General concept for detecting intrusions of unknown type based on neural networks

Simon Zhorzhevich Simavoryan, A. Simonyan, G. Popov, E. Ulitina
{"title":"General concept for detecting intrusions of unknown type based on neural networks","authors":"Simon Zhorzhevich Simavoryan, A. Simonyan, G. Popov, E. Ulitina","doi":"10.7256/2454-0714.2021.4.37072","DOIUrl":null,"url":null,"abstract":"\n This article is dedicated to the problem of detecting intrusions of unknown type based on neural networks that bypass the system of information security in automated data processing systems and are not recognized as spiteful. Development of the means, methods and measures for detecting or preventing such hidden attacks is of particular relevance. Methodological research on the development of procedure for detecting intrusions are based on the achievements of systemic analysis, systemic-conceptual approach towards protection of information in automated data processing systems and achievements of the theory of neural systems in the area of ensuring information security. The object of this research is the intrusions of unknown type in automated data processing systems. The subject is the neural networks, namely neural networks of direct action. The main result lies in the development of neural network of direct action in form of the diagram of neural network links for detecting intrusions. For solving this task, the author developed: 1) The system of input indicators of the neural system;                2) Scales for the assessment of values of the formed indicators; 3)  General procedure for detecting intrusions based on neural networks, the essence of which consists in implementation of the following sequence of actions: a) formation of the list of all the main parties to the process of detection of intrusion; b) formation of the set of parameters that characterize each of them; c) formation of the set of numerical characteristics for each parameter using the assessment scales of the formed indicators; d) analysis of the parameters of the configuration of neural network The developed procedure may serve as the basic in further practical developments of the concept of detecting intrusions of unknown types based on neural networks.\n","PeriodicalId":155484,"journal":{"name":"Программные системы и вычислительные методы","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Программные системы и вычислительные методы","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.7256/2454-0714.2021.4.37072","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

This article is dedicated to the problem of detecting intrusions of unknown type based on neural networks that bypass the system of information security in automated data processing systems and are not recognized as spiteful. Development of the means, methods and measures for detecting or preventing such hidden attacks is of particular relevance. Methodological research on the development of procedure for detecting intrusions are based on the achievements of systemic analysis, systemic-conceptual approach towards protection of information in automated data processing systems and achievements of the theory of neural systems in the area of ensuring information security. The object of this research is the intrusions of unknown type in automated data processing systems. The subject is the neural networks, namely neural networks of direct action. The main result lies in the development of neural network of direct action in form of the diagram of neural network links for detecting intrusions. For solving this task, the author developed: 1) The system of input indicators of the neural system;                2) Scales for the assessment of values of the formed indicators; 3)  General procedure for detecting intrusions based on neural networks, the essence of which consists in implementation of the following sequence of actions: a) formation of the list of all the main parties to the process of detection of intrusion; b) formation of the set of parameters that characterize each of them; c) formation of the set of numerical characteristics for each parameter using the assessment scales of the formed indicators; d) analysis of the parameters of the configuration of neural network The developed procedure may serve as the basic in further practical developments of the concept of detecting intrusions of unknown types based on neural networks.
基于神经网络的未知类型入侵检测的一般概念
本文研究了自动化数据处理系统中基于神经网络的未知类型入侵检测问题,这些入侵绕过信息安全系统,不被识别为恶意入侵。发展侦测或预防这种隐蔽攻击的手段、方法和措施是特别重要的。开发入侵检测程序的方法学研究是基于自动化数据处理系统中信息保护的系统分析成果、系统概念方法和确保信息安全领域神经系统理论的成果。本文的研究对象是自动化数据处理系统中未知类型的入侵。主题是神经网络,即直接作用的神经网络。主要成果是发展了直接作用的神经网络,以神经网络链路图的形式进行入侵检测。为了解决这一问题,作者开发了:1)神经系统的输入指标系统;2)形成的指标值的评估尺度;3)基于神经网络的入侵检测的一般程序,其实质是实现以下一系列动作:a)形成入侵检测过程中所有主要参与方的列表;B)形成表征它们每一个的参数集;C)利用所形成指标的评价尺度,形成各参数的数值特征集;所开发的程序可以作为基于神经网络的未知类型入侵检测概念的进一步实际发展的基础。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信