16 research outputs found
ΠΠΏΡΠΈΠΌΠΈΠ·Π°ΡΠΈΡ ΠΏΠ°ΡΠ°ΠΌΠ΅ΡΡΠΎΠ² ΠΈΠ½Π΄Π΅ΠΊΡΠ½ΠΎΠΉ ΡΠΎΡΠΌΠ°Π»ΡΠ½ΠΎΠΉ ΠΈΠΌΠΌΡΠ½Π½ΠΎΠΉ ΡΠ΅ΡΠΈ
This article proposed an index structure for a formal immune network. It introduced a new notation of risk index, set the objective of optimizing index parameters in terms of mean square performance criterion, which was then solved.Π ΡΡΠ°ΡΡΠ΅ ΠΏΡΠ΅Π΄Π»ΠΎΠΆΠ΅Π½Π° ΡΡΡΡΠΊΡΡΡΠ° ΠΈΠ½Π΄Π΅ΠΊΡΠ½ΠΎΠΉ ΡΠΎΡΠΌΠ°Π»ΡΠ½ΠΎΠΉ ΠΈΠΌΠΌΡΠ½Π½ΠΎΠΉ ΡΠ΅ΡΠΈ, Π²Π²Π΅Π΄Π΅Π½ΠΎ ΠΏΠΎΠ½ΡΡΠΈΠ΅ ΠΈΠ½Π΄Π΅ΠΊΡΠ° ΡΠΈΡΠΊΠ°, ΠΏΠΎΡΡΠ°Π²Π»Π΅Π½Π° ΠΈ ΡΠ΅ΡΠ΅Π½Π° Π·Π°Π΄Π°ΡΠ° ΠΎΠΏΡΠΈΠΌΠΈΠ·Π°ΡΠΈΠΈ ΠΏΠ°ΡΠ°ΠΌΠ΅ΡΡΠΎΠ² ΠΈΠ½Π΄Π΅ΠΊΡΠ° Π² ΡΠΌΡΡΠ»Π΅ ΡΡΠ΅Π΄Π½Π΅ΠΊΠ²Π°Π΄ΡΠ°ΡΠΈΡΠ΅ΡΠΊΠΎΠ³ΠΎ ΠΊΡΠΈΡΠ΅ΡΠΈΡ ΠΊΠ°ΡΠ΅ΡΡΠ²Π°
An ecological approach to anomaly detection: the EIA Model.
The presented work proposes a new approach for anomaly
detection. This approach is based on changes in a population of evolving agents under stress. If conditions are appropriate, changes in the population (modeled by the bioindicators) are representative of the alterations to the environment. This approach, based on an ecological view, improves functionally traditional approaches to the detection of anomalies.
To verify this assertion, experiments based on Network Intrussion Detection Systems are presented. The results are compared with the behaviour of other bioinspired approaches and machine learning techniques
ΠΠ½Π΄Π΅ΠΊΡΡ ΠΏΡΠΈΡ ΠΎΠ»ΠΎΠ³ΠΈΡΠ΅ΡΠΊΠΎΠΉ ΡΡΡΠΎΠΉΡΠΈΠ²ΠΎΡΡΠΈ ΠΊΠ°ΠΊ Π½ΠΎΠ²ΡΠΉ ΠΏΠΎΠ΄Ρ ΠΎΠ΄ ΠΊ ΡΠΎΡΠΌΠΈΡΠΎΠ²Π°Π½ΠΈΡ Π³ΡΡΠΏΠΏ ΡΠΈΡΠΊΠ°
Immunocomputing techniques have been used to create new indices that estimate the risk of an inadaptability of juvenile crisis in a given group of young people in a Β«hardΒ» environment. Application examples have been provided using the psychological tests of cadets of the Peter the Great Military-Space School in St. Petersburg.ΠΠ° ΠΎΡΠ½ΠΎΠ²Π΅ ΠΌΠ΅ΡΠΎΠ΄ΠΎΠ² ΠΈΠΌΠΌΡΠ½ΠΎΠΊΠΎΠΌΠΏΡΡΡΠΈΠ½Π³Π° ΠΏΡΠ΅Π΄Π»ΠΎΠΆΠ΅Π½Ρ Π½ΠΎΠ²ΡΠ΅ ΠΈΠ½Π΄Π΅ΠΊΡΡ, Ρ
Π°ΡΠ°ΠΊΡΠ΅ΡΠΈΠ·ΡΡΡΠΈΠ΅ ΡΠΈΡΠΊ ΡΠ°Π·Π²ΠΈΡΠΈΡ Π΄Π΅Π·Π°Π΄Π°ΠΏΡΠ°ΡΠΈΠΎΠ½Π½ΡΡ
Π½Π°ΡΡΡΠ΅Π½ΠΈΠΉ Ρ ΠΏΠΎΠ΄ΡΠΎΡΡΠΊΠΎΠ² Π² ΡΡΠ»ΠΎΠ²ΠΈΡΡ
Π½Π°Ρ
ΠΎΠΆΠ΄Π΅ΠΊΠ½ΠΈΡ Π² Β«ΠΆΠ΅ΡΡΠΊΠΎΠΉΒ» ΠΎΠ±ΡΠ°Π·ΠΎΠ²Π°ΡΠ΅Π»ΡΠ½ΠΎΠΉ ΡΡΠ΅Π΄Π΅. ΠΡΠΈΠΌΠ΅Π½Π΅Π½ΠΈΠ΅ ΠΈΠ½Π΄Π΅ΠΊΡΠΎΠ² Π½Π°Π³Π»ΡΠ΄Π½ΠΎ ΠΏΡΠΎΠ΄Π΅ΠΌΠΎΠ½ΡΡΡΠΈΡΠΎΠ²Π°Π½ΠΎ Π½Π° Π΄Π°Π½Π½ΡΡ
ΠΏΡΠΈΡ
ΠΎΠ»ΠΎΠ³ΠΈΡΠ΅ΡΠΊΠΎΠ³ΠΎ ΠΎΠ±ΡΠ»Π΅Π΄ΠΎΠ²Π°Π½ΠΈΡ ΡΡΠ°ΡΠΈΡ
ΡΡ ΠΠΎΠ΅Π½Π½ΠΎ-ΠΊΠΎΡΠΌΠΈΡΠ΅ΡΠΊΠΎΠ³ΠΎ ΠΊΠ°Π΄Π΅ΡΡΠΊΠΎΠ³ΠΎ ΠΊΠΎΡΠΏΡΡΠ° ΠΈΠΌ. ΠΠ΅ΡΡΠ° ΠΠ΅Π»ΠΈΠΊΠΎΠ³ΠΎ Π³. Π‘Π°Π½ΠΊΡ-ΠΠ΅ΡΠ΅ΡΠ±ΡΡΠ³
ΠΠ±Π΅ΡΠΏΠ΅ΡΠ΅Π½ΠΈΠ΅ ΠΏΡΠ°Π² Π΄ΠΎΡΡΡΠΏΠ° ΠΊ ΡΠΈΡΡΠ΅ΠΌΠ°ΠΌ Ρ ΠΌΠ°Π½Π΄Π°ΡΠ½ΠΎΠΉ ΠΏΠΎΠ»ΠΈΡΠΈΠΊΠΎΠΉ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ
