Article

Article title ARHITECRURE OF INSADERS CONTROL AGENT BASED ON CONFIDENCE EVALUATION APPROACH
Authors A.A. Beshta
Section SECTION II. PROTECTION OF COMPUTER SYSTEMS
Month, Year 12, 2012 @en
Index UDC 004.056.5 004.89
DOI
Abstract The purpose of the research is development of architecture of control over insiders agent based on object confidence evaluation approach. In this research the method of confidence evaluation to observed object was proposed. This method account voices for observed object and their importance. For this purpose (ε; θ) – object confidence model was developed. Influence of model’s factors on confidence level was shown and control parameters of model were developed. Algorithm of control over insiders and architecture of software agent implements this algorithm were developed. Modules of agent architecture and their components were shown; data flows between these components, block’s functions and the logic of the agent were described.

Download PDF

Keywords Insider; destructive impact; confidence in the object; information system event.
References 1. Rosari D., Sarne G., Garruzzo S. Integrating trust measures in multiagent systems. International journal of intelligent systems. // Wiley Periodical. – 2012. – Vol. 27, № 1. – P. 1-15.
2. Salehi-Abari A., White T. DART: a distributed analysis of reputation and trust framework. Computational intelligence // Wiley Periodical. – 2012. – Vol. 28, № 4. – P. 642-682.
3. Новиков Д.А. Математические модели формирования и функционирования команд. – М.: Изд-во «Физматлит», 2008. – 184 с.
4. Бешта А.А. Подход к выявлению внутреннего злоумышленного воздействия на основе репутации объектов. Актуальные вопросы информационной безопасности регионов в условиях глобализации информационного пространства: Материалы Всерос. науч.-практ. конф., г. Волгоград, 27 апреля 2012 г. / ФГБОУ ВПО «Волгогр. гос. ун-т». – Волгоград: Изд-во ВолГУ, 2012. – 185 с.
5. Arenas A., Aziz B., Silaghi G. Reputation management in collaborative computing systems. Security and Communication Networks // Wiley Periodical. – 2010. – Vol. 3, № 6. – Р. 546-564.

Comments are closed.