Article

Article title DEVELOPMENT OF ADAPTIVE SYSTEM OF INFORMATION SECURITY
Authors E.S. Abramov
Section SECTION II. SECURITY OF INFORMATION SYSTEMS AND NETWORKS
Month, Year 11, 2009 @en
Index UDC 681.324
DOI
Abstract There is method of constructing a system of information protection, which allows using the methods of the theory of immune systems, fuzzy logic, artificial neural networks, fuzzy multi-criteria selection of solutions and numerical optimization methods to create and maintain up to date system of information protection, which ensures the maintenance of security level that is adequate to the current threats. In addition, describing the solve the problem of assessing the effectiveness of the resulting new structure of the GIS without changing the modus operandi of the current configuration of remedies.

Download PDF

Keywords Immune system; fuzzy logic; artificial neural networks; fuzzy multi-criteria selection; simulation modeling.
References 1. Горбунов А.Л., Чуменко В.Н., Выбор рациональной структуры средств защиты информации в АСУ. [Электронный ресурс] / Режим доступа: http://kiev-
security.org.ua/box/2/26.shtml - свободный. – 03.12.2009.
2. Нечеткие множества в моделях управления и искусственного интеллекта. / Под ред. Д.А.Поспелова. - М.:Наука, 1986.
3. Kozma R., Kitamura M., Sakuma M., Yokoyama Y. Anomaly Detection by neural network models and statistical time series analysis // Proc. IEEE International Conference on Neural Networks, Orlando, Florida, June 27–29, 1994.
4. Forrest S., Perelson A.S., Allen L., Cherukuri R. Serf-nonself discrimination in a computer // Proc. IEEE Symposium on Research in Security and Privacy, Oakland, CA, 16–18 May, 1994. P. 202–212.
5. Dasgupta D., Forrest S. Novelty detection in time series data using ideas from immunology // ISCA 5th International Conf. on Intelligent Systems, Reno, Nevada, June 19–21, 1996.
6. Fuller R. Neural Fuzzy Systems. – Abo: Abo Akademi University, 1995. 252 p.
7. Negneyitsky M. Artificial intelligence: a guide to intelligent systems. Addison-Wesley, 2002.
8. Нестерук Г.Ф., Куприянов М.С., Елизаров С.И. К решению задачи нейронечеткой классификации // Сб. докл. VI Междунар. конф. SCM’2003. – СПб.: СПГЭТУ, 2003. Т. 1. – С. 244–246.
9. Нестерук Г.Ф., Молдовян А.А., Нестерук Ф.Г., Воскресенский С.И., Костин А.А., Повышение избыточности информационных полей как системы безопасности.
10. Баутов А. Эффективность защиты информации. [Электронный ресурс] / Режим доступа: http://www.bre.ru/security/19165.html. - свободный. – Загл. с экрана.

Comments are closed.