The machinery of information protections from unauthorized access by access limitation of the corporative information recourses according to the mandate politics of information security have considered. The processes of control and properties analysis of law access matrix according to objects and subjects protection hierarchy have presented. The conditions and procedures of filling and forming of this matrix with execution of basic demarcation access rules have considered.ΠΡΠ΅Π΄ΡΡΠ°Π²Π»Π΅Π½Ρ ΠΌΠ΅Ρ
Π°Π½ΠΈΠ·ΠΌΡ Π·Π°ΡΠΈΡΡ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΈ ΠΎΡ Π½Π΅ΡΠ°Π½ΠΊΡΠΈΠΎΠ½ΠΈΡΠΎΠ²Π°Π½Π½ΠΎΠ³ΠΎ Π΄ΠΎΡΡΡΠΏΠ° ΠΏΡΡΠ΅ΠΌ ΠΎΠ³ΡΠ°Π½ΠΈΡΠ΅Π½ΠΈΡ Π΄ΠΎΡΡΡΠΏΠ° ΠΊ ΡΠ°ΡΠΏΡΠ΅Π΄Π΅Π»Π΅Π½Π½ΡΠΌ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½ΡΠΌ ΡΠ΅ΡΡΡΡΠ°ΠΌ Ρ ΡΡΠ΅ΡΠΎΠΌ ΠΌΠ°Π½Π΄Π°ΡΠ½ΠΎΠΉ ΠΏΠΎΠ»ΠΈΡΠΈΠΊΠΈ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½ΠΎΠΉ Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ. Π€ΠΎΡΠΌΠ°Π»ΠΈΠ·ΠΎΠ²Π°Π½Ρ ΠΏΡΠΎΡΠ΅ΡΡΡ ΠΊΠΎΠ½ΡΡΠΎΠ»Ρ ΠΈ Π°Π½Π°Π»ΠΈΠ·Π° ΡΠ²ΠΎΠΉΡΡΠ² ΠΌΠ°ΡΡΠΈΡΡ ΠΏΡΠ°Π² Π΄ΠΎΡΡΡΠΏΠ° Ρ ΡΡΠ΅ΡΠΎΠΌ ΠΈΠ΅ΡΠ°ΡΡ
ΠΈΠΈ ΡΡΠ±ΡΠ΅ΠΊΡΠΎΠ² ΠΈ ΠΎΠ±ΡΠ΅ΠΊΡΠΎΠ² Π·Π°ΡΠΈΡΡ. Π Π°ΡΡΠΌΠΎΡΡΠ΅Π½Ρ ΡΡΠ»ΠΎΠ²ΠΈΡ ΠΈ ΠΏΡΠΎΡΠ΅Π΄ΡΡΡ Π·Π°ΠΏΠΎΠ»Π½Π΅Π½ΠΈΡ ΠΈ ΡΠΎΡΠΌΠΈΡΠΎΠ²Π°Π½ΠΈΡ ΡΡΠΎΠΉ ΠΌΠ°ΡΡΠΈΡΡ ΠΏΡΠΈ Π²ΡΠΏΠΎΠ»Π½Π΅Π½ΠΈΠΈ ΠΎΡΠ½ΠΎΠ²Π½ΡΡ
ΠΏΡΠ°Π²ΠΈΠ» ΡΠ°Π·Π³ΡΠ°Π½ΠΈΡΠ΅Π½ΠΈΡ Π΄ΠΎΡΡΡΠΏΠ°
Design of Automated Website Phishing Detection using Sequential Mechanism of RCL Algorithm
The phishing outbreaks in internet has become a major problem in web safety in recent years. The phishers will be stealing crucial economic data regarding the web user to perform economic break-in. In order to predict phishing websites, many blacklist-based phishing website recognition methods are used in this study. Traditional methods of detecting phishing websites rely on static features and rule-based schemes, which can be evaded by attackers. Recently, Deep Learning (DL) and Machine Learning (ML) models are employed for automated website phishing detection. With this motivation, this study develops an automated website phishing detection using the sequential mechanism of RCL algorithm. The proposed model employs Long-Short-Term Memory (LSTM), Convolutional Neural Network (CNN), and Random Forest (RF) models for the detection of attacks in the URLs and webpages by the similarity measurement of the decoy contents. The proposed model involves three major components namely, RF for URL phishing detection, CNN based phishing webpage detection, and LSTM based website classification (i.e., legitimate and phishing). The experimental result analysis of the RCL technique is tested on the benchmark dataset of Alexa and PhishTank. A comprehensive comparison study highlighted that the RCL algorithm accomplishes enhanced phishing detection performance over other existing techniques in terms of distinct evaluation metrics
