On some artificial intelligence methods and technologies for cloud-computing protection

被引:9
作者
Grusho, A.A. [1 ]
Zabezhailo, M.I. [1 ]
Zatsarinnyi, A.A. [1 ]
Piskovskii, V.O. [2 ]
机构
[1] Federal Research Center Informatics and Control, Russian Academy of Sciences, Moscow,119333, Russia
[2] Applied Research Center for Computer Networks, Moscow,142784, Russia
关键词
Cloud computing - Security of data - Artificial intelligence;
D O I
10.3103/S0005105517020029
中图分类号
学科分类号
摘要
An overview of data-mining technologies used in applied information security systems is presented. The focus is made on a new and actively developing trend, cloud-computing media (including the socalled fog computing). The status and promising opportunities of using artificial intelligence models and methods to solve information security problems are also discussed. © 2017, Allerton Press, Inc.
引用
收藏
页码:62 / 74
页数:12
相关论文
共 39 条
[1]  
Legg S.(2007)Universal intelligence: A definition of machine intelligence Minds Mach. 17 391-444
[2]  
Hutter M.(2015)On the potential applications of data mining for information security provision of cloud-based environments Autom. Doc. Math. Linguist. 49 193-201
[3]  
Grusho A.A.(2015)Creation of data mining cloud service on the actor mode Internet Things, Smart Spaces, Next Gener. Networks Syst. 9247 585-599
[4]  
Zabezhailo M.I.(2013)Detection of network attacks and selection of countermeasures in cloud systems Izv. YuFU, Tekh. Nauki 12 94-101
[5]  
Zatsarinnyi A.A.(1976)The notions of consistency and predicate locks in a database system Commun. ACM 19 624-633
[6]  
Piskovskii V.O.(2011)Consistent updates for software-defined networks: Change you can believe in! HOTNETS '11 7 1-6
[7]  
Borokhov S.V.(2016)Secure automatic reconfiguration of cloud computing environments Sist. Sredstva Inf. 26 83-92
[8]  
Kholod I.(2015)Control and management of information flows in the cloud environment Inf. Primen. 9 95-101
[9]  
Petuhov I.(2016)One method of reducing computations in the formation of Galois closures Inf. Primen. 10 97-106
[10]  
Kapustin N.(2015)Analysis of threats and methods of protection of cloud services Molodii Vchenii 12 38-43