Internet of vehicles security situation awareness based on intrusion detection protection systems

Author(s):  
Jian Bai ◽  
Zhuo Zhang ◽  
Bingshen Shen

With the rise of technologies such as mobile Internet, 5G networks and artificial intelligence, the development of Internet of Vehicle Information Security (ICVS) has become the mainstream and direction for the future development of the automotive industry. ICVS, people, roads, clouds, and APP constitute a complex network of vehicles. As part of the Internet, vehicle networking will inevitably face various complex information security threats and risks. This paper aims to design a kind of security situation awareness of Internet of vehicles based on intrusion detection protection systems (IDPS). By collecting the security data of car, app and private cloud for big data analysis, the whole smart car security situation awareness system is constructed. The system can be used to analyze potential threats, send out warnings, and carry out emergency responses.

2020 ◽  
Vol 6 (2) ◽  
pp. 31-35
Author(s):  
Amyrtaa K. Mongush ◽  
Igor N. Karmanov

Entry of modern society into the information stage of development wake, information security one of the most important problems of our time. The article discusses the possibility of automating the design of an integrated information security system. One of the key stages in the design of an information security system is the assessment of the current state of the information security system through audit. An information security audit allows identifying all vulnerabilities in the system. To automate the detection of vulnerabilities of the investigated object, network scanners are considered. The use of scanners allows solving the problems of identification and analysis of vulnerabilities. A scheme for automating the design of physical protection systems is also considered. In conclusion, the advantages of automating the design of an information protection system are noted, frequently used software tools and utilities for automating individual stages of the design of information protection systems are presented.


2017 ◽  
Vol 8 (1) ◽  
pp. 51-59 ◽  
Author(s):  
Masoud Al Quhtani

AbstractBackground: The globalization era has brought with it the development of high technology, and therefore new methods of preserving and storing data. New data storing techniques ensure data are stored for longer periods of time, more efficiently and with a higher quality, but also with a higher data abuse risk. Objective: The goal of the paper is to provide a review of the data mining applications for the purpose of corporate information security, and intrusion detection in particular. Methods/approach: The review was conducted using the systematic analysis of the previously published papers on the usage of data mining in the field of corporate information security. Results: This paper demonstrates that the use of data mining applications is extremely useful and has a great importance for establishing corporate information security. Data mining applications are directly related to issues of intrusion detection and privacy protection. Conclusions: The most important fact that can be specified based on this study is that corporations can establish a sustainable and efficient data mining system that will ensure privacy and successful protection against unwanted intrusions.


2021 ◽  
Author(s):  
Larisa K. Ptitsyna ◽  
Anastasia O. Zharanova ◽  
Mikhail P. Belov ◽  
Aleksey V. Ptitsyn

2020 ◽  
Vol 1 (2) ◽  
pp. 1-9
Author(s):  
Jabbor Mukhammadiev

In the international media space the issues of ensuring information security of the state is inseparably interrelated with the political, economic and legal guarantees for exercising freedom of speech and expression. The problem of ensuring the information security of any state is one of the most important aspects of its foreign policy, since it is the information sphere that is today considered to be the most important object of application of the activities of various participants in international relations. In connection with the rapid development of information technologies, threats of a new type are emerging - threats to information security on a national scale, respectively, the state must respond quickly to a changing situation and take decisive steps to organize a coherent complex information security system. The article analyzes the main approaches to providing information security of the country, formulated the goal, tasks, functions, principles of ensuring information security of the country


Author(s):  
Dapeng Man ◽  
Fanyi Zeng ◽  
Jiguang Lv ◽  
Shichang Xuan ◽  
Wu Yang ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document