Protection of Information in Networks Based on Methods of Machine Learning

被引:0
作者
Antipov, Sergey G. [1 ]
Vagin, Vadim N. [1 ]
Morosin, Oleg L. [1 ]
Fomina, Marina V. [1 ]
机构
[1] Natl Res Univ MPEI, Moscow, Russia
来源
ARTIFICIAL INTELLIGENCE (RCAI 2018) | 2018年 / 934卷
基金
俄罗斯基础研究基金会;
关键词
Information security; Argumentation; Defeasible reasoning; Degree of justification; Resolution of contradictions; Time series; Inductive concept formation;
D O I
10.1007/978-3-030-00617-4_25
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The paper considers the possibility of using artificial intelligence methods in information security tasks: methods for generating inductive concepts for analyzing network traffic, as well as methods of argumentation for automated security decision support systems. The approach proposed in the work allows giving quantitative assessments of the quality of the recommendations developed by the system, thereby helping to solve an important task - the task of choosing the way of responding to suspicious activity in the system. Examples of handling dangerous situations occurring in the system are also presented.
引用
收藏
页码:273 / 279
页数:7
相关论文
共 15 条
[1]  
Antipov S, 2012, SOFTW SYST, V2, P78
[2]  
Antipov S., 2016, P 1 INT SCI C INT IN, P63, DOI DOI 10.1007/978-3-319-33609-1_6
[3]  
Antipov S. G., 2017, OP SEM TECHN INT SYS, P195
[4]   Using argumentation logic for firewall policy specification and analysis [J].
Bandara, Arosha K. ;
Kakas, Antonis ;
Lupu, Emil C. ;
Russo, Alessandra .
LARGE SCALE MANAGEMENT OF DISTRIBUTED SYSTEMS, PROCEEDINGS, 2006, 4269 :185-196
[5]  
Chen Y., 2015, The UCR Time Series Classification Archive
[6]  
Golovina E., 2008, FIZMATLIT
[7]  
Khosravifar Babak, 2008, 2008 22nd International Conference on Advanced Information Networking and Applications - Workshops, P997, DOI 10.1109/AINA.2008.44
[8]  
Lichman M., UCI MACHINE LEARNING
[9]  
Lin J., 2003, P 8 ACM SIGMOD WORKS, P2, DOI [DOI 10.1145/882082.882086.S2CID6084733, 10.1145/882082.882086, DOI 10.1145/882082.882086]
[10]  
Ou Xinming., 2005, USENIX SECURITY