Intelligent Security Strategy Based on the Selection of the Computer and Neural Network Architecture

被引:0
|
作者
Ruchkin, V. N. [1 ]
Kostrov, B. V. [2 ]
Fulin, V. A. [1 ]
机构
[1] Ryazan State Univ, Ryazan, Russia
[2] Ryazan State Radio Engn Univ, Ryazan, Russia
关键词
security strategy; information security; cooperative game of chicken; business incentive balance; threat protection; sufficient security; infrastructure security; Internet of Things security maturity model; security algorithms; architecture; multicore; hierarchical; clustering; computer system; expert system; user interface;
D O I
10.3103/S014641162208020X
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The article analyzes information security strategies, such as a strategic cooperative game of chicken, balancing business incentives and striving for brinkmanship, and ensuring sufficient security with minimal effort for customers and consumers while not impairing-and in some cases improving-the privacy of their infrastructure and the Internet of Things (IoT) security maturity model (SMM). The benefits of the latter strategy are estimated by selecting an architecture with the core of the IoT SMM in the form of a hierarchy of security practices. Algorithms ensuring privacy and protection from threats are analyzed. A methodology for analyzing and selecting the best architecture for multicore hierarchical clustering of computer systems is proposed. An expert system based on the on-chip MCNPAoC SBIS 1879BM8Y instrument module MS 127.05 with the proposed user interface is implemented.
引用
收藏
页码:970 / 980
页数:11
相关论文
共 50 条
  • [21] Intelligent Analysis and Prediction of Computer Network Security Logs Based on Deep Learning
    Liu, Zhiwei
    Li, Xiaoyu
    Mu, Dejun
    ELECTRONICS, 2024, 13 (22)
  • [22] Neural Network based Route Guidance Strategy in intelligent transportation systems
    Zhang, Wanning
    Chen, Bokui
    Liang, Xiaodan
    PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2024, 647
  • [23] Convolutional Neural Network-Based Intelligent Protection Strategy for Microgrids
    Bukhari, Syed Basit Ali
    Kim, Chul-Hwan
    Mehmood, Khawaja Khalid
    Haider, Raza
    Zaman, Muhammad Saeed Uz
    IET GENERATION TRANSMISSION & DISTRIBUTION, 2020, 14 (07) : 1177 - 1185
  • [24] The Strategy of Computer Network Information Security and Protection
    Long, Teng
    2019 4TH INTERNATIONAL WORKSHOP ON MATERIALS ENGINEERING AND COMPUTER SCIENCES (IWMECS 2019), 2019, : 31 - 35
  • [25] The Research of Computer Network Security and Protection Strategy
    He, Jian
    MATERIALS SCIENCE, ENERGY TECHNOLOGY, AND POWER ENGINEERING I, 2017, 1839
  • [26] A neural network based computer access security system for multiple users
    Anagun, AS
    Cin, I
    COMPUTERS & INDUSTRIAL ENGINEERING, 1998, 35 (1-2) : 351 - 354
  • [27] Security Evaluation Methods of Computer Networks Based on BP Neural Network
    Li, Liping
    PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON COMMUNICATION, ELECTRONICS AND AUTOMATION ENGINEERING, 2013, 181 : 1191 - 1196
  • [28] Road Network Intelligent Selection Method Based on Heterogeneous Graph Attention Neural Network
    Zheng, Haohua
    Zhang, Jianchen
    Li, Heying
    Wang, Guangxia
    Guo, Jianzhong
    Wang, Jiayao
    ISPRS INTERNATIONAL JOURNAL OF GEO-INFORMATION, 2024, 13 (09)
  • [29] Design of network security protection network architecture for intelligent networked vehicles
    Gao, Xiaoping
    Pan, Yue
    Li, Jinjin
    Ji, Tao
    Yuan, Yin
    Liu, Zhengnan
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY, ARTIFICIAL INTELLIGENCE AND DIGITAL ECONOMY, CSAIDE 2024, 2024, : 26 - 33
  • [30] The research on computer network security defense system based on GABP neural network algorithm
    Feng, Han
    Journal of Computers (Taiwan), 2019, 30 (03) : 314 - 319