{"title":"Method of protection of personal data in its processing in information system based on the artificial neural network","authors":"I. Kozin, Llc «Sigma»","doi":"10.34219/2078-8320-2021-12-4-54-59","DOIUrl":null,"url":null,"abstract":"One of the most actively developing areas of information security is the User Behavior Analytics. This paper presents a method of detecting anomalies in the behavior of an information system user has been developed, based on the use of an artificial neural network that signals the commission of illegal actions. Users behavior characteristics had been offered to use sample input values: access time; duration of work performed; place of access; a set of data with which the user works; list of actions taken. An approach to assigning numeric values to user characteristics is proposed, based on the fuzzy set theory and One-Hot Encoding method. Method provides more effective detecting abnormalities in user behavior than analyze by information security specialist without using the special automation tools.","PeriodicalId":299496,"journal":{"name":"Informatization and communication","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Informatization and communication","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.34219/2078-8320-2021-12-4-54-59","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
One of the most actively developing areas of information security is the User Behavior Analytics. This paper presents a method of detecting anomalies in the behavior of an information system user has been developed, based on the use of an artificial neural network that signals the commission of illegal actions. Users behavior characteristics had been offered to use sample input values: access time; duration of work performed; place of access; a set of data with which the user works; list of actions taken. An approach to assigning numeric values to user characteristics is proposed, based on the fuzzy set theory and One-Hot Encoding method. Method provides more effective detecting abnormalities in user behavior than analyze by information security specialist without using the special automation tools.