Intelligent Cyber Defense System

نویسندگان

  • Myroslav Komar
  • Anatoly Sachenko
  • Sergei V. Bezobrazov
  • Vladimir A. Golovko
چکیده

In this paper a novel method for detection of network attacks and malicious code is described. The method is based on main principles of Artificial Immune Systems where immune detectors have an Artificial Neural Network’s structure. The main goal of proposed approach is to detect unknown, previous unseen cyber attacks (malicious code, intrusion detection, etc.). The mechanism of evolution of the neural network immune detectors allows increasing the detection rate. The proposed Intelligent Cyber Defense System can increase the reliability of intrusion detection in computer systems and, as a result, it may reduce financial losses of companies from cyber attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Initial Reference Architecture of an Intelligent Autonomous Agent for Cyber Defense

This report describes an initial reference architecture for intelligent software agents performing active, largely autonomous cyber defense actions on military networks of computing and communicating devices. The report is produced by the North Atlantic Treaty Organization (NATO) Research Task Group (RTG) IST-152"Intelligent Autonomous Agents for Cyber Defense and Resilience". In a conflict wit...

متن کامل

Application of Stochastic Optimal Control, Game Theory and Information Fusion for Cyber Defense Modelling

The present paper addresses an effective cyber defense model by applying information fusion based game theoretical approaches‎. ‎In the present paper, we are trying to improve previous models by applying stochastic optimal control and robust optimization techniques‎. ‎Jump processes are applied to model different and complex situations in cyber games‎. ‎Applying jump processes we propose some m...

متن کامل

Working Notes for the 2010 AAAI Workshop on Intelligent Security (SecArt)

In this paper, we describe a toolset for managing the configuration and management of large-scale networks. In particular, we focus on managing limited processing and communication resources for coordinated network cyber-defense applications. Our implementation encompasses the complete cycle, from initial network modeling and extraction of the relevant constraints, through translation into a fo...

متن کامل

Towards the development of a Cyber-Intelligent Enterprise System Architecture

Although the concept of Cyber Intelligent Enteprise is largely based on Cyber Physical Systems (CPS), research in adjacent fields, like Internet of Things (IoT), is also important as it provides a valuable set of system architectures and integration techniques. The current socio-economic context provides the perfect opportunity for the development of a new breed of enterprise system architectur...

متن کامل

On Cyber Warfare Command and Control Systems

As Defense agencies and services expand their reliance on computer networks, risk to information availability and integrity increases. It is no longer adequate to rely solely on the now traditional defense-in-depth strategy. We must recognize that we are engaged in a form of warfare, cyber warfare, and deploy our resources using the strategy and tactics of warfare. Most Defense organizations ha...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016