Design of Network Security Control System for Cooperative Intrusion Detection

Author(s):  
Byoung-Koo Kim ◽  
Jong-Su Jang ◽  
Tai M. Chung
2019 ◽  
Vol 8 (S1) ◽  
pp. 15-17
Author(s):  
A. Aruljothi ◽  
N. Prabhu ◽  
N. M. Mallika

It is a difficult building to ensure the security of data arrange, so it is important to consider out a new security control design and model in the viewpoint of foundational control. As indicated by the attributes and security requests of data net, another security control viewpoint and its engineering dependent on parts is proposed, the security control framework is made-up, and insights regarding the structure of control system, its different kinds, and capacities and spread methods of security control parts are presented, at that point the highlights of the control framework are outlined at last.


2011 ◽  
Vol 268-270 ◽  
pp. 1012-1016
Author(s):  
Jian Zhou ◽  
Shan Shan Li ◽  
Wei Jie Tan

Aiming at face Tri-networks integration demand bearing network/core backbone, carry out research of security control technical structure , key technologies and standards systematic In Tri-networks integration environment, to Build a safer control system that includes Facing the Tri-networks integration of business, network, content, behavior, etc. Research oriented business level controls and abnormal behavior of preventing high-speed low delay safety control equipment, builds the control center system, realize the legality of different modal information content safety monitoring control, network security situation analysis and display, control strategy of unified management and dynamic maintenance, and other functions. validation the functions and performance of security control network system, argumentation the feasibility and evolution ability of the fusion network security control system structure.


2020 ◽  
Vol 5 ◽  
pp. 94-106
Author(s):  
Y.M. Iskanderov ◽  
◽  
M.D. Pautov

Aim. The use of modern information technologies makes it possible to achieve a qualitatively new level of control in supply chains. In these conditions, ensuring information security is the most important task. The article shows the possibilities of applying the spatial concepts of the actor-network theory in the interests of forming a relevant intelligent information security management system for supply chains. Materials and methods. The article discusses a new approach based on the provisions of the actor-network theory, which makes it possible to form the structure of an intelligent information security control system for supply chains, consisting of three main functional blocks: technical, psychological and administrative. The incoming information security threats and the relevant system responses generated through the interaction of the system blocks were considered as enacting the three Law’s spaces: the space of regions, the space of networks and the space of fl uids. Results. It is shown that the stability of this system in the space of networks is a necessary condition for its successful functioning in the space of regions, and its resilience in the space of fl uids gained through the dynamic knowledge formation helps overcome the adverse effects of the fl uidity. The problems of the intentional / unintentional nature of information security threats, as well as the reactivity / proactivity of the corresponding responses of the intelligent information security management system for supply chains are investigated. Conclusions. The proposed approach showed the possibility of using such an interdisciplinary tool in the fi eld of information security as the concepts of the actor-network theory. The intelligent information security control system built on its basis ensures that almost all the features of solving information security problems in supply chains are taken into account.


Sign in / Sign up

Export Citation Format

Share Document