Simavoryan S.Z., Simonyan A.R., Popov G.A., Ulitina E.I. —
General concept for detecting intrusions of unknown type based on neural networks
// Software systems and computational methods. – 2021. – ¹ 4.
– P. 23 - 45.
DOI: 10.7256/2454-0714.2021.4.37072
URL: https://en.e-notabene.ru/itmag/article_37072.html
Read the article
Abstract: This article is dedicated to the problem of detecting intrusions of unknown type based on neural networks that bypass the system of information security in automated data processing systems and are not recognized as spiteful. Development of the means, methods and measures for detecting or preventing such hidden attacks is of particular relevance. Methodological research on the development of procedure for detecting intrusions are based on the achievements of systemic analysis, systemic-conceptual approach towards protection of information in automated data processing systems and achievements of the theory of neural systems in the area of ensuring information security. The object of this research is the intrusions of unknown type in automated data processing systems. The subject is the neural networks, namely neural networks of direct action. The main result lies in the development of neural network of direct action in form of the diagram of neural network links for detecting intrusions. For solving this task, the author developed:
1) The system of input indicators of the neural system;
2) Scales for the assessment of values of the formed indicators;
3) General procedure for detecting intrusions based on neural networks, the essence of which consists in implementation of the following sequence of actions: a) formation of the list of all the main parties to the process of detection of intrusion; b) formation of the set of parameters that characterize each of them; c) formation of the set of numerical characteristics for each parameter using the assessment scales of the formed indicators; d) analysis of the parameters of the configuration of neural network
The developed procedure may serve as the basic in further practical developments of the concept of detecting intrusions of unknown types based on neural networks.
Simavoryan S.Z., Simonyan A.R., Popov G.A., Ulitina E.I. —
Immune-like procedure for functionality of the system of information security in automated data processing systems in the context of countering internal threats
// Security Issues. – 2021. – ¹ 3.
– P. 70 - 83.
DOI: 10.25136/2409-7543.2021.3.36228
URL: https://en.e-notabene.ru/nb/article_36228.html
Read the article
Abstract: The subject of this research is the system of creating mechanisms of information from internal threats in automated data processing systems similar to the mechanism of human immunity. The object of this research is the mechanism of human immunity and systems of ensuring information security in automated data processing systems. The goal of this work lies in the development of the universal scheme of functionality of the mechanism of human immunity against internal threats in form of the procedure, and develop on its basis the immune-like scheme for countering internal threats applicable to the systems of ensuring information security. Methodological research on the development of procedure for detecting internal threats in the mechanism of human immunity is carried out via the methods of systemic analysis in area of ensuring information security. Special attention is given to such aspects as consistency and adaptability of the mechanisms of human immunity applicable to the systems of ensuring information security. This article introduces the new solution to the task of adapting the universal scheme of functionality of the immune system in countering internal threats in the systems of ensuring information security based on the principle of demarcation of the elements to “known/alien” and implementation of the procedure to “destroy” threat, the so-called “Trogotcytosis” (“gnaw”). The developed procedures may serve as the basic schemes in further practical studies of the immune-like systems of ensuring informations security.
Simavoryan S.Z., Simonyan A.R., Popov G.A., Ulitina E.I. —
Analysis of possible adaptation of the general pattern of immune system within the systems for preventing intrusions
// Security Issues. – 2020. – ¹ 4.
– P. 36 - 46.
DOI: 10.25136/2409-7543.2020.4.33736
URL: https://en.e-notabene.ru/nb/article_33736.html
Read the article
Abstract: The subject of this research is the analysis of possible implementation of the mechanisms of functionality of human immune system applicable to information security systems in automated data processing systems. The objects of this research are the human immune system, information security systems, and automated data processing systems. The research is conducted on the basis of achievements of systemic-conceptual approach towards information protection in automated data processing systems, developed within the framework of the project sponsored by the Russian Foundation for Basic Research No. 19-01-00383 on creation of intelligent information protection systems based on the neural network intrusion detection systems and the mechanisms of artificial immune systems. The article reviews similarity and difference between human immune system and information security systems. Special attention is given to identification of peculiarities of functionality of the mechanisms on detection of harmful intrusions into these systems respectively. Methodological research on the topic are carried out using the achievements in the area of creation of neural network intrusion detection system, built on the basis of artificial immune mechanisms that function similar to human immune system. The main result consists in the conclusion that adaptive information security systems containing the means and mechanisms of protection and built by analogy with the human immune system, may provide successful and effective protection of information in automated data processing systems. The specificity and importance of this conclusion is substantiated by the fact that it can be implemented despite the absence of full analogy between human immune system and information security system; moreover, multiple mechanism of protection implemented in human immune system are absent in the information security system, or the other way around.
Simavoryan S.Z., Simonyan A.R., Popov G.A., Ulitina E.I. —
The procedure of intrusions detection in information security systems based on the use of neural networks
// Software systems and computational methods. – 2020. – ¹ 3.
– P. 1 - 9.
