Статья 'Анализ средств разработки нейросетевых модулей систем управления инцидентами информационной безопасности' - журнал 'Кибернетика и программирование' - NotaBene.ru
по
Journal Menu
> Issues > Rubrics > About journal > Authors > About the Journal > Requirements for publication > Council of Editors > Peer-review process > Policy of publication. Aims & Scope. > Article retraction > Ethics > Online First Pre-Publication > Copyright & Licensing Policy > Digital archiving policy > Open Access Policy > Open access publishing costs > Article Identification Policy > Plagiarism check policy
Journals in science databases
About the Journal

MAIN PAGE > Back to contents
Cybernetics and programming
Reference:

Analysis of developing tools for neural network modules of management system for information security incidents

Zavodtsev Il'ya Valentinovich

PhD in Technical Science

Associate Professor, Department of information security in automated systems, Military Academy of Communications (branch, Krasnodar)

350007, Russia, Krasnodar, ul. Krasina, 4

nilrs@rambler.ru
Zakharchenko Roman Ivanovich

Associate Professor, Department of information security in automated systems, Military Academy of Communications (branch, Krasnodar)

350007, Russia, Krasnodar, ul. Krasina, 4

romanzakharchenko@yandex.ru
Zakutaev Andrei Andreevich

student, Department of information security in automated systems, Military Academy of Communications (branch, Krasnodar)

350007, Russia, Krasnodar, ul. Krasina, 4

nilrs@rambler.ru

DOI:

10.7256/2306-4196.2014.5.13308

Review date:

02-10-2014


Publish date:

16-10-2014


Abstract: The article shows the analysis of tools for developing neural network modules of management system for information security incidents, reviews its main features in simulation and testing. Specific attention is given to a comparative analysis in terms of usability and neural network modeling features. Development of domestic control systems for information security incidents still is in the state of research and development projects. This, on the one hand, complicates immediate transfer complex solutions for data protection entirely on the domestic base, but, on the other hand, allows taking into account all the latest scientific achievements in the implementation methodological basis for constructing own management system for information security incidents. This fact determines the need for further consideration of methods and techniques for the construction of management systems for information security incidents. Reviewing features of neuropackages and their comparison in terms of ease of use and range of services for modeling neural network systems allowed to determine that in components and the ability to solve the special case of constructing modules such tools as MATLAB and NeuroSolutions are the most suitable applications, offering a greater set of features and having better technical support.


Keywords: information security , incident management , neural network module , neural network architecture , neural networks , tools , management system for information security inciden, simulation , testing , comparative analysis
This article written in Russian. You can find full text of article in Russian here .

References
1.
ГОСТ Р 18044-2007. Информационная технология. Методы и средства обеспечения безопасности. Менеджмент инцидентов информационной безопас-ности.
2.
ГОСТ Р ИСО/МЭК 27001-2006. Информационная технология. Методы и средства обеспечения безопасности. Системы менеджмента ИБ. Требования.
3.
Воронцов, К.В. Алгоритмы кластеризации и многомерного шкалирования. Курс лекций. / К.В. Воронцов – МГУ, 2007.
4.
Заводцев, И.В. Применение нейросетевых методов для управления инци-дентами безопасности информационного и программного обеспечения / Заводцев И.В., Гайнов А.Е. // Труды конгресса по интеллектуальным системам и ин-формаци-онным технологиям AIS-IT’12 : Научное издание в 4-х томах. – Москва: Изд-во Физматлит. – Ч.1. – 2012. – С. 426-428.
5.
Котенко, И. В. Инструментальные средства создания нейросетевых ком-понент интеллектуальных систем защиты информации / Котенко И.В., Нестерук Ф.Г. // Труды СПИИРАН. 2013. – Москва. Вып. 3(26).
Link to this article

You can simply select and copy link from below text field.


Other our sites:
Official Website of NOTA BENE / Aurora Group s.r.o.
"History Illustrated" Website