Immune-like procedure for functionality of the system of information security in automated data processing systems in the context of countering internal threats

Simon Zhorzhevich Simavoryan, A. Simonyan, G. Popov, E. Ulitina
{"title":"Immune-like procedure for functionality of the system of information security in automated data processing systems in the context of countering internal threats","authors":"Simon Zhorzhevich Simavoryan, A. Simonyan, G. Popov, E. Ulitina","doi":"10.25136/2409-7543.2021.3.36228","DOIUrl":null,"url":null,"abstract":"\n The subject of this research is the system of creating mechanisms of information from internal threats in automated data processing systems similar to the mechanism of human immunity. The object of this research is the mechanism of human immunity and systems of ensuring information security in automated data processing systems. The goal of this work lies in the development of the universal scheme of functionality of the mechanism of human immunity against internal threats in form of the procedure, and develop on its basis the immune-like scheme for countering internal threats applicable to the systems of ensuring information security. Methodological research on the development of procedure for detecting internal threats in the mechanism of human immunity is carried out via the methods of systemic analysis in area of ensuring information security. Special attention is given to such aspects as consistency and adaptability of the mechanisms of human immunity applicable to the systems of ensuring information security. This article introduces the new solution to the task of adapting the universal scheme of functionality of the immune system in countering internal threats in the systems of ensuring information security based on the principle of demarcation of the elements to “known/alien” and implementation of the procedure to “destroy” threat, the so-called “Trogotcytosis” (“gnaw”). The developed procedures may serve as the basic schemes in further practical studies of the immune-like systems of ensuring informations security.\n","PeriodicalId":150406,"journal":{"name":"Вопросы безопасности","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2021-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Вопросы безопасности","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.25136/2409-7543.2021.3.36228","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The subject of this research is the system of creating mechanisms of information from internal threats in automated data processing systems similar to the mechanism of human immunity. The object of this research is the mechanism of human immunity and systems of ensuring information security in automated data processing systems. The goal of this work lies in the development of the universal scheme of functionality of the mechanism of human immunity against internal threats in form of the procedure, and develop on its basis the immune-like scheme for countering internal threats applicable to the systems of ensuring information security. Methodological research on the development of procedure for detecting internal threats in the mechanism of human immunity is carried out via the methods of systemic analysis in area of ensuring information security. Special attention is given to such aspects as consistency and adaptability of the mechanisms of human immunity applicable to the systems of ensuring information security. This article introduces the new solution to the task of adapting the universal scheme of functionality of the immune system in countering internal threats in the systems of ensuring information security based on the principle of demarcation of the elements to “known/alien” and implementation of the procedure to “destroy” threat, the so-called “Trogotcytosis” (“gnaw”). The developed procedures may serve as the basic schemes in further practical studies of the immune-like systems of ensuring informations security.
在应对内部威胁的背景下,自动数据处理系统中信息安全系统功能的免疫程序
本研究的主题是在类似于人体免疫机制的自动化数据处理系统中创建来自内部威胁的信息机制的系统。本研究的对象是自动化数据处理系统中人体免疫机制和信息安全保障系统。这项工作的目标是制定以程序形式应对内部威胁的人类免疫机制的通用功能方案,并在其基础上制定适用于确保信息安全系统的应对内部威胁的类似免疫方案。通过信息安全保障领域的系统分析方法,对人体免疫机制内部威胁检测程序的制定进行了方法学研究。特别关注适用于信息安全保障系统的人体免疫机制的一致性和适应性等方面。本文介绍了新的解决方案,以适应免疫系统功能的普遍方案,在确保信息安全的系统中应对内部威胁的任务,基于“已知/外来”要素的划分原则和实施“摧毁”威胁的程序,即所谓的“Trogotcytosis”(“啃咬”)。所开发的程序可作为保障信息安全的类免疫系统进一步实际研究的基本方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信