Abstract

There are major challenges for effective strategies for intelligent systems architecture and integration, risk management and validation in engineering and network systems. This includes the challenges in designing intelligent engineering systems to reduce false positives and increases detection capability of intrusion detection systems (IDSs). The high percentage of alerts and false positives generated by IDSs are among the significant problems. We present intelligent systems architecture and integration, including risk management and validation for reduction of false positives and infrastructure protection using a novel approach using adaptive responses from firewall packet filters in what we call, network quarantine channels (NQC). This includes risk assessments and design of integrated virtual private networks (VPNs) and strategic controls via packet filters, which collaborate with the NQC to reply to suspicious hosts, and them deny access to sensitive data servers in the infrastructure. The firewall packet filters provide effective intelligent responses by to granting access to the normal packets and denying malicious traffic access to the network, after the identity of the connections are verified through the statistical analysis in the NQC. These effective strategies reduce false positives and increases detection capability of the IDS. The intelligent systems at the system-of-systems level include systems modeling and simulation, systems engineering education, training, quality management for intrusion detection, computer security and disaster response. The validation includes statistical analysis and modeling of systems integration for handling large-scale and complex systems in emerging commercial networks. This includes large-scale systems integration various applications for technology transfer between academia and industry, and applicable to communications systems, medical systems, management and sustainability. The paper examines issues in robust design, factors, safety, security and usability, and transitions from design to production, deployment and use, quality control and system management and management interactions, risk management and systems architecture.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call