Computer Science and Information Technologies, Computer Science and Information Technologies 2006

Font Size: 
Artificial Intelligence in Information Security Systems
V. I. Vasilyev, S. S. Valeyev

Last modified: 2020-12-26

Abstract


The issues of artificial intelligence application in the tasks of information security are discussed in the paper. A concept of intelligent security system construction on the basis of hierarchical control processes organization is offered. A procedure of complex security system design with use of entropy estimates of risk and information complexity is considered.


Keywords


Artificial Intelligence; Information Security Systems; hierarchical control processes

References


1. Information Security Doctrine of the Russian Federation. Moscow, Russia, 2000.

2. "Defending America's Cyberspace". National Plan for Information Systems Protection, Version 1.0. The White House, USA, 2000.

3. Lin L., Geng X., Whinston A.B. "Intelligence and Security Informatics: An Information Economics Perspective". In: Proc. of the 1st NSF/NIJ Symp. "Intelligence and Security Informatics Springer Verlag, 2003, pp. 375-378.

4. http://www.isiconference.org

5. http: // www.comp.hkbu.eduhk / — cis05/home

6. "Artificial Intelligence in Homeland Security".

IEEE Intelligent Systems, 2005; 5.

7. Valeyev S.S., Bakirov T.K., Pogorelov DN., Starodumov I.V. "Multi-agent Technology and Information Security Systems". In; Proc, of the 7th International Workshop on Computer Science and Information Technologies (CSIT'2005). USATU, Ufa, Russia, 2005, pp. 195-199.

8. Valeyev S.S., Pogorelov DN. "Information Security in CALS-Technologies". In: Proc. of the 7th International Workshop on Computer Science and Information Technologies (CSIT'2005). USATU, Ufa, Russia, 2005, pp. 207-209.

9. Vasilyev V.I., Khafizov A.F. "Application of Neural Networks to Detection of Attacks on Computers in Internet (on Example of Attack SYNFLOOD)". Neurocomputers:   development,     application. Radiotechnika Pub., 2001; 4-5: 108-114.

10. Vasilyev V.I., Khafizov A.F. "Neural Network Systems of Intrusion Detection for WWW-server". USATU Transactions, Vol. 6, 2005; 102): 1 16-120.

11. Mu C. , Huang H., Tian S. "Intrusion Detection Alert Verification Based on Multi-level Fuzzy Comprehensive Evaluation". Lecture Notes in Artificial Intelligence (LIVAI), 3801, pp. 9-16.

12. Karim A. "Computational Intelligence for Network Intrusion Detection: Recent Contributions". Lecture Notes in Artificial Intelligence (LNAI), 3801, pp. 170-175.

13. Yeom K., Park J. "An Immune System Inspired Approach of Collaborative Intrusion Detection System Using Mobile Agents in Wireless Ad Hoc Networks". Lecture Notes in Artificial Intelligence (LNAI), 3802, pp. 204-21 1.

14. Ma         Yang          Wang J, "Attack Scenario Construction Based on Rule and Fuzzy Clustering" Lecture Notes in Artificial Intelligence (LNAI), 3802, pp. 328-333.

15. Seo H., Cho T. "Application of Fuzzy Logic for Distributed Intrusion Detection". Lecture Notes in Artifìcial Intelligence (LNAI), 3802, pp. 340-347.

16. Li B., Yin H. "Face Recognition Based on Support Vector Machine Fusion and Wavelet Transform". Lecture Notes in Artificial Intelligence (LNAI), 3802, pp. 764-770.

17. Ivanov A.I. "Neural Network Algorithms of Biometric Identification of Person". Radiotechnika Pub., Moscow, Russia, 2004.

18. Wu Ia., Su K., Chen Q. "Model Checking Temporal
Logics of Knowledge and Its Application in Security Verification". Lecture Notes in Artificial Intelligence (LIVAI), 3801, pp. 349-355.

19. Yeom K., Park J. "An Approach of Information Extraction from Web Documents for Automatic Ontology Generation". Lecture Notes in Artificial Intelligence (LNÅJ), 3801, pp. 450-457.

20. Lin L. , Liotta A., Hippisley A. "A Method for Automating the Extraction of Specialized Information from the Web". Lecture Notes in Artificial Intelligence (LNAI), 3801 , pp. 489-494.

21. Zeng Y., Ma J. "Sampling Distance Analysis of Gigantic Data Mining for Intrusion Detection Systems". Lecture Notes in Artificial Intelligence (LNÁI), 3802, pp. 228-235.

22. Cui S. , Feng B.A. "Fuzzy Integral Method to Merge Search Engine Results on Web". Lecture Notes in Artificial Intelligence (LNÁI), 3802, pp. 731-736. 23. Kim J. , Kang S. "Feature Selection by Fuzzy  Inference and Its Application to Spam-Mail Filtering". Lecture Notes in Artificial Intelligence (LNAI), 3801, pp. 361-366.

24. Cheng X., Ma X., Wang L, Thong S. "A Mobile Agent Based Spam Filter System". Lecture Notes in Artificial Intelligence (LNÄI), 3801, pp. 422-427.

25. Park 1, Choi J., Lee S., Park H., Lee D. "User-Oriented Multimedia Service Using Smart Sensor Agent Module in the Intelligent Home". Lecture Notes in Artificial Intelligence (LNAI), 3801, pp. 313-320.

26. Gerasimenko V.A. "Information Protection in Automated Systems of Data Processing", Vol. 1-2. Energoatomizdat Pub., Moscow, Russia, 1994.

27. Zegjda D, Ivashko A. "Fundamentals of Infomation Systems security". Hot Line - Telecom Pub., 2000.

28. Ashby W.R. "An Introduction to Cybernetics" Chapman Hall LTD, London, UK, 1957.

29. Saridis G.N. "Hierarchically Intelligent Machines". World Scientific Pub., Singapore, 2001.

30. Solodovnikov V. , Tumarkin V. "Complexity Theory and Design of Control Systems". Nauka Pub., Moscow, Russia, 1990.

31. Vasilyev V.I., Valeyev S.S. "Estimation of Neural Network Models Complexity on the Basis of Entropy Approach". In: Proc. of the 6th Workshop on Computer Science and Information Technologies
(CSIT'2004), Vol. 1. Budapest, Hungary, 2004, pp. 38-42.


Full Text: PDF