scholarly journals DEVELOPMENT OF METHOD TO IDENTIFY THE COMPUTER SYSTEM STATE BASED ON THE «ISOLATION FOREST» ALGORITHM

2021 ◽  
Vol 1 (1) ◽  
pp. 105-116
Author(s):  
S. Y. Gavrylenko ◽  
I. V. Sheverdin

Context. The problem of identification a computer system state was investigated. The object of the research is the identification process of the computer system state. The subject of the research is computer system state identifying means and methods. Objective. The purpose of the work is to develop a method for identifying the computer system state. Method. The method has been developed for identifying a computer system state based on integrated use the procedure for grouping unlabeled initial data and using machine learning technology based on the «Isolation Forest» algorithm, which provides to identify a computer system state and to distinguished the process name that initiated the abnormal state. Therefore, for collecting statistical data in the form of operating system functioning events, data method has been proposed and developed along with software. The analysis of functioning events has been performed. The result of analysis showed that the most informative are read and write operations. To set up a single dataset, read and write operations compared with the process name and combined into one array of event groups, so that it is possible to single out the process that causes the abnormal state of the computer system. As a result of the research, the «Isolation Forest» algorithm has been selected as a component of the method for identifying the computer system state. An accuracy and efficiency assessment of the developed method of identifying a computer system state has been carried out. Results. The developed method is implemented and investigated when solving the problem of identifying anomalies in the functioning of computer systems. Conclusions. The experiments carried out confirmed the efficiency of the proposed method. It allows us recommended the method for practical use in order to improve efficiency of identifying the computer system state and use it as an express method. Areas for further research may lie in the creation of the ensemble of fuzzy trees based on the proposed method and optimization of this software implementation.

1995 ◽  
Vol 76 (1) ◽  
pp. 47-50
Author(s):  
N. V. Komissarova

The vegetative characteristic are studied in 45 patients after craniocerebral injury of medium gravity. The peculiarities of the vegetative nervous system functioning in the remote period are the different background characteristics in cardiovascular system, the decreased vegetative reactivity, the complex nature of provision of physical and mental activity. The effect of sex and age of patients, traumatic substrate lateralization and social adaptation nature on the nature of vegetative disorders is shown.


2021 ◽  
Vol 12 (3) ◽  
pp. 150-156
Author(s):  
A. V. Galatenko ◽  
◽  
V. A. Kuzovikhina ◽  

We propose an automata model of computer system security. A system is represented by a finite automaton with states partitioned into two subsets: "secure" and "insecure". System functioning is secure if the number of consecutive insecure states is not greater than some nonnegative integer k. This definition allows one to formally reflect responsiveness to security breaches. The number of all input sequences that preserve security for the given value of k is referred to as a k-secure language. We prove that if a language is k-secure for some natural and automaton V, then it is also k-secure for any 0 < k < k and some automaton V = V (k). Reduction of the value of k is performed at the cost of amplification of the number of states. On the other hand, for any non-negative integer k there exists a k-secure language that is not k"-secure for any natural k" > k. The problem of reconstruction of a k-secure language using a conditional experiment is split into two subcases. If the cardinality of an input alphabet is bound by some constant, then the order of Shannon function of experiment complexity is the same for al k; otherwise there emerges a lower bound of the order nk.


Electronics ◽  
2020 ◽  
Vol 9 (5) ◽  
pp. 809 ◽  
Author(s):  
Johannes Hiller ◽  
Sami Koskinen ◽  
Riccardo Berta ◽  
Nisrine Osman ◽  
Ben Nagy ◽  
...  

