350 rub
Journal Neurocomputers №12 for 2014 г.
Article in number:
Application of neural networks for security information and control systems of critical objects
Keywords:
information security
information security threat
information and control system
a critical object
a neural network
operating system
security information and event management
Authors:
А. S. Shaburov - Ph.D. (Eng.), Associate Professor, Department of Automation and Telemechanics,
Perm National Research Polytechnic University
E-mail: shans@at.pstu.ru
R. B. Rashevskiy - Student, Perm National Research Polytechnic University
E-mail: roman@rashevskiy.com
Abstract:
The topical issue of information security is necessary for security of information and control systems of critical objects. Apparently the most vulnerable objects are energy and water supply systems, transport management systems, banking systems and nuclear power complex elements. Arrangements for the information security which are currently in use are inefficient to confront modern threats. As the base for construction of information security systems the application of neural network has the most probable potential. At the present day it does not seem possible to achieve the effective operation of these systems in the automated workplace, for this reason it is offered to use the «client/server» architecture. This usage permits the sift of resource-intensive computations and analytical functional from the automated workplace to the central computation module. The central computation module is a hardware device which uses the neural network and accepts information from client agents, automated analysis and decision making, as well as it sends reference orders to client agents. Client agent is a software tool used as a filter for the operating system kernel. It captures references to the operating system kernel with regard to all possible acts of any subsystem. The item to analyze the validity of information exchange is the usage of fuzzy logic which considers the great amount of various factors. The advantage of this decision is the opportunity to implement hardware and software suite without the critical object information infrastructure modifying. The implementation of such hardware and software suite will be instrumental in information security threats and help to prevent highly dangerous situations.
Pages: 31-35
References
- Ukaz Prezidenta RF ot 12 maja 2009 g. № 537 «O Strategii nacionalnojj bezopasnosti Rossijjskojj Federacii do 2020 g.» // Rossijjskaja gazeta. 19 maja 2009 g.
- Pentagon: K 2016 godu kolichestvo sluzhashhikh v kibervojjskakh SSHA uvelichitsja v tri raza // RT na russkom: http://russian.rt.com/article/25844.
- Rashevskijj R.B., SHaburov A.S. Aktualnye ugrozy bezopasnosti informacionno-upravljajushhikh sistem kriticheski vazh-nykh obektov // Nejjrokompjutery: razrabotka, primenenie. 2013. № 11. S. 96-100.
- Kruglov V.V., Dli M.I., Golunov R.JU. Nechetkaja logika i iskusstvennye nejjronnye seti. M.: Fizmatlit. 2001. 221 s.