Translate this page:
Please select your language to translate the article


You can just close the window to don't translate
Library
Your profile

Back to contents

National Security
Reference:

Lyapustin A.E. Development and examination of the models and methods of comprehensive protection of heterogeneous information platforms

Abstract: This work presents the analysis of the modern approaches towards development of comprehensive systems for protecting heterogeneous information platforms. Despite the advantages of the reviewed approaches, majority of them are aimed at solving a particular task, rather than a complex solution to the problem of protection of information in the environment of sophisticated heterogeneous systems. This article demonstrates the architecture of a heterogeneous information system acting as an object of protection. The result of the conducted research lies in the formation of a concept of creation of an Information Security System, the architecture of which is built upon a multi-agent approach and is oriented towards heterogeneous information systems. The author proposes a model for a comprehensive protection of the heterogeneous information platforms and examines the methodology for intelligent threat detection. The results of this research suggest increasing the area of use of the multi-agent approach and its integration into the intelligent analysis of development and functionality of the information systems.


Keywords:

intelligent systemof information protection, threat detection, information security, heterogeneous information platforms, information safety, detection agents, means of information security, information system protection, centralized attacks, information processing


This article can be downloaded freely in PDF format for reading. Download article


References
1. Koch R., Dreo G. Fast Learning Neural Network Intrusion Detection System // Third International Conference on Autonomous Infrastructure, Management and Security (AIMS’2009), The Nether¬lands, Proceedings.-2009.-P.187-190.
2. Bitter C., North J., Elizondo D. A., Watson T. An Introduction to the Use of Neural Networks for Network Intrusion Detection // Computational Intelligence for Privacy and Security Studies in Computational Intelligence.-2012.-Vol. 394.-P.5-24.
3. Pozdnyakov S.A. Ispol'zovanie skhemy sovpadeniy v sistemakh obnaruzheniya vtorzheniy na osnove neyronnykh setey // Vestnik Omskogo universiteta.-2012.-¹2.-S.189-190.
4. Abramov E.S. Postroenie adaptivnoy sistemy informatsionnoy bezopasnosti // Izvestiya YuFU. Tekhnicheskie nauki.-2009.-S. 99-109.
5. Kotenko I.V., Nesteruk F.G., Shorov A.V. Kontseptsiya adaptivnoy zashchity informatsionno¬telekommunikatsionnykh sistem na osnove paradigm nervnykh i neyronnykh setey // Trudy SPIIRAN.-2012.-Vyp. 4(23).-S.100-115.
6. Tsang C.-H. Kwong S. Ant colony clustering and feature extraction for anomaly intrusion detec¬tion // Studies in computational intelligence.-2006.-Vol. 34.-P. 101-121.
7. Taran A.A. Prilozheniya algoritma AntMiner+ k zadache klassifikatsii sobytiy pri analize setevogo trafika // Izvestiya YuFU. Tekhnicheskie nauki.-2012.-T. 137, ¹ 12.-S. 60-67.
8. http://eprints.agentlink.org/view/type/project.html (data obrashcheniya 18.06.2013).
9. http://www.magenta-technology.ru/ru/ (data obrashcheniya 18.06.2013).
10. http://www.fipa.org/index.html (data obrashcheniya 18.06.2013).