AUTOMATIC CONTROL AND COMPUTER SCIENCES最新文献

筛选
英文 中文
Early Detection of Network Attacks Based on Weight-Insensitive Neural Networks 基于权重不敏感神经网络的网络攻击早期检测
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2024-02-29 DOI: 10.3103/S014641162308014X
D. S. Lavrova, O. A. Izotova
{"title":"Early Detection of Network Attacks Based on Weight-Insensitive Neural Networks","authors":"D. S. Lavrova,&nbsp;O. A. Izotova","doi":"10.3103/S014641162308014X","DOIUrl":"10.3103/S014641162308014X","url":null,"abstract":"<p>In this paper, we describe an approach for the early detection of network attacks using weight-insensitive neural networks (or weight agnostic neural networks (WANNs). The selection of the type of neural networks is determined by the specifics of their architecture, which provides high data-processing speed and performance, which is significant when solving the problem of the early detection of attacks. The experimental studies demonstrate the effectiveness of the proposed approach, which is based on a combination of multiple regression for selecting features of the training set and WANNs. The accuracy of attack recognition is comparable to the best results in this field with a significant gain in time.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"1047 - 1054"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140888809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Searching for Software Vulnerabilities Using an Ensemble of Algorithms for the Analysis of a Graph Representation of the Code 利用分析代码图表示的算法组合搜索软件漏洞
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080126
G. S. Kubrin, D. P. Zegzhda
{"title":"Searching for Software Vulnerabilities Using an Ensemble of Algorithms for the Analysis of a Graph Representation of the Code","authors":"G. S. Kubrin,&nbsp;D. P. Zegzhda","doi":"10.3103/S0146411623080126","DOIUrl":"10.3103/S0146411623080126","url":null,"abstract":"<p>This article analyzes the existing methods for searching for software vulnerabilities. For methods using deep learning models on a graph representation of the code, the problem of imaginary relationships between procedures is formulated, which complicates their application to code analysis problems. To solve the formulated problem, an iterative method is proposed based on an ensemble of algorithms for analyzing the graph representation of the code. The method relies on a step-by-step narrowing of the set of code sections under consideration to increase the efficiency of using highly computationally complex methods. For the proposed method, a prototype of a system for searching for vulnerabilities for programs based on the .NET platform is presented, tested on a sample of NIST SARD and software with a large amount of code.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"947 - 957"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140888890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Framework for Modeling Security Policies of Big Data Processing Systems 大数据处理系统安全策略建模框架
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080254
M. A. Poltavtseva, D. V. Ivanov, E. V. Zavadskii
{"title":"Framework for Modeling Security Policies of Big Data Processing Systems","authors":"M. A. Poltavtseva,&nbsp;D. V. Ivanov,&nbsp;E. V. Zavadskii","doi":"10.3103/S0146411623080254","DOIUrl":"10.3103/S0146411623080254","url":null,"abstract":"<p>This paper studies automatizing the analysis of access control in big data management systems by modeling security policies. It analyzes modern methods of ensuring access control in this class of systems, determines the respective requirements, and chooses the most advanced method for describing security policies as part of the solution in development. The task of modeling security policies in big data management systems is formulated. The architecture, the main components, and the general operating algorithm of the software framework for solving the task, as well as the experimental validation results, are presented. The strengths and weaknesses of the framework are assessed and ways for its further upgrade suggested.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"1063 - 1070"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140889680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methodological Approach to Construct Models for Predicting Indicators of Properties of Information Security Systems 构建信息安全系统属性指标预测模型的方法论
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080357
D. P. Zegzhda, A. F. Suprun, V. G. Anisimov, A. V. Tebekin, E. G. Anisimov
{"title":"Methodological Approach to Construct Models for Predicting Indicators of Properties of Information Security Systems","authors":"D. P. Zegzhda,&nbsp;A. F. Suprun,&nbsp;V. G. Anisimov,&nbsp;A. V. Tebekin,&nbsp;E. G. Anisimov","doi":"10.3103/S0146411623080357","DOIUrl":"10.3103/S0146411623080357","url":null,"abstract":"<p>A methodological approach to construct models for predicting indicators of properties of information security systems at evolutionary stages of development is proposed. The approach is based on the idea of the development of information security systems as a process of change in the acceptable range of indicators characterizing their properties. It is assumed that the number of resources spent on improving each property is greater the closer the current value of the indicator characterizing this property is to the maximum possible value for the information security system under consideration. This circumstance is taken into account by reducing the relative rates of improvement in indicators as their values approach the maximum possible value.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"881 - 885"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140001809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Method for the Detection of Evasion Attacks Aimed at Machine Learning Systems 检测针对机器学习系统的规避攻击的混合方法
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080072
M. O. Kalinin, A. F. Suprun, O. D. Ivanova
{"title":"Hybrid Method for the Detection of Evasion Attacks Aimed at Machine Learning Systems","authors":"M. O. Kalinin,&nbsp;A. F. Suprun,&nbsp;O. D. Ivanova","doi":"10.3103/S0146411623080072","DOIUrl":"10.3103/S0146411623080072","url":null,"abstract":"<p>The existing methods for the detection of evasion attacks in machine learning systems are analyzed. An experimental comparison of the methods is carried out. The uncertainty method is universal; however, in this method, it is difficult to determine such uncertainty boundaries for adversarial examples that would enable the precise identification of evasion attacks, which would result in lower efficiency parameters with respect to the skip gradient method (SGM) attack, maps of significance (MS) attack, and boundary attack (BA) compared to the other methods. A new hybrid method representing the two-stage input data verification complemented with preliminary processing is developed. In the new method, the uncertainty boundary for adversarial objects has become distinguishable and quickly computable. The hybrid method makes it possible to detect out-of-distribution (OOD) evasion attacks with a precision of not less than 80%, and SGM, MS, and BA attacks with a precision of 93%.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"983 - 988"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140001801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyberattack Detection in the Industrial Internet of Things Based on the Computation Model of Hierarchical Temporal Memory 基于分层时态记忆计算模型的工业物联网网络攻击检测
