DEEP TRAINING IN METHODS OF PROTECTION AGAINST ATTACKS
نویسندگان
چکیده
In recent years, machine learning algorithms, or rather deep have beenwidely used in many fields, including cybersecurity. However, systems are vulnerableto attacks by attackers, and this limits the use of learning, especially nonstationaryenvironments with hostile actions, such as cybersecurity field, where real attackersexist (for example, malware developers). With rapid development artificial intelligence (AI)and (GO) methods, it is important to ensure safety reliability implementedalgorithms. Recently, vulnerability algorithms conflicting patternshas been widely recognized. Fabricated samples for analysis can lead various violations thebehavior models, while people will consider them safe use. The successful implementationof enemy physical situations scenarios worldonce again proves their practicality. As a result, methods adversarial attack defense areattracting increasing attention from security communities havebecome hot topic research years not only Russia, but also other countries.Sberbank, Yandex, T1 Group, Atlas Medical Center others developing competitivesolutions, on international market. Unfortunately, list 10 largest ITcompanies, direction Big Data, particular, protection against representedonly Group company, market growth potential huge. paper, theoreticalfoundations, application arepresented. Then number papers described, covering awide range area. This article explores summarizes anddefenses, which represent most up-to-date field meet latest requirementsfor information security.
منابع مشابه
A Multi_path Based Training Protection Approach against Pilot Spoofing Attacks
The Pilot spoofing attack can be defined as an attack in which the quite active eavesdropping activities are conducted by a malicious user throughout the channel coaching section. They transmit the identical pilot i.e. training signals as those of the legal users, these are like associate degree attacks. Such attack is ready to govern the channel estimation outcome. This can also lead to a bigg...
متن کاملProtection Mechanisms Against Phishing Attacks
Approaches against Phishing can be classified into modifications of the traditional PIN/TAN-authentication on the one hand and approaches that try to reduce the probability of a scammer being successful without changing the existing PIN/TAN-method on the other hand. We present a new approach, based on challenge-response-authentication. Since our proposal does not require any new hardware on the...
متن کاملNeural Network Based Protection of Software Defined Network Controller against Distributed Denial of Service Attacks
Software Defined Network (SDN) is a new architecture for network management and its main concept is centralizing network management in the network control level that has an overview of the network and determines the forwarding rules for switches and routers (the data level). Although this centralized control is the main advantage of SDN, it is also a single point of failure. If this main contro...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Izvestiâ ÛFU
سال: 2023
ISSN: ['1999-9429', '2311-3103']
DOI: https://doi.org/10.18522/2311-3103-2023-2-227-239