Intelligent Security Strategy Based on the Selection of the Computer and Neural Network Architecture

被引:0
|
作者
Ruchkin, V. N. [1 ]
Kostrov, B. V. [2 ]
Fulin, V. A. [1 ]
机构
[1] Ryazan State Univ, Ryazan, Russia
[2] Ryazan State Radio Engn Univ, Ryazan, Russia
关键词
security strategy; information security; cooperative game of chicken; business incentive balance; threat protection; sufficient security; infrastructure security; Internet of Things security maturity model; security algorithms; architecture; multicore; hierarchical; clustering; computer system; expert system; user interface;
D O I
10.3103/S014641162208020X
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The article analyzes information security strategies, such as a strategic cooperative game of chicken, balancing business incentives and striving for brinkmanship, and ensuring sufficient security with minimal effort for customers and consumers while not impairing-and in some cases improving-the privacy of their infrastructure and the Internet of Things (IoT) security maturity model (SMM). The benefits of the latter strategy are estimated by selecting an architecture with the core of the IoT SMM in the form of a hierarchy of security practices. Algorithms ensuring privacy and protection from threats are analyzed. A methodology for analyzing and selecting the best architecture for multicore hierarchical clustering of computer systems is proposed. An expert system based on the on-chip MCNPAoC SBIS 1879BM8Y instrument module MS 127.05 with the proposed user interface is implemented.
引用
收藏
页码:970 / 980
页数:11
相关论文
共 50 条
  • [41] A new approach for network security: Dynamic intelligent firewall architecture
    Yeni bir aʇ güvenliʇi yaklaşimi: Dinamik zeki güvenlik duvari mimarisi
    1600, Gazi Universitesi (29):
  • [42] A new approach for network security: Dynamic intelligent firewall architecture
    Yeni bir aǧ güvenliǧi yaklaşimi: Dinamik zeki güvenlik duvari mimarisi
    1600, Gazi Universitesi (29):
  • [43] A NEW APPROACH FOR NETWORK SECURITY: DYNAMIC INTELLIGENT FIREWALL ARCHITECTURE
    Erdem, O. Ayhan
    Kocaoglu, Ramazan
    JOURNAL OF THE FACULTY OF ENGINEERING AND ARCHITECTURE OF GAZI UNIVERSITY, 2014, 29 (04): : 707 - 715
  • [44] Security architecture for authentication and authorization in the intelligent and ubiquitous home network
    Lee, Hyungkyu
    Han, Jongwook
    Chung, Kyoil
    ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF CONTEMPORARY INTELLIGENT COMPUTING TECHNIQUES, 2007, 2 : 1110 - +
  • [45] A Deep Neural Network Based Robust Intelligent Strategy for Microgrid Fault Diagnosis
    Bhuiyan, Erphan A.
    Fahim, Shahriar Rahman
    Sarker, Subrata K.
    Das, Sajal K.
    Islam, Md Rabiul
    Muttaqi, Kashem
    2021 IEEE INDUSTRY APPLICATIONS SOCIETY ANNUAL MEETING (IAS), 2021,
  • [46] Application of Swarm Intelligent Algorithm Optimization Neural Network in Network Security
    Xia, Hui
    PROCEEDINGS OF THE 2016 4TH INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2016, 71 : 1284 - 1289
  • [47] Valuation of Convolutional Neural Network in Intelligent Computer Games
    Wu, Gui
    Zeng, Peng
    2023 35TH CHINESE CONTROL AND DECISION CONFERENCE, CCDC, 2023, : 2303 - 2307
  • [48] Intelligent routing strategy for software-defined satellite network based on Chebyshev neural network
    Liang J.
    Sun W.
    Xiao N.
    Chen W.
    Guo Z.
    Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2020, 42 (05): : 23 - 30
  • [49] The security and protection strategy research of computer network information
    Liu, Yu
    Chang, Jing
    PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON MATERIALS ENGINEERING AND INFORMATION TECHNOLOGY APPLICATIONS (MEITA 2016), 2017, 107 : 95 - 99
  • [50] Research on Security Issues and Protection Strategy of Computer Network
    Zhu, Min
    Luo, Yong-jian
    Yang, Jun-qiang
    Xing, Ming-shun
    Zhao, Jing
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 284 - 287