16 research outputs found

    ΠžΠΏΡ‚ΠΈΠΌΠΈΠ·Π°Ρ†ΠΈΡ ΠΏΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€ΠΎΠ² индСксной Ρ„ΠΎΡ€ΠΌΠ°Π»ΡŒΠ½ΠΎΠΉ ΠΈΠΌΠΌΡƒΠ½Π½ΠΎΠΉ сСти

    Get PDF
    This article proposed an index structure for a formal immune network. It introduced a new notation of risk index, set the objective of optimizing index parameters in terms of mean square performance criterion, which was then solved.Π’ ΡΡ‚Π°Ρ‚ΡŒΠ΅ ΠΏΡ€Π΅Π΄Π»ΠΎΠΆΠ΅Π½Π° структура индСксной Ρ„ΠΎΡ€ΠΌΠ°Π»ΡŒΠ½ΠΎΠΉ ΠΈΠΌΠΌΡƒΠ½Π½ΠΎΠΉ сСти, Π²Π²Π΅Π΄Π΅Π½ΠΎ понятиС индСкса риска, поставлСна ΠΈ Ρ€Π΅ΡˆΠ΅Π½Π° Π·Π°Π΄Π°Ρ‡Π° ΠΎΠΏΡ‚ΠΈΠΌΠΈΠ·Π°Ρ†ΠΈΠΈ ΠΏΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€ΠΎΠ² индСкса Π² смыслС срСднСквадратичСского критСрия качСства

    An ecological approach to anomaly detection: the EIA Model.

    Get PDF
    The presented work proposes a new approach for anomaly detection. This approach is based on changes in a population of evolving agents under stress. If conditions are appropriate, changes in the population (modeled by the bioindicators) are representative of the alterations to the environment. This approach, based on an ecological view, improves functionally traditional approaches to the detection of anomalies. To verify this assertion, experiments based on Network Intrussion Detection Systems are presented. The results are compared with the behaviour of other bioinspired approaches and machine learning techniques

    Π˜Π½Π΄Π΅ΠΊΡΡ‹ психологичСской устойчивости ΠΊΠ°ΠΊ Π½ΠΎΠ²Ρ‹ΠΉ ΠΏΠΎΠ΄Ρ…ΠΎΠ΄ ΠΊ Ρ„ΠΎΡ€ΠΌΠΈΡ€ΠΎΠ²Π°Π½ΠΈΡŽ Π³Ρ€ΡƒΠΏΠΏ риска

    Get PDF
    Immunocomputing techniques have been used to create new indices that estimate the risk of an inadaptability of juvenile crisis in a given group of young people in a Β«hardΒ» environment. Application examples have been provided using the psychological tests of cadets of the Peter the Great Military-Space School in St. Petersburg.На основС ΠΌΠ΅Ρ‚ΠΎΠ΄ΠΎΠ² ΠΈΠΌΠΌΡƒΠ½ΠΎΠΊΠΎΠΌΠΏΡŒΡŽΡ‚ΠΈΠ½Π³Π° ΠΏΡ€Π΅Π΄Π»ΠΎΠΆΠ΅Π½Ρ‹ Π½ΠΎΠ²Ρ‹Π΅ индСксы, Ρ…Π°Ρ€Π°ΠΊΡ‚Π΅Ρ€ΠΈΠ·ΡƒΡŽΡ‰ΠΈΠ΅ риск развития Π΄Π΅Π·Π°Π΄Π°ΠΏΡ‚Π°Ρ†ΠΈΠΎΠ½Π½Ρ‹Ρ… Π½Π°Ρ€ΡƒΡˆΠ΅Π½ΠΈΠΉ Ρƒ подростков Π² условиях нахоТдСкния Π² «ТСсткой» ΠΎΠ±Ρ€Π°Π·ΠΎΠ²Π°Ρ‚Π΅Π»ΡŒΠ½ΠΎΠΉ срСдС. ΠŸΡ€ΠΈΠΌΠ΅Π½Π΅Π½ΠΈΠ΅ индСксов наглядно продСмонстрировано Π½Π° Π΄Π°Π½Π½Ρ‹Ρ… психологичСского обслСдования учащихся Π’ΠΎΠ΅Π½Π½ΠΎ-космичСского кадСтского корпуса ΠΈΠΌ. ΠŸΠ΅Ρ‚Ρ€Π° Π’Π΅Π»ΠΈΠΊΠΎΠ³ΠΎ Π³. Π‘Π°Π½ΠΊΡ‚-ΠŸΠ΅Ρ‚Π΅Ρ€Π±ΡƒΡ€Π³

    ΠžΠ±Π΅ΡΠΏΠ΅Ρ‡Π΅Π½ΠΈΠ΅ ΠΏΡ€Π°Π² доступа ΠΊ систСмам с ΠΌΠ°Π½Π΄Π°Ρ‚Π½ΠΎΠΉ ΠΏΠΎΠ»ΠΈΡ‚ΠΈΠΊΠΎΠΉ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ бСзопасности

