5 research outputs found
Modeling of the decision-making procedure for financing of cyber security means of cloud services by the medium of a bilinear multistep quality game with several terminal surfaces
The model is developed for the intellectualizeddecision-making support system on financing of cyber securitymeans of transport cloud-based computing infrastructures, giventhe limited financial resources. The model is based on the use ofthe theory of multistep games tools. The decision, which givesspecialists a chance to effectively assess risks in the financingprocesses of cyber security means, is found. The model differsfrom the existing approaches in the decision of bilinear multistepquality games with several terminal surfaces. The decision ofbilinear multistep quality games with dependent movements isfound. On the basis of the decision for a one-step game, foundedby application of the domination method and developed forinfinite antagonistic games, the conclusion about risks for playersis drawn. The results of a simulation experiment within programimplementation of the intellectualized decision-making supportsystem in the field of financing of cyber security means of cloudbasedcomputing infrastructures on transport are described. Confirmedduring the simulation experiment, the decision assumesaccounting a financial component of cyber defense strategy atany ratios of the parameters, describing financing process
Development of decision support system based on feature matrix for cyber threat assessment
The article herein presents the method and algorithmsfor forming the feature space for the base of intellectualizedsystem knowledge for the support system in the cyber threatsand anomalies tasks. The system being elaborated might be usedboth autonomously by cyber threat services analysts and jointlywith information protection complex systems. It is shown, that advisedalgorithms allow supplementing dynamically the knowledgebase upon appearing the new threats, which permits to cut thetime of their recognition and analysis, in particular, for cases ofhard-to-explain features and reduce the false responses in threatrecognizing systems, anomalies and attacks at informatizationobjects. It is stated herein, that collectively with the outcomes ofprevious authors investigations, the offered algorithms of formingthe feature space for identifying cyber threats within decisionsmaking support system are more effective. It is reached at theexpense of the fact, that, comparing to existing decisions, thedescribed decisions in the article, allow separate considering thetask of threat recognition in the frame of the known classes, andif necessary supplementing feature space for the new threat types.It is demonstrated, that new threats features often initially arenot identified within the frame of existing base of threat classesknowledge in the decision support system. As well the methodsand advised algorithms allow fulfilling the time-efficient cyberthreats classification for a definite informatization object
Development of decision support system based on feature matrix for cyber threat assessment
The article herein presents the method and algorithmsfor forming the feature space for the base of intellectualizedsystem knowledge for the support system in the cyber threatsand anomalies tasks. The system being elaborated might be usedboth autonomously by cyber threat services analysts and jointlywith information protection complex systems. It is shown, that advisedalgorithms allow supplementing dynamically the knowledgebase upon appearing the new threats, which permits to cut thetime of their recognition and analysis, in particular, for cases ofhard-to-explain features and reduce the false responses in threatrecognizing systems, anomalies and attacks at informatizationobjects. It is stated herein, that collectively with the outcomes ofprevious authors investigations, the offered algorithms of formingthe feature space for identifying cyber threats within decisionsmaking support system are more effective. It is reached at theexpense of the fact, that, comparing to existing decisions, thedescribed decisions in the article, allow separate considering thetask of threat recognition in the frame of the known classes, andif necessary supplementing feature space for the new threat types.It is demonstrated, that new threats features often initially arenot identified within the frame of existing base of threat classesknowledge in the decision support system. As well the methodsand advised algorithms allow fulfilling the time-efficient cyberthreats classification for a definite informatization object
Development of decision support system based on feature matrix for cyber threat assessment
The article herein presents the method and algorithms for forming the feature space for the base of intellectualized system knowledge for the support system in the cyber threats and anomalies tasks. The system being elaborated might be used both autonomously by cyber threat services analysts and jointly with information protection complex systems. It is shown, that advised algorithms allow supplementing dynamically the knowledge base upon appearing the new threats, which permits to cut the time of their recognition and analysis, in particular, for cases of hard-to-explain features and reduce the false responses in threat recognizing systems, anomalies and attacks at informatization objects. It is stated herein, that collectively with the outcomes of previous authors investigations, the offered algorithms of forming the feature space for identifying cyber threats within decisions making support system are more effective. It is reached at the expense of the fact, that, comparing to existing decisions, the described decisions in the article, allow separate considering the task of threat recognition in the frame of the known classes, and if necessary supplementing feature space for the new threat types. It is demonstrated, that new threats features often initially are not identified within the frame of existing base of threat classes knowledge in the decision support system. As well the methods and advised algorithms allow fulfilling the time-efficient cyber threats classification for a definite informatization object
DEVELOPMENT OF A COMPUTER SYSTEM FOR IDENTITY AUTHENTICATION USING ARTIFICIAL NEURAL NETWORKS
The aim of the study is to increase the effectiveness of automated face recognition to authenticate identity, considering features of change of the face parameters over time. The improvement of the recognition accuracy, as well as consideration of the features of temporal changes in a human face can be based on the methodology of artificial neural networks. Hybrid neural networks, combining the advantages of classical neural networks and fuzzy logic systems, allow using the network learnability along with the explanation of the findings. The structural scheme of intelligent system for identification based on artificial neural networks is proposed in this work. It realizes the principles of digital information processing and identity recognition taking into account the forecast of key characteristics’ changes over time (e.g., due to aging). The structural scheme has a three-tier architecture and implements preliminary processing, recognition and identification of images obtained as a result of monitoring. On the basis of expert knowledge, the fuzzy base of products is designed. It allows assessing possible changes in key characteristics, used to authenticate identity based on the image. To take this possibility into consideration, a neuro-fuzzy network of ANFIS type was used, which implements the algorithm of Tagaki-Sugeno. The conducted experiments showed high efficiency of the developed neural network and a low value of learning errors, which allows recommending this approach for practical implementation. Application of the developed system of fuzzy production rules that allow predicting changes in individuals over time, will improve the recognition accuracy, reduce the number of authentication failures and improve the efficiency of information processing and decision-making in applications, such as authentication of bank customers, users of mobile applications, or in video monitoring systems of sensitive sites