Information security management based on intelligent technologies

Authors

DOI:

https://doi.org/10.15587/2312-8372.2014.32792

Keywords:

information and telecommunication network, intelligent technology, threats, neural network

Abstract

The analysis of information and telecommunication networks of new generation is shown in the article. It is proved that security in the ITN has significant differences from the security-specific information in any specified system. Creation of security in ITN, oriented to work with incomplete or fuzzy initial information, uncertainty of external influences and environmental performance, requires the involvement of non-traditional approaches to safety management in ITN using methods and techniques of artificial intelligence. The aim of research was developing the scientific bases of situational safety management in ITN on the base of intelligent technologies. The generalized structure of intelligent security management is given. The structure of neural evaluation of the safety in ITN is presented and the principle of operation is described. The research results can be used by specialists in the field of security of information and telecommunication systems and networks. The developed basis of situational safety management in the ITN can be taken into account in the developing of advanced safety systems in ITN on the base of intelligent technologies.

Author Biography

Юрій Іванович Хлапонін, National Aviation University, 1, Avenue Kosmonavta Komarova, Kyiv, Ukraine, 03680

Candidate of Technical Sciences, Senior Research Fellow, Associate Professor

Department information security

References

  1. Pinnes, E. L. (2000). Operations and Management for Next Generation Network. 2000 Asia-Pacific Network Operations and Management Symposium "New Management Paradigms and Technologies Towards the Internet Millennium", 11-13 October 2000, Nara-Ken New Public Hall, Nara, Japan. Available: http://www.ieice.or.jp/cs/tm/apnoms/2000/tutorial.htm. Last accessed 15.11.2014.
  2. Nove pokolinnia bezdrotovykh merezh 5G! (31.01.2014). Available: http://consumer.huawei.com/ua/news/show_one/27
  3. Khlaponin, Yu. I., Ovsiannikov, V. V., Palamarchuk, N. A. (2011). Zahalni kharakterystyky zahroz v kiberprostori. Priorytetni napriamky rozvytku telekomunikatsiinykh system ta merezh spetsialnoho pryznachennia: VI nauk.- prakt. sem. Viiskovoho instytutu telekomunikatsii ta informatyzatsii NTUU “KPI”, 20 zhovtnia 2011 r. K., 157.
  4. Artemenko, M. Yu., Berkman, L. N., Toliupa, S. V. (2007). Neironni merezhi ta yikh zastosuvannia v telekomunikatsiinykh systemakh. Radiotekhnika, V. 134, 45–53.
  5. Baklanov, I. G. (2008). NGN: printsipy postroeniia i organizatsii. M.: Eko–Trendz, 468.
  6. Gerasimov, B. M., Tarasov, V. A., Tokarev, I. V. (1993). Cheloveko–mashinnye sistemy priniatiia reshenii s elementami iskusstvennogo intellekta. K.: Naukova dumka, 168.
  7. Makarov, I. M. (2005). Intellektual'nye sistemy avtomaticheskogo upravleniia. M.: Fizmatpit, 573.
  8. Pospelov, D. A., Stefaniuk, V. P. (1986). Iskusstvennyi intellekt v zarubezhnyh issledovaniiah. Informatsionnye materialy. Kibernetika, 3, 3-25.
  9. Hlaponin, I. Yu., Korneichuk, N. P., Zaritsky, A. F., Bryntsev, A. P. (USSR). (16.05.91). A. c. 1663661 USSR. Device for Pattern Recognition Learning. 4944920/24, Appl. 18/11/90.
  10. Kleinrok, L. (1979). Teoriia massovogo obsluzhivaniia. M.: Mashinostroenie, 342.

Published

2014-12-23

How to Cite

Хлапонін, Ю. І. (2014). Information security management based on intelligent technologies. Technology Audit and Production Reserves, 6(4(20), 47–50. https://doi.org/10.15587/2312-8372.2014.32792

Issue

Section

Information technology and control systems