Algorithm for identifying threats to information security in distributed multiservice networks of government bodies

نویسندگان

چکیده

The results of studies are presented, the purpose which was to develop an algorithm for identifying information security threats in distributed multiservice networks that provide interaction regional government bodies, as well their communication with population region. relevance research topic is due a significant increase various types cyber attacks on computer public authorities and need level these by intellectualizing methods combating threats. based use machine learning analyze incoming traffic order identify events affect state authorities. provides input preprocessing, result set images (signatures) obtained from Wasm binary files formed, then image classifier launched. It contains sequential inclusion deep neural – convolutional network signature classification recurrent processes sequences at output network. Features formation signatures proposed algorithm, network, make it possible obtain resulting assessment security, taking into account history its current state. aggregated comparing actual those available database. aggregation performed fuzzy inference system second type, using implication according Mamdani generates final Software developed implements experiments were carried out synthetic data set, showed efficiency confirmed feasibility further improvement.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Users as the Biggest Threats to Security of Health Information Systems

There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...

متن کامل

Identifying and Ranking Technology-Telecommunications Context of Information Security anagement System in E-Government Using Fuzzy AHP Approach

In recent years, many security threats have entered into the organizations’ information and changed the  organizational performance resulting in their exorbitant costs. This question is of particular importanceabout government agencies that use information and Internet systems. This issue enabled the top managers of organizations to implement a security system and minimize these costs. Using In...

متن کامل

Identifying Information Security Risk Components in Military Hospitals in Iran

Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...

متن کامل

fault location in power distribution networks using matching algorithm

چکیده رساله/پایان نامه : تاکنون روش‏های متعددی در ارتباط با مکان یابی خطا در شبکه انتقال ارائه شده است. استفاده مستقیم از این روش‏ها در شبکه توزیع به دلایلی همچون وجود انشعاب‏های متعدد، غیر یکنواختی فیدرها (خطوط کابلی، خطوط هوایی، سطح مقطع متفاوت انشعاب ها و تنه اصلی فیدر)، نامتعادلی (عدم جابجا شدگی خطوط، بارهای تک‏فاز و سه فاز)، ثابت نبودن بار و اندازه گیری مقادیر ولتاژ و جریان فقط در ابتدای...

Information Security Policy for E-government in Saudi Arabia: Effectiveness, Vulnerabilities and Threats

This study focuses on the issue of information security policy for e-government in Saudi Arabia. It evaluates the three fundamental pillars that determine data security such as effectiveness, vulnerabilities, and threats. The paper is seeking to reveal the risks of information security policy for e-government in Saudi Arabia as well as to examine the vulnerabilities and the effectiveness of the...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: ?????????? ???????????

سال: 2023

ISSN: ['0131-8942', '2524-2555']

DOI: https://doi.org/10.37791/2687-0649-2023-18-2-85-102