scholarly journals Immune-like procedure for functionality of the system of information security in automated data processing systems in the context of countering internal threats

Author(s):  
Simon Zhorzhevich Simavoryan ◽  
Arsen Rafikovich Simonyan ◽  
Georgii Aleksandrovich Popov ◽  
Elena Ivanovna Ulitina

The subject of this research is the system of creating mechanisms of information from internal threats in automated data processing systems similar to the mechanism of human immunity. The object of this research is the mechanism of human immunity and systems of ensuring information security in automated data processing systems. The goal of this work lies in the development of the universal scheme of functionality of the mechanism of human immunity against internal threats in form of the procedure, and develop on its basis the immune-like scheme for countering internal threats applicable to the systems of ensuring information security. Methodological research on the development of procedure for detecting internal threats in the mechanism of human immunity is carried out via the methods of systemic analysis in area of ensuring information security. Special attention is given to such aspects as consistency and adaptability of the mechanisms of human immunity applicable to the systems of ensuring information security. This article introduces the new solution to the task of adapting the universal scheme of functionality of the immune system in countering internal threats in the systems of ensuring information security based on the principle of demarcation of the elements to “known/alien” and implementation of the procedure to “destroy” threat, the so-called “Trogotcytosis” (“gnaw”). The developed procedures may serve as the basic schemes in further practical studies of the immune-like systems of ensuring informations security.

Author(s):  
Simon Zhorzhevich Simavoryan ◽  
Arsen Rafikovich Simonyan ◽  
Georgii Aleksandrovich Popov ◽  
Elena Ivanovna Ulitina

This article is dedicated to construction of the system of information security in automated data processing systems that function by analogy with the human immune system. The subject of this research is the development of the procedure for countering external intrusions of viruses, spam, and other destructive software programs in automated data processing systems. The object of this research is the systems of ensuring information security in automated data processing systems and human immune system. Methodological research on elaboration of the procedure for identification of intrusion is conducted via methods of artificial intelligence, systemic analysis, theory of neural and immune systems in the sphere of ensuring information security based on the achievements of systemic analysis and a systemic-conceptual approach towards information security in automated data processing systems. The main result lies in the developed general procedure for the functionality of the system of ensuring information security in countering external intrusions in the form of block-diagram and its description. The procedure is based on the idea of similarity in functionality of the mechanisms and procedures for protection against external intrusions in both, human immune system and automated data processing system, as well as drawing parallel between them. The main peculiarity of the developed procedure lies in its applicability to the accepted classification of the initial external environment of intrusion onto physical, information, field, and infrastructure environments. Such approach guarantees the novelty of the development from the perspective of constant updating of human immune system countering mechanisms to the external intrusions and its application for each environment in applicable to automated data processing systems.


Author(s):  
Simon Zhorzhevich Simavoryan ◽  
Arsen Rafikovich Simonyan ◽  
Georgii Aleksandrovich Popov ◽  
Elena Ivanovna Ulitina

The subject of this research is the analysis of possible implementation of the mechanisms of functionality of human immune system applicable to information security systems in automated data processing systems. The objects of this research are the human immune system, information security systems, and automated data processing systems. The research is conducted on the basis of achievements of systemic-conceptual approach towards information protection in automated data processing systems, developed within the framework of the project sponsored by the Russian Foundation for Basic Research No. 19-01-00383 on creation of intelligent information protection systems based on the neural network intrusion detection systems and  the mechanisms of artificial immune systems. The article reviews similarity and difference between human immune system and information security systems. Special attention is given to identification of peculiarities of functionality of the mechanisms on detection of harmful intrusions into these systems respectively. Methodological research on the topic are carried out using the achievements in the area of creation of neural network intrusion detection system, built on the basis of artificial immune mechanisms that function similar to human immune system. The main result consists in the conclusion that adaptive information security systems containing the means and mechanisms of protection and built by analogy with the human immune system, may provide successful and effective protection of information in automated data processing systems. The specificity and importance of this conclusion is substantiated by the fact that it can be implemented despite the absence of full analogy between human immune system and information security system; moreover, multiple mechanism of protection implemented in human immune system are absent in the information security system, or the other way around.


