Skip to main navigation menu Skip to main content Skip to site footer

ON THE CONCEPT OF CREATING INTELLIGENT INFORMATION SECURITY SYSTEMS BASED ON NEURAL NETWORK INTRUSION DETECTION SYSTEMS

Abstract

The subject of research is the concept of creating intelligent information security systems based on neural network intrusion detection systems (IDS) in cyberspace. In research, flexibility, learning, and controllability are considered key conceptual requirements for an IDS system. Special attention is paid to the construction of a flexible intelligent information security system, including IDS, both in the nodes of the system components and in the data transmission networks between the components. Methodological research on the selected research area can be carried out using artificial intelligence, systematic analysis methods and the theory of intelligent information systems in the field of artificial intelligence. The research uses the achievements of the systematic-conceptual approach to information protection in the system. The main result of the research is that the successful protection of information in the system can be implemented only in the form of interconnected local systems using neural network technologies integrated into a single center based on a systematic-conceptual approach. The need to use a single systematic approach based on uniform legal, organizational and technical measures for information protection is based on the need to combat unauthorized attacks. It is considered that the application of a systematic-conceptual approach to the creation of IDS based on neural network technologies will help to develop new tools, methods and measures for the intelligent management of information security in the system.

PDF

References

  1. Khraisat, A., Gondal, I., Vamplew, P. et al. Survey of intrusion detection systems: techniques, datasets and challenges. Cybersecur 2, 20 (2019). https://doi.org/10.1186/s42400-019-0038-7
  2. Reddy S. S. T., Shyam G. K. A machine learning based attack detection and mitigation using a secure SaaS framework //Journal of King Saud University-Computer and Information Sciences. – 2022. – Т. 34. – №. 7. – С. 4047-4061.
  3. Kabulov A. et al. Algorithmic method of security of the Internet of Things based on steganographic coding //2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS). – IEEE, 2021. – С. 1-5.
  4. Kabulov A., Kalandarov I., Yarashov I. Problems of algorithmization of control of complex systems based on functioning tables in dynamic control systems //2021 International Conference on Information Science and Communications Technologies (ICISCT). – IEEE, 2021. – С. 1-4.
  5. A. Kabulov, I. Saymanov, I. Yarashov and A. Karimov, "Using Algorithmic Modeling to Control User Access Based on Functioning Table," 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Toronto, ON, Canada, 2022, pp. 1-5, doi: 10.1109/IEMTRONICS55184.2022.9795850.
  6. A. Kabulov, I. Normatov, I. Kalandarov and I. Yarashov, "Development of An Algorithmic Model And Methods For Managing Production Systems Based On Algebra Over Functioning Tables," 2021 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, Uzbekistan, 2021, pp. 1-4, doi: 10.1109/ICISCT52966.2021.9670307.
  7. A. Kabulov and I. Yarashov, "Mathematical model of Information Processing in the Ecological Monitoring Information System," 2021 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, Uzbekistan, 2021, pp. 1-4, doi: 10.1109/ICISCT52966.2021.9670192.
  8. A. Kabulov, I. Yarashov and A. Otakhonov, "Algorithmic Analysis of the System Based on the Functioning Table and Information Security," 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), Toronto, ON, Canada, 2022, pp. 1-5, doi: 10.1109/IEMTRONICS55184.2022.9795746.
  9. Kabulov A. V. et al. COMPUTER VIRUSES AND VIRUS PROTECTION PROBLEMS //Science and Education. – 2020. – Т. 1. – №. 9. – С. 179-184.
