ALGORITHM FOR THE DEVELOPMENT OF INFORMATION REPOSITORIES FOR STORING CONFIDENTIAL INFORMATION

Due to the intensive use of the Internet, network security is becoming a key foundation for all web applications. Intrusion detection by analysing records in network processes is an important way to solve problems in the field of network security. It has been identified that an intrusion can threate...

Full description

Bibliographic Details
Main Authors: Zohid A. Hakimov, Asilbek Medatov, Viktor Kotetunov, Yuriy Kravtsov, Alisher Abdullaev
Format: Article
Language:English
Published: University of Kragujevac 2023-06-01
Series:Proceedings on Engineering Sciences
Subjects:
Online Access:http://pesjournal.net/journal/v5-n2/5.pdf
_version_ 1797801915056128000
author Zohid A. Hakimov
Asilbek Medatov
Viktor Kotetunov
Yuriy Kravtsov
Alisher Abdullaev
author_facet Zohid A. Hakimov
Asilbek Medatov
Viktor Kotetunov
Yuriy Kravtsov
Alisher Abdullaev
author_sort Zohid A. Hakimov
collection DOAJ
description Due to the intensive use of the Internet, network security is becoming a key foundation for all web applications. Intrusion detection by analysing records in network processes is an important way to solve problems in the field of network security. It has been identified that an intrusion can threaten not only the integrity of the data but also the system itself. With the development of information technology and an increase in data transfer speeds, there are threats of incorrect use of the Internet. The authors determine that more reliable control systems are needed that solve the problem of network protection without human intervention. In a number of sources, attention is focused on the possibility of autonomous detection of the vulnerability of programmes and protocols by analysing the criteria for the behaviour of the system itself. Many models are built on informal methods, such as signature ones, in which it is difficult to obtain a correct assessment of effectiveness and completeness. The authors start from the fact that the attack is characterised by states and transitions. The possibility of using neural networks has been tested. A distinctive feature of a neural network is that they start working only after the learning process. This is one of the main advantages of a neural network over conventional algorithms. The paper shows that the development of information storages is possible provided that an equilibrium state is reached when the system does not allow expanding the attack space and the information storage is available for both external access and remote disconnection. The learning model consists of arrays of data with a distributed storage environment. This is the main component of improving the performance of the intrusion detection system. The experimental results obtained showed that the proposed approach identifies anomalies more effectively than known methods. The paper is devoted to the development of a method for detecting attacks based on information about the behaviour of deviating values in the network.
first_indexed 2024-03-13T04:57:47Z
format Article
id doaj.art-83100f3ec53e45f395a6a3ee040894aa
institution Directory Open Access Journal
issn 2620-2832
2683-4111
language English
last_indexed 2024-03-13T04:57:47Z
publishDate 2023-06-01
publisher University of Kragujevac
record_format Article
series Proceedings on Engineering Sciences
spelling doaj.art-83100f3ec53e45f395a6a3ee040894aa2023-06-17T14:13:48ZengUniversity of KragujevacProceedings on Engineering Sciences2620-28322683-41112023-06-015222723810.24874/PES05.02.005ALGORITHM FOR THE DEVELOPMENT OF INFORMATION REPOSITORIES FOR STORING CONFIDENTIAL INFORMATIONZohid A. Hakimov 0https://orcid.org/0000-0002-4264-6438Asilbek Medatov 1https://orcid.org/0000-0002-3840-6589Viktor Kotetunov 2https://orcid.org/0000-0002-0214-3369Yuriy Kravtsov 3https://orcid.org/0000-0003-4968-9112Alisher Abdullaev 4https://orcid.org/0000-0003-4904-7734Department of Information Technologies Urgench Branch of Tashkent University of Information Technologies named after Muhammadal Khwarizmi 220100, 110 Al-Khorezmi Str., Urgench, Republic of Uzbekistan Department of Information Technology Andijan State University 170100, 129 