can find just about every cyberfraud imaginable in the Asia Pacific region, where criminals are*aggressively*seeking to*exploit and profit from any vulnerability they can find.* *A CTO*of a major telecommuications provider*mentioned very positive results with an implementation of neural networks in cyber defense applications.****
This week I am speaking at another conference.* I’ll try to report a bit more on the 7th Cyber Defense Initiative Conference 2007 in Bangkok when things slow down a bit!*
In closing today, Dr. Prinya Hom-Anek, CISSP, CISA, CISM, SANS GIAC, GCFW, CompTIA Security +, founder and acting president of TISA and his ACIS Professional Center team did a*fantastic*job organizing and hosting*the conference.*** The conference was, by far, the best conference I have attended, to date, in 2007.



Source...
Login or Register to Ask a Question

Previous Thread | Next Thread

6 More Discussions You Might Find Interesting

1. IP Networking

Facing issue in ip6table rule for port based routing management

Hi, Please help me on issue described below, I have 4 machine setup, M1 -> M2 -> M3 | M4. And A laptop that can be reachable through both M3 and M4. M2 has 2 NIC conected to M3 and M4. Now I want to divide the flow coming from M1 for laptop. At M2, I have done following,... (1 Reply)
Discussion started by: rahulbhansali24
1 Replies

2. Shell Programming and Scripting

Regex based Rule engine.

Hi, Greetings. We need to make a regexp based rule engine. The rules would be applied to any file specified and the data not matching should be logged. Would awk be the right scripting language. Regards, Dikesh Shah. (2 Replies)
Discussion started by: dikesm
2 Replies

3. Shell Programming and Scripting

generate a file from existing file based on some rule

Hi guys, i have a file in below format.let me explain first what i am trying to do . i am making a file from this file , will rearrange these columns, then i will run several command(start/stop mentioned in this file) on unix environment. my requirements : 1. i have 27 servers , on each server... (4 Replies)
Discussion started by: deepakiniimt
4 Replies

4. Fedora

Unix-based operating systems

Hello. I own a MacBook (black) running Leopard (Mac OS X 10.5.8), and I'm curious about a few things -- any help will be very, very much appreciated. I'm pretty much a newbie to Unix, although I have some very basic command-line skills with Mac OS X's Terminal. So while I know how to work the... (13 Replies)
Discussion started by: Tron55555
13 Replies

5. Shell Programming and Scripting

Counting the differences based on a specific rule

Hi, I've been trying to create a perl file to run something very specific. But I'm not getting any success. I'm not very good with hashing. I have a file with two columns (tab separated) (already sorted) 99890 + 100281 + 104919 - 109672 + 113428 - 114501 + 115357 + 115598 ... (7 Replies)
Discussion started by: labrazil
7 Replies

6. Linux

Linux Concerns....need your help

Hi, user has an existing Server (DL380G4) with STK L80 Tapelibrary running on RHAS3 and uses NetBackup 5.1 for EBS. The user decided to add new tape library EML103e.... What are the proceedure to be followed when adding new tapelibrary? What are the things that needs to be considered?... (0 Replies)
Discussion started by: renobal
0 Replies
Login or Register to Ask a Question