  10. Madrahimova D., Yarashov I. Limited in solving problems of computational mathematics the use of elements //Science and Education. – 2020. – Т. 1. – №. 6. – С. 7-14.
  11. Yarashov I. Algorithmic Formalization Of User Access To The Ecological Monitoring Information System //2021 International Conference on Information Science and Communications Technologies (ICISCT). – IEEE, 2021. – С. 1-3.
  12. Kabulov A. et al. Algorithmic method of security of the Internet of Things based on steganographic coding. 2021 IEEE International IOT //Electronics and Mechatronics Conference, IEMTRONICS.–2021. – 2021.
  13. Kabulov A., Muhammadiyev F., Yarashov I. Analysis of information system threats //Science and Education. – 2020. – Т. 1. – №. 8. – С. 86-91.
  14. Kabulov A., Yarashov I., Vasiyeva D. Security Threats and Challenges in Iot Technologies //Science and Education. – 2021. – Т. 2. – №. 1. – С. 170-178.
  15. Gaynazarov S. M. et al. Algorithm of mobile application for medicine search //Science and Education. – 2020. – Т. 1. – №. 8. – С. 600-605.
  16. Yarashov I., Normatov I., Mamatov A. The structure of the ecological information processing database and its organization //International Conference on Multidimensional Research and Innovative Technological Analyses. – 2022. – С. 114-117.
  17. Yarashov I., Normatov I., Mamatov A. Ecological information processing technologies and information security //International Conference on Multidimensional Research and Innovative Technological Analyses. – 2022. – С. 73-76.
  18. Kabulov A., Yarashov I., Mirzataev S. Development of the implementation of IoT monitoring system based on Node-Red technology //Karakalpak Scientific Journal. – 2022. – Т. 5. – №. 2. – С. 55-64.
  19. Кабулов А. В., Болтаев Ш. Т. АЛГОРИТМИЧЕСКИЕ АВТОМАТНЫЕ МОДЕЛИ И МЕТОДЫ СОЗДАНИЯ РАСПРЕДЕЛЕННЫХ МИКРОПРОЦЕССОРНЫХ СИСТЕМ УПРАВЛЕНИЯ И ИНФОРМАЦИОННОЙ БЕЗОПАСНОСТИ.
  20. I. Yarashov, "Development of a reliable method for grouping users in user access control based on a Functioning table," 2022 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, Uzbekistan, 2022, pp. 1-5, doi: 10.1109/ICISCT55600.2022.10146787.
  21. S. Toshmatov, I. Yarashov, A. Otakhonov and A. Ismatillayev, "Designing an algorithmic formalization of threat actions based on a Functioning table," 2022 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, Uzbekistan, 2022, pp. 1-5, doi: 10.1109/ICISCT55600.2022.10146987.
  22. I. Normatov, I. Yarashov, A. Otakhonov and B. Ergashev, "Construction of reliable well distribution functions based on the principle of invariance for convenient user access control," 2022 International Conference on Information Science and Communications Technologies (ICISCT), Tashkent, Uzbekistan, 2022, pp. 1-5, doi: 10.1109/ICISCT55600.2022.10146952.
  23. Бабаджанов А. Ф. и др. Алгоритмический анализ системы защиты информации на основе таблиц функционирования //International Journal of Contemporary Scientific and Technical Research. – 2022. – С. 216-219.
  24. Normatov I., Yarashov I., Boboqulov B. Development of models for describing the processing of environmental information in security problems of controlling a protection system based on Petri nets //Central Asian journal of mathematical theory and computer sciences. – 2022. – Т. 3. – №. 12. – С. 229-239.
  25. Kabulov A., Yarashov I., Daniyarov B. Systematic analysis of blockchain data storage and sharing technology //Central Asian journal of mathematical theory and computer sciences. – 2022. – Т. 3. – №. 12. – С. 240-247.
  26. Jumaniyozov Z. G. et al. Checking the condition of the shutter in the water distribution system using a laser sensor //Science and Education. – 2023. – Т. 4. – №. 6. – С. 430-435.
  27. Jumaboyeva A., Yarashov I. Maxsus maktabgacha ta’lim tashkilotlarida nutqida nuqsoni bo‘lgan bolalarni axborot texnologiyalari asosida pedagogik metodlar orqali tahlil qilish// O'zbekistonda ilmiy - amaliy tadqiqotlar mavzusida Respublika 17-ko'p tarmoqli ilmiy masofaviy onlayn konferentsiya.-2020.-C.249-250.