    Get PDF
    The machinery of information protections from unauthorized access by access limitation of the corporative information recourses according to the mandate politics of information security have considered. The processes of control and properties analysis of law access matrix according to objects and subjects protection hierarchy have presented. The conditions and procedures of filling and forming of this matrix with execution of basic demarcation access rules have considered.ΠŸΡ€Π΅Π΄ΡΡ‚Π°Π²Π»Π΅Π½Ρ‹ ΠΌΠ΅Ρ…Π°Π½ΠΈΠ·ΠΌΡ‹ Π·Π°Ρ‰ΠΈΡ‚Ρ‹ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΈ ΠΎΡ‚ нСсанкционированного доступа ΠΏΡƒΡ‚Π΅ΠΌ ограничСния доступа ΠΊ распрСдСлСнным ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½Ρ‹ΠΌ рСсурсам с ΡƒΡ‡Π΅Ρ‚ΠΎΠΌ ΠΌΠ°Π½Π΄Π°Ρ‚Π½ΠΎΠΉ ΠΏΠΎΠ»ΠΈΡ‚ΠΈΠΊΠΈ ΠΈΠ½Ρ„ΠΎΡ€ΠΌΠ°Ρ†ΠΈΠΎΠ½Π½ΠΎΠΉ бСзопасности. Π€ΠΎΡ€ΠΌΠ°Π»ΠΈΠ·ΠΎΠ²Π°Π½Ρ‹ процСссы контроля ΠΈ Π°Π½Π°Π»ΠΈΠ·Π° свойств ΠΌΠ°Ρ‚Ρ€ΠΈΡ†Ρ‹ ΠΏΡ€Π°Π² доступа с ΡƒΡ‡Π΅Ρ‚ΠΎΠΌ ΠΈΠ΅Ρ€Π°Ρ€Ρ…ΠΈΠΈ ΡΡƒΠ±ΡŠΠ΅ΠΊΡ‚ΠΎΠ² ΠΈ ΠΎΠ±ΡŠΠ΅ΠΊΡ‚ΠΎΠ² Π·Π°Ρ‰ΠΈΡ‚Ρ‹. РассмотрСны условия ΠΈ ΠΏΡ€ΠΎΡ†Π΅Π΄ΡƒΡ€Ρ‹ заполнСния ΠΈ формирования этой ΠΌΠ°Ρ‚Ρ€ΠΈΡ†Ρ‹ ΠΏΡ€ΠΈ Π²Ρ‹ΠΏΠΎΠ»Π½Π΅Π½ΠΈΠΈ основных ΠΏΡ€Π°Π²ΠΈΠ» разграничСния доступа

    Design of Automated Website Phishing Detection using Sequential Mechanism of RCL Algorithm

    Get PDF
    The phishing outbreaks in internet has become a major problem in web safety in recent years. The phishers will be stealing crucial economic data regarding the web user to perform economic break-in. In order to predict phishing websites, many blacklist-based phishing website recognition methods are used in this study. Traditional methods of detecting phishing websites rely on static features and rule-based schemes, which can be evaded by attackers. Recently, Deep Learning (DL) and Machine Learning (ML) models are employed for automated website phishing detection. With this motivation, this study develops an automated website phishing detection using the sequential mechanism of RCL algorithm. The proposed model employs Long-Short-Term Memory (LSTM), Convolutional Neural Network (CNN), and Random Forest (RF) models for the detection of attacks in the URLs and webpages by the similarity measurement of the decoy contents. The proposed model involves three major components namely, RF for URL phishing detection, CNN based phishing webpage detection, and LSTM based website classification (i.e., legitimate and phishing). The experimental result analysis of the RCL technique is tested on the benchmark dataset of Alexa and PhishTank. A comprehensive comparison study highlighted that the RCL algorithm accomplishes enhanced phishing detection performance over other existing techniques in terms of distinct evaluation metrics

    Immune systems inspired multi-robot cooperative shepherding

    Get PDF
    Certain tasks require multiple robots to cooperate in order to solve them. The main problem with multi-robot systems is that they are inherently complex and usually situated in a dynamic environment. Now, biological immune systems possess a natural distributed control and exhibit real-time adaptivity, properties that are required to solve problems in multi-robot systems. In this thesis, biological immune systems and their response to external elements to maintain an organism's health state are researched. The objective of this research is to propose immune-inspired approaches to cooperation, to establish an adaptive cooperation algorithm, and to determine the refinements that can be applied in relation to cooperation. Two immune-inspired models that are based on the immune network theory are proposed, namely the Immune Network T-cell-regulated---with Memory (INT-M) and the Immune Network T-cell-regulated---Cross-Reactive (INT-X) models. The INT-M model is further studied where the results have suggested that the model is feasible and suitable to be used, especially in the multi-robot cooperative shepherding domain. The Collecting task in the RoboShepherd scenario and the application of the INT-M algorithm for multi-robot cooperation are discussed. This scenario provides a highly dynamic and complex situation that has wide applicability in real-world problems. The underlying 'mechanism of cooperation' in the immune inspired model (INT-M) is verified to be adaptive in this chosen scenario. Several multi-robot cooperative shepherding factors are studied and refinements proposed, notably methods used for Shepherds' Approach, Shepherds' Formation and Steering Points' Distance. This study also recognises the importance of flock identification in relation to cooperative shepherding, and the Connected Components Labelling method to overcome the related problem is presented. Further work is suggested on the proposed INT-X model that was not implemented in this study, since it builds on top of the INT-M algorithm and its refinements. This study can also be extended to include other shepherding behaviours, further investigation of other useful features of biological immune systems, and the application of the proposed models to other cooperative tasks

    Real life applications of bio-inspired computing models: EAP and NEPs

    Full text link
    Tesis doctoral inΓ©dita leΓ­da en la Universidad AutΓ³noma de Madrid, Escuela PolitΓ©cnica Superior, Departamento de IngenierΓ­a InformΓ‘tica. Fecha de lectura: 04-07-201
    corecore