2012 ◽  
Vol 241-244 ◽  
pp. 1737-1740
Author(s):  
Wei Chen

The immune genetic algorithm is a kind of heuristic algorithm which simulates the biological immune system and introduces the genetic operator to its immune operator. Conquering the inherent defects of genetic algorithm that the convergence direction can not be easily controlled so as to result in the prematureness;it is characterized by a better global search and memory ability. The basic principles and solving steps of the immune genetic algorithm are briefly introduced in this paper. The immune genetic algorithm is applied to the survey data processing and experimental results show that this method can be practicably and effectively applied to the survey data processing.


Author(s):  
Yessy Yusnita

Abstrak.  Penelitian ini bertujuan membuat algoritma dan pemrograman form Kartu Hasil Studi yang disesuaikan dengan format form Universitas Andalas. Program atau algoritma untuk pembuatan form dibuat dengan menggunakan Microsoft Visual Basic 6.0. Data yang diinput adalah nama mahasiswa, universitas, semester, nomor buku pokok mahasiswa, fakultas, tahun, kode mata kuliah, satuan kredit semester, nilai, bobot, indeks prestasi kumulatif, bobot kumulatif, satuan kredit semester kumulatif, maksimal satuan kredit semester boleh diambil, jumlah satuan kredit semester, jumlah bobot, tanggal, nama dosen, nomor induk pegawai dosen yang sesuai dengan form Kartu Hasil Studi mahasiswa jurusan matematika Universitas Andalas. Dalam pembuatan algoritma form Kartu Hasil Studi tersebut, dibatasi pada data mahasiswa reguler 2014 dan data dosen jurusan matematika Universitas Andalas. Pada form dibuat menu utama seperti Pengolahan Data, Tampilan dan Programmer. Pada form ini tersedia beberapa menu pilihan yang berisi tentang menu proses berfungsi untuk mengisi data mahasiwa dan data dosen secara otomatis; menu hapus berfungsi untuk menghapus data-data yang telah kita input; menu print berfungsi untuk mencetak hasil dari data-data yang telah di input. Menu keluar berfungsi untuk keluar dari form.Kata Kunci: Algoritma dan Pemrograman, Micrososft Visual Basic 6.0, form Kartu Hasil Studi Abstract. This study aims to create algorithms and programming Study Result Card form adapted to the form format Andalas University. Program or algorithm to produce form created using Microsoft Visual Basic 6.0. Inputted data is the name of the student, university, semester, the number of books the subject of students, faculty, year, course code, semester credit units, value, weight, grade point average, weighted cumulative, semester credit units cumulative, maximum semester credit units may be loaded, the number of semester credit units, the amount of weight, date, name of the lecturer, lecturer personal identification number that corresponds to the form Card Study Results students majoring in mathematics Andalas University. In the manufacture of algorithms form the Study Result Card, limited to data the regular student 2014 and data lecturer of majoring in mathematics Andalas University. On the main menu form is created as Data Processing, Display and Programmer. In this form is available several menu options on the menu that contains the process serves to fill the data students and faculty the data automatically; menu delete function to delete the data that we have input; menu print function to print the results of the data that has been input. Menu exit serves to get out of the formKeywords: Algorithm and Program, Microsoft Visual Basic 6.0, form the card results of the study


