N. Boldyrikhin, O. Safaryan, P. Razumov, V. Porksheyan, I. Smirnov, D. Korochentsev, L. Cherckesova, Artem M. Romanov
{"title":"基于网络对象监控的入侵检测系统资源控制","authors":"N. Boldyrikhin, O. Safaryan, P. Razumov, V. Porksheyan, I. Smirnov, D. Korochentsev, L. Cherckesova, Artem M. Romanov","doi":"10.1109/ICCAIS48893.2020.9096741","DOIUrl":null,"url":null,"abstract":"The article is devoted to the optimization of intrusion detection system resources when monitoring a set of network objects. The application of the approach proposed in the article makes it possible to optimally distribute the computing resources of an information system between several objects of a network infrastructure based on the available a priori information about these objects. The scientific novelty lies in the fact that the proposed approach allows us to adapt the mathematical apparatus of the theory of observation control to the tasks of providing information protection for communication networks.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"Controlling the Resources of the Intrusion Detection System at Network Objects Monitoring\",\"authors\":\"N. Boldyrikhin, O. Safaryan, P. Razumov, V. Porksheyan, I. Smirnov, D. Korochentsev, L. Cherckesova, Artem M. Romanov\",\"doi\":\"10.1109/ICCAIS48893.2020.9096741\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The article is devoted to the optimization of intrusion detection system resources when monitoring a set of network objects. The application of the approach proposed in the article makes it possible to optimally distribute the computing resources of an information system between several objects of a network infrastructure based on the available a priori information about these objects. The scientific novelty lies in the fact that the proposed approach allows us to adapt the mathematical apparatus of the theory of observation control to the tasks of providing information protection for communication networks.\",\"PeriodicalId\":422184,\"journal\":{\"name\":\"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)\",\"volume\":\"15 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCAIS48893.2020.9096741\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCAIS48893.2020.9096741","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Controlling the Resources of the Intrusion Detection System at Network Objects Monitoring
The article is devoted to the optimization of intrusion detection system resources when monitoring a set of network objects. The application of the approach proposed in the article makes it possible to optimally distribute the computing resources of an information system between several objects of a network infrastructure based on the available a priori information about these objects. The scientific novelty lies in the fact that the proposed approach allows us to adapt the mathematical apparatus of the theory of observation control to the tasks of providing information protection for communication networks.