Neural network protection of automated systems’ resources from unauthorized access

2013 ◽  
Vol 13 (05) ◽  
Author(s):  
Tatiana Buldakova
2021 ◽  
Author(s):  
Kishor P. Jadhav ◽  
Mohit Gangwar

To maintain the security of vulnerable network is the most essential thing in network system; for network protection or to eliminate unauthorized access of internal as well as external connections, various architectures have been suggested. Various existing approaches has developed different approaches to detect suspicious attacks on victimized machines; nevertheless, an external user develops malicious behaviour and gains unauthorized access to victim machines via such a behaviour framework, referred to as malicious activity or Intruder. A variety of supervised machine algorithms and soft computing algorithms have been developed to distinguish events in real-time as well as synthetic network log data. On the benchmark data set, the NLSKDD most commonly used data set to identify the Intruder. In this paper, we suggest using machine learning algorithms to identify intruders. A signature detection and anomaly detection are two related techniques that have been suggested. In the experimental study, the Recurrent Neural Network (RNN) algorithm is demonstrated with different data sets, and the system’s output is demonstrated in a real-time network context.


Author(s):  
Г.С. Мокану

Угрозы информационной безопасности в компьютерных сетях стали одной из основных проблем для владельцев ПК. При этом особое распространение этих угроз коснулось сетей WI-FI, в которых происходит как несанкционированный доступ к данным, так и только снижение уровня защиты сети. Практически все современные мобильные устройства (смартфоны, планшеты, ноутбуки и нетбуки) имеют возможность подключения к беспроводному Интернету или, точнее, к сети WI-FI, эта функция теперь является стандартной для этих устройств. nformation security threats in computer networks have become one of the main problems for PC owners. At the same time, a particular spread of these threats affected WI-FI networks, in which both unauthorized access to data and only a decrease in the level of network protection occur. Almost all modern mobile devices (smartphones, tablets, laptops and netbooks) have the ability to connect to the wireless Internet or, more precisely, to the WI-FI network, this function is now standard for these devices.


2018 ◽  
pp. 48-58
Author(s):  
I P Mikhnev ◽  
Nataliia Anatol'evna Sal'nikova ◽  
Irina Petrovna Medintseva

The monograph presents studies of information protection tools against unauthorized access to automated radionuclide spectrometry systems based on a scintillation gamma spectrometer. As a result of the conducted researches, the system's security indicators have been obtained, which allow to calculate and optimize the probability of damage from unauthorized access taking into account the operating time and the applied information protection means. The developed analytical estimations allow to calculate the upper and lower bounds of the probability of unauthorized access to confidential information at the design stages of automated systems.


Tuberculosis (TB) is airborne infectious disease which has claimed many lives than any other infectious disease. Chest X-rays (CXRs) are often used in recognizing TB manifestation site in chest. Lately, CXRs are taken in digital formats, which has made a huge impact in rapid diagnosis using automated systems in medical field. In our current work, four simple Convolutional Neural Networks (CNN) models such as VGG-16, VGG-19, RestNet50, and GoogLenet are implemented in identification of TB manifested CXRs. Two public TB image datasets were utilized to conduct this research. This study was carried out to explore the limit of accuracies and AUCs acquired by simple and small-scale CNN with complex and large-scale CNN models. The results achieved from this work are compared with results of two previous studies. The results indicate that our proposed VGG-16 model has gained highest score overall compared to the models from other two previous studies.


2016 ◽  
Vol 9 (1) ◽  
pp. 40-42 ◽  
Author(s):  
Никитин ◽  
A. Nikitin ◽  
Дровникова ◽  
I. Drovnikova ◽  
Рогозин ◽  
...  

Presents algorithms for calculating the quantitative criterion of security of the automated systems (AS) and the effectiveness of the systems of information protection from unauthorized access (GIS LMI) in these systems, implement early times-robotany mathematical model of identification and evaluation of quantitative criteria the AS security based on the requirements of GOST R ISO/IEC 15408-2-2013. Developed by algorithms are an integral part of the system is automatically bundled design (CAD) GIS LMI AC.


Sign in / Sign up

Export Citation Format

Share Document