350 rub
Journal Neurocomputers №10 for 2015 г.
Article in number:
Practical application of neural networks to protect information management systems critical facilities from DDOS-attacks
Authors:
R.B. Rashevskiy - Student, Department of Automation and Telemechanics, Perm National Research Polytechnic University. E-mail: roman@rashevskiy.com A.S. Shaburov - Ph.D. (Eng.), Associate Professor, Department of Automation and Telemechanics, Perm National Research Polytechnic University. E-mail: shans@ at.pstu.ru
Abstract:
The problem of information security of critical facilities is urgent due to a significant increase in the number of targeted cyber-attacks against control informational and telecommunication systems. In this regard, it is necessary to introduce innovative solutions that ensure the effective providing protection of information in information and control systems (ICS). The methods of detection of computer attacks can be attributed with the methods based on the use of neural and immune networks. In this case, for the detection of computer attacks over a period of time there is a training of the neural network when the behavior of computer information system is considered to be normal. The launch of a neural network in the recognition mode occurs after the learning process. Availability of attack determined by the deviation in the recognition of normal behavior in the input stream. Practical application of neural networks to protect information and control systems from DDOS-attacks consists in determining legitimacy of the HTTP-request based on constructed feature-vector at the output of the neural network.
Pages: 16-20
References

 

  1. Abashev A., Pazukhin V., Slyshkin A. Na shag vperedi kiberprestupnikov // Informacionnaja bezopasnost. 2015. № 1. 
  2. S. 8-12.
  3. Dolja vysokoskorostnykh DDoS-atak v 2014 godu vyrosla v neskolko raz. http://www.intalev.ru/agregator/press/id_351594/.
  4. Rashevskijj R.B., SHaburov A.S. O primenenii nejjronnykh setejj dlja obespechenija bezopasnosti informacionno-upravljajushhikh sistem kriticheski vazhnykh obektov // Nejjrokompjutery: razrabotka primenenie. 2014. № 12. 
  5. S. 31-35.
  6. Rashevskijj R.B., SHaburov A.S. Aktualnye ugrozy bezopasnosti informacionno-upravljajushhikh sistem kriticheski vazhnykh obektov // Nejjrokompjutery: razrabotka primenenie. 2013. № 11. S. 96-100.
  7. Mazin A.V., Klochko O.S. Analiz metodov protivodejjstvija ugrozam i atakam na vychislitelnye sistemy. Naukoemkie tekhnologii v priboro- i mashinostroenii i razvitie innovacionnojj dejatelnosti v vuze // Materialy Vseross. nauch.-tekhnich. konf. 2014. T. 3. S. 71-75.
  8. RFC 2616. Hypertext Transfer Protocol - HTTP/1.1 [EHlektronnyjjresurs]. URL: https://tools.ietf.org/html/rfc2616 (Data obrashhenija: 15.05.2015).
  9. Klimov S.M., Sychjov M.P., Astrakhov A.V. Protivodejjstvie kompjuternym atakam. Metodicheskie osnovy: EHlektronnoe ucheb. izdanie. M.: MGTU im. N.EH. Baumana. 2013. 108 s.