Abstract

Introduction . To increase the decision-making efficiency at the enterprise, it is advisable to use a special software package of intellectual support. Such a product is necessary when designing an information security system and increasing its invulnerability during modernization or configuration changes. Research objectives are as follows: to develop an algorithm and a mathematical model of the software package for intellectual decision support. Materials and Methods . The decision support method under designing an information security system is based on the use of a neural network (multilayer perceptron). For an objective assessment of the initial security of an information system (IS), a mathematical model for the analysis of security events is developed. Results . The statistics of malicious attacks on the IS of enterprises is analyzed. The need for timely and accurate modernization of the information protection system is determined. Important characteristics of the designing an information security system are the speed at which the result is obtained and the reduction in the residual risk of IS. In this regard, the use of artificial intelligence systems in the process of determining the best set of protection subsystems is important. The threats to cyber security (CS) are classified. The main classes of security events are defined. A mathematical model of the neural network is developed; the input parameters of its operation are indicated. The current enterprise IS generates numerous events which necessitates the automatic collection and analysis of data from subsystems for registering IS objects. The process of analyzing security events is considered in detail since the adequacy of the generated design decisions depends on the correctness of the data obtained in this way. The algorithm of the software package is formed. Discussion and Conclusions . The results can be used in the design of the information security system at the enterprise. In addition, CS administrators can use the developed software package to adjust the configuration settings of information security tools. The proposed solution will minimize the destructive influence of the developer of the security system which may and happen to be subjective.

Highlights

  • To increase the decision-making efficiency at the enterprise, it is advisable to use a special software package of intellectual support

  • The decision support method under designing an information security system is based on the use of a neural network

  • Important characteristics of the designing an information security system are the speed at which the result is obtained and the reduction in the residual risk of information system (IS)

Read more

Summary

ТЕХНИКА И УПРАВЛЕНИЕ

Для повышения оперативности принятия решений на предприятии целесообразно использовать специальный программный комплекс интеллектуальной поддержки. Цели исследования: создание алгоритма и математической модели программного комплекса интеллектуальной поддержки принятия решений. Метод поддержки принятия решений при проектировании системы защиты информации базируется на использовании нейронной сети (многослойный персептрон). Для объективной оценки исходной защищенности информационной системы (ИС) сформирована математическая модель анализа событий безопасности. Полученные результаты могут быть использованы при проектировании системы защиты информации на предприятии. А. Алгоритм работы программного комплекса интеллектуальной поддержки принятия решений при проектировании системы защиты информации на предприятии / Е. Финансирование: работа выполнена при финансовой поддержке молодых российских ученых Советом по грантам Президента Российской Федерации в рамках НИР «Построение модели интеллектуальной поддержки принятия решений при проектировании системы защиты информации на предприятии». Алгоритм работы программного комплекса интеллектуальной поддержки принятия решений Vitenburg E. A. et al Algorithm of software package of intellectual decision support when designing cyber security system at the enterprise

Introduction
MMMMMMMMMMMMMM MMCCMMCCMMMMmmMMMMDDDDDDMMMMMM
Описывается множество аномальных событий
Оценка событий нет Все события
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call