DOI: 10.7256/2454-0714.2020.3.33734
URL: https://en.e-notabene.ru/itmag/article_33734.html
Read the article
Abstract: The subject of the research is the problem of identifying and countering intrusions (attacks) in information security systems (ISS) based on the system-conceptual approach, developed within the framework of the RFBR funded project No. 19-01-00383. The object of the research is neural networks and information security systems (ISS) of automated data processing systems (ADPS). The authors proceed from the basic conceptual requirements for intrusion detection systems - adaptability, learnability and manageability. The developed intrusion detection procedure considers both internal and external threats. It consists of two subsystems: a subsystem for detecting possible intrusions, which includes subsystems for predicting, controlling and managing access, analyzing and detecting the recurrence of intrusions, as well as a subsystem for countering intrusions, which includes subsystems for blocking / destroying protected resources, assessing losses associated with intrusions, and eliminating the consequences of the invasion. Methodological studies on the development of intrusion detection procedures are carried out using artificial intelligence methods, system analysis, and the theory of neural systems in the field of information security. Research in this work is carried out on the basis of the achievements of the system-conceptual approach to information security in ADPS.The main result obtained in this work is a block diagram (algorithm) of an adaptive intrusion detection procedure, which contains protection means and mechanisms, built by analogy with neural systems used in security systems.The developed general structure of the intrusion detection and counteraction system allows systematically interconnecting the subsystems for detecting possible intrusions and counteracting intrusions at the conceptual level.
Saryan A.A., Simonyan A.R. —
Basics of the segmentation of regional tourist flows
// Theoretical and Applied Economics. – 2019. – ¹ 4.
– P. 1 - 10.
DOI: 10.25136/2409-8647.2019.4.31438
URL: https://en.e-notabene.ru/etc/article_31438.html
Read the article
Abstract:
The object of this research is the regional tourist flow. In this article it means tourist flows of various sizes, density and intensity, directed to the constituent entities of the Russian Federation, total number of which is 85. The subject field of this research consists in optimization of regional tourist flows. Special attention is dedicated to the realization of this task through economic and mathematical modeling for the processes of formation and development of tourist flows. It is assumed that these flows can be specifically optimized by increasing their size, redistribution of tourists between segments of a flow, creation of its new segments and restriction of the flow growth in emergence of such fairly new phenomenon as overtourism. The conducted research allowed concluding that the tourist flows in the constituent entities of the Russian Federation differ in size and structure. Most of them have formed without the due scientific and economic justification or optimal connection to the existing tourist-recreational resources. As a result, the regional targeted programs of tourism development are not being implemented to the fullest extent. The novelty of this research consists in substantiation of the need for optimization of the structure of regional tourist flow on the basis of complex approach, as well as suggestion of the economic-mathematical model for such optimization.
Volkov A.V., Simonyan A.R. —
Stimuli and barriers of sustainable socioeconomic development of the territory on the example of the resort city of Sochi
// Finance and Management. – 2019. – ¹ 4.
– P. 111 - 121.
DOI: 10.25136/2409-7802.2019.4.31572
URL: https://en.e-notabene.ru/flc/article_31572.html
Read the article
Abstract: The subject of this research is the opinions and assessment results of the actors of socioeconomic, such as the representatives of state administration, corporate administration and population pertaining to the current status and peculiarities of formation and transformation of stimuli and barriers of sustainable socioeconomic development of the territory in economic, social, environmental and institutional spheres. Special attention was given to comparison of the acquired assessments with the specificity of current state of socioeconomic development of the Russian Federation. The object of this research is the factors of sustainable socioeconomic development of the territory assessed on the example of recreational-tourism specialization the resort city of Sochi. The scientific novelty is substantiated by acquisition of relevant assessments of the current stage of formation in the Russian Federation of stimuli and barriers of sustainable development of the territories on the example of recreational-tourism specialization the resort city of Sochi. It is proven that in the conditions of continuous crisis, most significant barriers of this process lie in the organizational-economic and social spheres in terms of the relatively favorable ecological situation, and partially, in the institutional sphere. Based on the ranking of obtained assessments, the author attempts to determine the priority vectors and measures on ensuring sustainability of socioeconomic development of municipal formation the resort city of Sochi.
Simavoryan S.Z., Simonyan A.R., Ulitina E.I., Popov G.A. —
On the concept of creating intelligent information security systems based on neural network intrusion detection systems in automated data processing systems
// Software systems and computational methods. – 2019. – ¹ 3.
– P. 30 - 36.
DOI: 10.7256/2454-0714.2019.3.30583
URL: https://en.e-notabene.ru/itmag/article_30583.html
Read the article
Abstract: The subject of the research is the concept of creating intelligent information protection systems based on neural network intrusion detection systems in automated data processing systems, developed as part of the funded project of the RFBR No. 19-01-00383. The object of the study is the intelligent information protection systems in automated data processing systems, built on the basis of neural intrusion detection systems, and later on the mechanisms of artificial immune systems. The authors consider adaptability, learning ability and controllability as the main conceptual requirements for the intrusion detection systems. Particular attention is focused on the construction of a flexible intelligent information protection system containing intrusion detection systems in both the nodes of the structural components of automated data processing systems, and in data transmission networks between structural components. Methodological studies of the chosen research direction are carried out using the methods of artificial intelligence, system analysis, the theory of intelligent information systems in the field of artificial intelligence. The work uses the achievements of a system-conceptual approach to information protection in automated data processing systems. The main result of the study is the conclusion that successful protection of information in automated data processing systems can only be carried out in a network in the form of interconnected local intrusion detection systems using neural network technologies combined into a single head center based on a system-conceptual approach. To combat unauthorized intrusions, it is necessary to adopt a unified systematic approach based on uniform legal, organizational and technical measures to protect information. The application of a system-conceptual approach to the creation of intrusion detection systems based on neural network technologies will contribute to the development of new tools, methods and activities for the intelligent management of information security in automated data processing systems.