As industrial research in automated driving is rapidly advancing, it is of paramount importance to analyze field data from extensive road tests. This paper investigates the design and development of a toolchain to process and manage experimental data to answer a set of research questions about the evaluation of automated driving functions at various levels, from technical system functioning to overall impact assessment. We have faced this challenge in L3Pilot, the first comprehensive test of automated driving functions (ADFs) on public roads in Europe. L3Pilot is testing ADFs in vehicles made by 13 companies. The tested functions are mainly of Society of Automotive Engineers (SAE) automation level 3, some of them of level 4. In this context, the presented toolchain supports various confidentiality levels, and allows cross-vehicle owner seamless data management, with the efficient storage of data and their iterative processing with a variety of analysis and evaluation tools. Most of the toolchain modules have been developed to a prototype version in a desktop/cloud environment, exploiting state-of-the-art technology. This has allowed us to efficiently set up what could become a comprehensive edge-to-cloud reference architecture for managing data in automated vehicle tests. The project has been released as open source, the data format into which all vehicular signals, recorded in proprietary formats, were converted, in order to support efficient processing through multiple tools, scalability and data quality checking. We expect that this format should enhance research on automated driving testing, as it provides a shared framework for dealing with data from collection to analysis. We are confident that this format, and the information provided in this article, can represent a reference for the design of future architectures to implement in vehicles.


Author(s):  
Miguel Jose Hernandez y Lopez ◽  
Carlos Francisco Lerma Resendez

This chapter discusses the basic aspects of Honeypots, how they are implemented in modern computer networks, as well as their practical uses and implementation in educational environments, providing the reader with the most important points regarding the main characteristics of Honeypots and Honeynets. Honeypots are defined as “closely monitored network decoys” that can be set by network administrators to deal with a wide variety of attacks and interact with users in different levels (Provos, 2004). The implementation of Honeypots provides an answer to a common question posted by the field of information security and forensics: How to dissect the elements that make up an attack against a computer system. The chapter will summarizes the different features and capabilities of Honeypots once they are set up in a production environment to clarify the elements that are needed to be configured in order for a Honeypot to accomplish its main tasks and in order for it to be considered an effective tool. The end of the chapter will shift towards the analysis of virtualization as an important tool that maximizes the practical use of Honeypots in controlled environments that are focused towards the study of attacks, responses and analysis methods.


2012 ◽  
Vol 40 (4) ◽  
pp. 389-399
Author(s):  
Dawn Snyder ◽  
Joel Gardner

At Franklin University, we are in the process of creating a master's degree in Instructional Design and Performance Technology. In one of the program courses, Enhancing Learning with Technology, we wanted students to experience applying principles of e-learning while using an industry standard e-learning application. However, we have learned by experience that it can be difficult to set up the appropriate infrastructure and support needed to successfully provide this technology in a course. In this article, we describe the unique instructional design context at Franklin University and the process we used to design and develop this course. We describe the process we used to select the technology, Articulate Rapid E-Learning Studio ‘09. We also describe the steps taken to support students in their use of this technology. We present several obstacles in designing and developing the course, as well as our solutions.


1975 ◽  
Vol 24 (3-4) ◽  
pp. 299-306 ◽  
Author(s):  
G. Fontana ◽  
P. Matteuzzi ◽  
G. Fabiani ◽  
A. Forabosco

A computer system analysing human metaphase images and finding banding patterns of R-banded chromosomes has been set up. This first paper describes the interactive procedure in selection of metaphase images, automatically digitized starting from microphotographic negatives.


2011 ◽  
Vol 4 (2) ◽  
Author(s):  
Jean Underwood ◽  
Arne Dahlberg ◽  
Simon FitzPatrick ◽  
Malcolm Greenwood

The STILE Project (Students' and Teachers' Integrated Learning Environment) is one of 76 projects set up under the UK Government's Teaching and Learning Technology Programme (TLTP) initiative sponsored by the British Higher Education Funding Councils (HEFCs). The STILE Project uses hypermedia to provide greater opportunities for independent and flexible modes of learning both in a campus situation and for distance learning. The approach is resource-based. STILE provides a mechanism for both tutors and learners to discover and access relevant resources when they need them, together with facilities that enable users readily to use and re-use existing materials, to integrate them together, and to add further materials of their own in a way that seems natural to them (see Ruggles et al, 1995). The result is not a closed and finished product,but a set of tools and services and a continually developing resource base. The effect is to ease the load on academic staff in maintaining and supporting student access to resources, and to enrich the set of resources available to both staff and students.DOI:10.1080/0968776960040205


BMJ ◽  
2004 ◽  
Vol 329 (7468) ◽  
pp. 704.4
Author(s):  
Zosia Kmietowicz
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document