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080114
V. M. Krundyshev, G. A. Markov, M. O. Kalinin, P. V. Semyanov, A. G. Busygin
{"title":"Cyberattack Detection in the Industrial Internet of Things Based on the Computation Model of Hierarchical Temporal Memory","authors":"V. M. Krundyshev,&nbsp;G. A. Markov,&nbsp;M. O. Kalinin,&nbsp;P. V. Semyanov,&nbsp;A. G. Busygin","doi":"10.3103/S0146411623080114","DOIUrl":"10.3103/S0146411623080114","url":null,"abstract":"<p>This study considers the problem of detecting network anomalies caused by computer attacks in the networks of the industrial Internet of things. To detect anomalies, a new method is proposed, built using a hierarchical temporal memory (HTM) computation model based on the neocortex model. An experimental study of the developed method of detecting computer attacks based on the HTM model showed the superiority of the developed solution over the LSTM analog. The developed prototype of the anomaly detection system provides continuous training on unlabeled data sets in real time, takes into account the current network context, and applies the accumulated experience by supporting the memory mechanism.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"1040 - 1046"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140888817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Machine Learning Methods to the Problem of Searching for a Region of Interest for Biometric Identification Based on the Pattern of Palm Veins 将机器学习方法应用于基于手掌静脉模式的生物识别感兴趣区搜索问题
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080023
A. I. Almuhamedov, V. S. Kolomoitcev
{"title":"Application of Machine Learning Methods to the Problem of Searching for a Region of Interest for Biometric Identification Based on the Pattern of Palm Veins","authors":"A. I. Almuhamedov,&nbsp;V. S. Kolomoitcev","doi":"10.3103/S0146411623080023","DOIUrl":"10.3103/S0146411623080023","url":null,"abstract":"<p>This paper discusses the problem of searching for a region of interest for biometric identification based on the pattern of palm veins. An image segmentation method is proposed based on the use of convolutional neural networks (CNNs) to search for a region of interest. The operation of this method is compared with methods that use the features of a binarized image, and in particular, with the method of searching for the local minima and searching for the minimum threshold value.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"1126 - 1134"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140888821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Defense against Adversarial Attacks on Image Recognition Systems Using an Autoencoder 利用自动编码器防御对图像识别系统的恶意攻击
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080230
V. V. Platonov, N. M. Grigorjeva
{"title":"Defense against Adversarial Attacks on Image Recognition Systems Using an Autoencoder","authors":"V. V. Platonov,&nbsp;N. M. Grigorjeva","doi":"10.3103/S0146411623080230","DOIUrl":"10.3103/S0146411623080230","url":null,"abstract":"<p>Adversarial attacks on artificial neural network systems for image recognition are considered. To improve the security of image recognition systems against adversarial attacks (evasion attacks), the use of autoencoders is proposed. Various attacks are considered and software prototypes of autoencoders of full-link and convolutional architectures are developed as means of defense against evasion attacks. The possibility of using developed prototypes as a basis for designing autoencoders more complex architectures is substantiated.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"989 - 995"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140888886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Finding Enumerators for Generalized (L, G)-Code 为广义(L,G)代码寻找枚举器
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080187
I. K. Noskov, S. V. Bezzateev
{"title":"Finding Enumerators for Generalized (L, G)-Code","authors":"I. K. Noskov,&nbsp;S. V. Bezzateev","doi":"10.3103/S0146411623080187","DOIUrl":"10.3103/S0146411623080187","url":null,"abstract":"<p>The algorithm for finding the enumerators of degree 2 and higher for the generalized (<i>L</i>, <i>G</i>)‑code is presented. This algorithm makes it possible to enhance the rate of finding enumerators as distinct from the exhaustive search algorithm. It can be used to construct a modern variant of the McEliece cryptosystem. The presented solution is based on using the representation of the Galois field element via the function containing the coefficients of a smaller field. In addition, the results of comparison of the modern McEliece cryptosystem constructed based on the Goppa codes and generalized (<i>L</i>, <i>G</i>)-codes are presented.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"922 - 927"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142414877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Decompiled Program Code Using Abstract Syntax Trees 使用抽象语法树分析反编译程序代码
IF 0.6
AUTOMATIC CONTROL AND COMPUTER SCIENCES Pub Date : 2024-02-29 DOI: 10.3103/S0146411623080060
N. A. Gribkov, T. D. Ovasapyan, D. A. Moskvin
{"title":"Analysis of Decompiled Program Code Using Abstract Syntax Trees","authors":"N. A. Gribkov,&nbsp;T. D. Ovasapyan,&nbsp;D. A. Moskvin","doi":"10.3103/S0146411623080060","DOIUrl":"10.3103/S0146411623080060","url":null,"abstract":"<p>This article proposes a method for preprocessing fragments of binary program codes for subsequent detection of their similarity using machine learning methods. The method is based on the analysis of pseudocode obtained as a result of decompiling fragments of binary codes. The analysis is performed using attributed abstract syntax trees (AASTs). As part of the study, testing and comparative analysis of the effectiveness of the developed method are carried out. This method makes it possible to increase the efficiency of detecting functionally similar fragments of program code, compared to analogs, by using the semantic context of vertices in abstract syntax trees.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"57 8","pages":"958 - 967"},"PeriodicalIF":0.6,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140888807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信