2021 ◽  
Vol 12 (4) ◽  
pp. 132-142
Author(s):  
Yevhen Ivanichenko ◽  
Mylana Sablina ◽  
Kateryna Kravchuk

The urgency of the topic is the integration of machine learning technologies into cybersecurity systems. After getting acquainted with the technical literature, the main technologies of machine learning that are implemented in the organization of cybersecurity were formulated. Acquainted with the main type of artificial neural network used in the prevention and detection of cyber threats and found that the main to consider the general application of machine learning technologies are artificial neural networks based on a multilayer perceptron with inverse error propagation. It is proposed to use indicators of compromise cyberattacks as initial information for automatic machine learning systems. Emphasis is placed on the main types of data that can be used by surveillance subsystems for information security and cybersecurity to perform tasks and prevent, classify and predict cybersecurity events. According to the results of the analysis, the main problem areas for their implementation in information security systems are identified. The problem of using machine learning (ML) in cybersecurity is difficult to solve, because advances in this area open up many opportunities, from which it is difficult to choose effective means of implementation and decision-making. In addition, this technology can also be used by hackers to create a cyber attack. The purpose of the study is to implement machine learning in information security and cybersecurity technology, and to depict a model based on self-learning


2017 ◽  
Vol 5 (1) ◽  
pp. 8-15
Author(s):  
Sergii Hilgurt ◽  

The multi-pattern matching is a fundamental technique found in applications like a network intrusion detection system, anti-virus, anti-worms and other signature- based information security tools. Due to rising traffic rates, increasing number and sophistication of attacks and the collapse of Moore’s law, traditional software solutions can no longer keep up. Therefore, hardware approaches are frequently being used by developers to accelerate pattern matching. Reconfigurable FPGA-based devices, providing the flexibility of software and the near-ASIC performance, have become increasingly popular for this purpose. Hence, increasing the efficiency of reconfigurable information security tools is a scientific issue now. Many different approaches to constructing hardware matching circuits on FPGAs are known. The most widely used of them are based on discrete comparators, hash-functions and finite automata. Each approach possesses its own pros and cons. None of them still became the leading one. In this paper, a method to combine several different approaches to enforce their advantages has been developed. An analytical technique to quickly advance estimate the resource costs of each matching scheme without need to compile FPGA project has been proposed. It allows to apply optimization procedures to near-optimally split the set of pattern between different approaches in acceptable time.


2012 ◽  
Vol 3 (3) ◽  
pp. 354-358
Author(s):  
Dr Gunmala Suri ◽  
Sneha Sharma

The purpose of this research is to investigate and understand how students are using computer. The activities that a student undertakes with the help of computers which might be fulfilling some academic or non academic purpose, is of great interest. It will help in understanding the limitations and potentials offered by the technology for use of computer in classroom. This paper brings out the three major kinds of activities that students undertake with computer; self learning activities, Information collection tasks and communication and group activities. The study further analyses the effect of demographics i.e. gender, age and faculty (department) of students on the activities with computer. The results show that gender has no impact on the activities of students with computer. The age impacts only the activities related to Information collection by using computer where as the faculty of student significantly impacts all the activities viz. self learning activities, Information collection tasks and communication and group activities. The findings from this research can be used in designing future e-learning initiatives and development e-learning tools


2014 ◽  
Vol 4 (3) ◽  
pp. 26-30 ◽  
Author(s):  
Larysa Lukianova

Abstract The idea of the conceptualization of adult education has been postulated in the article including its significant differences. The leading distinguishing feature is the personality of pedagogical staff that works with adults. It has been substantiated the dependence of the functions which are performed by pedagogical staff in the adult education system, on the main characteristics of the society. It has been shown the content of the integral-role position of a pedagogue-andragogue which has 3 elements: subject and content, project and technological, organization and diagnostic. The professional activity of a pedagogue-andragogue has been analyzed as the specialist who professionally organizes and conducts adult training and learning, helps create individual programs of training. At the same time, in his/her activity he/she combines different social functions as well. The most typical are to provide the help in renovating the motivation towards learning and professional activity, to combine the content both andragogical and professional activity of his/her learners, to share the methods of supervising adult self-learning.


2020 ◽  
Vol 16 (6) ◽  
pp. 998-1012
Author(s):  
G.V. Fedotova ◽  
D.D. Tkachenko

Subject. The article discusses the modeling of preventive protection of IT systems and evaluates their cyber resilience. Objectives. The study evaluates the existing threats and determines how informatization processes may unfold in the credit segment. Methods. Research is based on methods of regulatory and legislative analysis. We evaluate today’s public administration of cybersecurity in the financial and credit sector. To give a view of the existing situation and sum up the sector’s performance for the recent years, we performed the content analysis of statistics on data hacking and leakages. Results. The article highlights new trends in the financial and credit sector and the growing complexity of data security systems. As proposed by the Bank of Russia, the integration of smart technologies is showed to reinforce the cybersecurity of banking systems. Conclusions and Relevance. The informatization of all banking operation systems, growing complexity of procedures and work logs require new robust resources to be integrated into financial technologies. Stronger cybersecurity should lay a trend in the financial and credit sector in the nearest future. The findings can be used to flag strategic milestones of the banking development in the information-driven society.


Sign in / Sign up

Export Citation Format

Share Document