Universitetskaya Str., Andijan, Republic of Uzbekistan Department of Information Systems and Technologies National Transport University 01010, 1 Mykhailo Omelianovych Pavlenko Str., Kyiv, Ukraine Department of Sociology Dniprovsk State Technical University 51918, 2 Dniprobydivska Str., Kamianske, Ukraine Department of Informatics Teaching Nukus State Pedagogical Institute named after Ajiniyaz 230100, 1 P. Seyitov Str., Nukus, Uzbekistan Due to the intensive use of the Internet, network security is becoming a key foundation for all web applications. Intrusion detection by analysing records in network processes is an important way to solve problems in the field of network security. It has been identified that an intrusion can threaten not only the integrity of the data but also the system itself. With the development of information technology and an increase in data transfer speeds, there are threats of incorrect use of the Internet. The authors determine that more reliable control systems are needed that solve the problem of network protection without human intervention. In a number of sources, attention is focused on the possibility of autonomous detection of the vulnerability of programmes and protocols by analysing the criteria for the behaviour of the system itself. Many models are built on informal methods, such as signature ones, in which it is difficult to obtain a correct assessment of effectiveness and completeness. The authors start from the fact that the attack is characterised by states and transitions. The possibility of using neural networks has been tested. A distinctive feature of a neural network is that they start working only after the learning process. This is one of the main advantages of a neural network over conventional algorithms. The paper shows that the development of information storages is possible provided that an equilibrium state is reached when the system does not allow expanding the attack space and the information storage is available for both external access and remote disconnection. The learning model consists of arrays of data with a distributed storage environment. This is the main component of improving the performance of the intrusion detection system. The experimental results obtained showed that the proposed approach identifies anomalies more effectively than known methods. The paper is devoted to the development of a method for detecting attacks based on information about the behaviour of deviating values in the network.http://pesjournal.net/journal/v5-n2/5.pdfdatabasesunauthorised accessinternet securitynetwork processesvirus software
spellingShingle Zohid A. Hakimov
Asilbek Medatov
Viktor Kotetunov
Yuriy Kravtsov
Alisher Abdullaev
ALGORITHM FOR THE DEVELOPMENT OF INFORMATION REPOSITORIES FOR STORING CONFIDENTIAL INFORMATION
Proceedings on Engineering Sciences
databases
unauthorised access
internet security
network processes
virus software
title ALGORITHM FOR THE DEVELOPMENT OF INFORMATION REPOSITORIES FOR STORING CONFIDENTIAL INFORMATION
title_full ALGORITHM FOR THE DEVELOPMENT OF INFORMATION REPOSITORIES FOR STORING CONFIDENTIAL INFORMATION
title_fullStr ALGORITHM FOR THE DEVELOPMENT OF INFORMATION REPOSITORIES FOR STORING CONFIDENTIAL INFORMATION
title_full_unstemmed ALGORITHM FOR THE DEVELOPMENT OF INFORMATION REPOSITORIES FOR STORING CONFIDENTIAL INFORMATION
title_short ALGORITHM FOR THE DEVELOPMENT OF INFORMATION REPOSITORIES FOR STORING CONFIDENTIAL INFORMATION
title_sort algorithm for the development of information repositories for storing confidential information
topic databases
unauthorised access
internet security
network processes
virus software
url http://pesjournal.net/journal/v5-n2/5.pdf
work_keys_str_mv AT zohidahakimov algorithmforthedevelopmentofinformationrepositoriesforstoringconfidentialinformation
AT asilbekmedatov algorithmforthedevelopmentofinformationrepositoriesforstoringconfidentialinformation
AT viktorkotetunov algorithmforthedevelopmentofinformationrepositoriesforstoringconfidentialinformation
AT yuriykravtsov algorithmforthedevelopmentofinformationrepositoriesforstoringconfidentialinformation
AT alisherabdullaev algorithmforthedevelopmentofinformationrepositoriesforstoringconfidentialinformation