Algorithm for identifying threats to information security in distributed multiservice networks of government bodies
نویسندگان
چکیده
The results of studies are presented, the purpose which was to develop an algorithm for identifying information security threats in distributed multiservice networks that provide interaction regional government bodies, as well their communication with population region. relevance research topic is due a significant increase various types cyber attacks on computer public authorities and need level these by intellectualizing methods combating threats. based use machine learning analyze incoming traffic order identify events affect state authorities. provides input preprocessing, result set images (signatures) obtained from Wasm binary files formed, then image classifier launched. It contains sequential inclusion deep neural – convolutional network signature classification recurrent processes sequences at output network. Features formation signatures proposed algorithm, network, make it possible obtain resulting assessment security, taking into account history its current state. aggregated comparing actual those available database. aggregation performed fuzzy inference system second type, using implication according Mamdani generates final Software developed implements experiments were carried out synthetic data set, showed efficiency confirmed feasibility further improvement.
منابع مشابه
Users as the Biggest Threats to Security of Health Information Systems
There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...
متن کاملIdentifying and Ranking Technology-Telecommunications Context of Information Security anagement System in E-Government Using Fuzzy AHP Approach
In recent years, many security threats have entered into the organizations’ information and changed the organizational performance resulting in their exorbitant costs. This question is of particular importanceabout government agencies that use information and Internet systems. This issue enabled the top managers of organizations to implement a security system and minimize these costs. Using In...
متن کاملIdentifying Information Security Risk Components in Military Hospitals in Iran
Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...
متن کاملfault location in power distribution networks using matching algorithm
چکیده رساله/پایان نامه : تاکنون روشهای متعددی در ارتباط با مکان یابی خطا در شبکه انتقال ارائه شده است. استفاده مستقیم از این روشها در شبکه توزیع به دلایلی همچون وجود انشعابهای متعدد، غیر یکنواختی فیدرها (خطوط کابلی، خطوط هوایی، سطح مقطع متفاوت انشعاب ها و تنه اصلی فیدر)، نامتعادلی (عدم جابجا شدگی خطوط، بارهای تکفاز و سه فاز)، ثابت نبودن بار و اندازه گیری مقادیر ولتاژ و جریان فقط در ابتدای...
Information Security Policy for E-government in Saudi Arabia: Effectiveness, Vulnerabilities and Threats
This study focuses on the issue of information security policy for e-government in Saudi Arabia. It evaluates the three fundamental pillars that determine data security such as effectiveness, vulnerabilities, and threats. The paper is seeking to reveal the risks of information security policy for e-government in Saudi Arabia as well as to examine the vulnerabilities and the effectiveness of the...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ?????????? ???????????
سال: 2023
ISSN: ['0131-8942', '2524-2555']
DOI: https://doi.org/10.37791/2687-0649-2023-18-2-85-102