2019 ◽  
Vol 13 (2) ◽  
pp. 248-257
Author(s):  
Natalia Valerievna Chikina

The paper analyzes the works of a well-known poet and rock musician S. Karhu, who writes in the Karelian language. The aim of the study is to highlight the author’s artistic system of images. The following tasks were set for the study: to formulate the poet’s original concept, to scrutinize and comment on the images in Karhu’s lyrics. The object is verses from the first and so far only volume. The subject of the study is the specific ethnic traits of Karhu’s poetry, as seen in the system of images. Literary-historical and comparative methods were used in the analysis. The scientific novelty is in the absence of similar studies on the poet’s works. Systemic analysis of the ethnic sources, the evolution and genre choices of the Karelian language literature associated with the changing artistic consciousness are coming to the foreground in this time of global change, when preserving the people’s cultural heritage is especially important. The poet’s personal background has brought him into the sphere of artistic creativity, enabled him to verbalize the world of ethnic life that had been opened up to him. The article points out some specific features of the world of images, language and culture of the Karelian people. Karelian literature shows a tendency to use folklore heritage. The transformation of folk poetic symbolic images is arguably the most characteristic trait of folklorism in contemporary Karelian-language poetry, where folk poetry symbols tend to be equaled with the image of the native land. Karhu’s philosophical verses increasingly pose and confidently resolve the questions of good and evil, happiness and pain, life and death. It is essential for him that the character retains the folklore origins, for he deems it to be the spiritual source of modernity.


Author(s):  
Nelli A. Krasovskaya ◽  

This article discusses the semantics of lexical units included in the thematic group ‘Plant World’. For a person with a traditional worldview, nature is the basis for the formation of a system of views, values, for numerous rethinking. The material for analysis in the article is provided not by a lexicographic source but by a linguo-geographical one. A collection of maps of the recently published first issue of The Plant World of the Lexical Atlas of Russian Folk Dialects allows us to make rather interesting observations. Work with the material of semantic maps makes it possible not only to establish changes in the semantics of lexical units but also to find areas that are associated with the use of a word in one or another secondary meaning. In some cases, there were created duplicate maps devoted solely to the functioning of lexical units in extended sense. Systemic analysis of maps makes it possible to identify patterns in the semantic shifts of lexemes denoting facts and phenomena of the world around as the main meaning. There have been revealed semantic shifts of lexemes from the thematic group ‘Plant World’ to the field of subject, locative and anthropomorphic registers. Such examples of the extensive use of words are not unexpected for the Russian language. It should also be emphasized that the analysis of comments and other materials accompanying maps allows us to establish the features of shifts in semantics. It has been determined that a shift to the subject and locative semantic register is mainly associated with metonymy mechanisms, while a shift to the area of the anthropomorphic semantic register – with the metaphorical transfer mechanisms. The author draws conclusions concerning both the use of map materials for analyzing the extension of semantics and the features of secondary nominations in lexemes belonging to the thematic group ‘Plant World’.


Author(s):  
Turhut Salayev

The article deals with scientific and theoretical understanding and the provision of the definition of the category "actors of administrative and legal support of information security in the customs area". The author has disclosed and analyzed the provisions of the administrative and legal doctrine of the above questio, besides, the problematic issues of the definition of "subjects of administrative and legal support of information security in the customs sphere" are identified, andthe necessity of distinguishing this concept from other related concepts and categories is defined. Disclosing issues of actors of administrative and legal support of information security in the cus-toms sphere, it is necessary to avoid substitution of concepts and clearly understand the difference between the concepts of "institutional mechanism of administrative and legal support of information security in customs" and "state mechanism of administrative and legal support of information security in the customs sphere "from the concept of" subjects of administrative and legal support of information security in the customs sphere ". After all, the concept that is the subject of our study, of all the above, has the most comprehensive and broad scope and meaning. That is why, disclosing a set of subjects of administrative and legal support of information security in the customs sphere, it is advisable to apply a broad approach to understanding this category, given that among such subjects must be considered non-state subjects. objects - local governments, public organizations, etc. Because without their activities such a list will not be complete, and the mechanism of administrative and legal support of information security in the customs sphere will not be such that covers all possible spheres of public life and methods of information security. The current general information and administrative legislation, as well as special legislation gov-erning the procedure of customs, is considered in order to more clearly disclose the features and legal status of the actors of administrative and legal support of information security in the customs area. Each of these entities plays an appropriate role and occupies the necessary place in the system of national security of Ukraine, information security of Ukraine in general and information security in the customs area in particular. This role can be described as the implementation of general control over information security in the customs area, as well as taking measures to respond to violations of information legislation and the emergence of threats to information in the customs area within the powers defined by law. At the same time, the administrative and legal provision of information security is carried out directly by the customs authorities.


Sign in / Sign up

Export Citation Format

Share Document