Immune systems inspired multi-robot cooperative shepherding
Certain tasks require multiple robots to cooperate in order to solve them. The main problem with multi-robot systems is that they are inherently complex and usually situated in a dynamic environment. Now, biological immune systems possess a natural distributed control and exhibit real-time adaptivity, properties that are required to solve problems in multi-robot systems. In this thesis, biological immune systems and their response to external elements to maintain an organism's health state are researched. The objective of this research is to propose immune-inspired approaches to cooperation, to establish an adaptive cooperation algorithm, and to determine the refinements that can be applied in relation to cooperation. Two immune-inspired models that are based on the immune network theory are proposed, namely the Immune Network T-cell-regulated---with Memory (INT-M) and the Immune Network T-cell-regulated---Cross-Reactive (INT-X) models. The INT-M model is further studied where the results have suggested that the model is feasible and suitable to be used, especially in the multi-robot cooperative shepherding domain. The Collecting task in the RoboShepherd scenario and the application of the INT-M algorithm for multi-robot cooperation are discussed. This scenario provides a highly dynamic and complex situation that has wide applicability in real-world problems. The underlying 'mechanism of cooperation' in the immune inspired model (INT-M) is verified to be adaptive in this chosen scenario. Several multi-robot cooperative shepherding factors are studied and refinements proposed, notably methods used for Shepherds' Approach, Shepherds' Formation and Steering Points' Distance. This study also recognises the importance of flock identification in relation to cooperative shepherding, and the Connected Components Labelling method to overcome the related problem is presented. Further work is suggested on the proposed INT-X model that was not implemented in this study, since it builds on top of the INT-M algorithm and its refinements. This study can also be extended to include other shepherding behaviours, further investigation of other useful features of biological immune systems, and the application of the proposed models to other cooperative tasks
Real life applications of bio-inspired computing models: EAP and NEPs
Tesis doctoral inΓ©dita leΓda en la Universidad AutΓ³noma de Madrid, Escuela PolitΓ©cnica Superior, Departamento de IngenierΓa InformΓ‘tica. Fecha de lectura: 04-07-201