ALGORITHM FOR THE DEVELOPMENT OF INFORMATION REPOSITORIES FOR STORING CONFIDENTIAL INFORMATION
Due to the intensive use of the Internet, network security is becoming a key foundation for all web applications. Intrusion detection by analysing records in network processes is an important way to solve problems in the field of network security. It has been identified that an intrusion can threate...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
University of Kragujevac
2023-06-01
|
Series: | Proceedings on Engineering Sciences |
Subjects: | |
Online Access: | http://pesjournal.net/journal/v5-n2/5.pdf |
_version_ | 1797801915056128000 |
---|---|
author | Zohid A. Hakimov Asilbek Medatov Viktor Kotetunov Yuriy Kravtsov Alisher Abdullaev |
author_facet | Zohid A. Hakimov Asilbek Medatov Viktor Kotetunov Yuriy Kravtsov Alisher Abdullaev |
author_sort | Zohid A. Hakimov |
collection | DOAJ |
description | Due to the intensive use of the Internet, network security is becoming a key foundation for all web applications. Intrusion detection by analysing records in network processes is an important way to solve problems in the field of network security. It has been identified that an intrusion can threaten not only the integrity of the data but also the system itself. With the development of information technology and an increase in data transfer speeds, there are threats of incorrect use of the Internet. The authors determine that more reliable control systems are needed that solve the problem of network protection without human intervention. In a number of sources, attention is focused on the possibility of autonomous detection of the vulnerability of programmes and protocols by analysing the criteria for the behaviour of the system itself. Many models are built on informal methods, such as signature ones, in which it is difficult to obtain a correct assessment of effectiveness and completeness. The authors start from the fact that the attack is characterised by states and transitions. The possibility of using neural networks has been tested. A distinctive feature of a neural network is that they start working only after the learning process. This is one of the main advantages of a neural network over conventional algorithms. The paper shows that the development of information storages is possible provided that an equilibrium state is reached when the system does not allow expanding the attack space and the information storage is available for both external access and remote disconnection. The learning model consists of arrays of data with a distributed storage environment. This is the main component of improving the performance of the intrusion detection system. The experimental results obtained showed that the proposed approach identifies anomalies more effectively than known methods. The paper is devoted to the development of a method for detecting attacks based on information about the behaviour of deviating values in the network. |
first_indexed | 2024-03-13T04:57:47Z |
format | Article |
id | doaj.art-83100f3ec53e45f395a6a3ee040894aa |
institution | Directory Open Access Journal |
issn | 2620-2832 2683-4111 |
language | English |
last_indexed | 2024-03-13T04:57:47Z |
publishDate | 2023-06-01 |
publisher | University of Kragujevac |
record_format | Article |
series | Proceedings on Engineering Sciences |
spelling | doaj.art-83100f3ec53e45f395a6a3ee040894aa2023-06-17T14:13:48ZengUniversity of KragujevacProceedings on Engineering Sciences2620-28322683-41112023-06-015222723810.24874/PES05.02.005ALGORITHM FOR THE DEVELOPMENT OF INFORMATION REPOSITORIES FOR STORING CONFIDENTIAL INFORMATIONZohid A. Hakimov 0https://orcid.org/0000-0002-4264-6438Asilbek Medatov 1https://orcid.org/0000-0002-3840-6589Viktor Kotetunov 2https://orcid.org/0000-0002-0214-3369Yuriy Kravtsov 3https://orcid.org/0000-0003-4968-9112Alisher Abdullaev 4https://orcid.org/0000-0003-4904-7734Department of Information Technologies Urgench Branch of Tashkent University of Information Technologies named after Muhammadal Khwarizmi 220100, 110 Al-Khorezmi Str., Urgench, Republic of Uzbekistan Department of Information Technology Andijan State University 170100, 129 Universitetskaya Str., Andijan, Republic of Uzbekistan Department of Information Systems and Technologies National Transport University 01010, 1 Mykhailo Omelianovych Pavlenko Str., Kyiv, Ukraine Department of Sociology Dniprovsk State Technical University 51918, 2 Dniprobydivska Str., Kamianske, Ukraine Department of Informatics Teaching Nukus State Pedagogical Institute named after Ajiniyaz 230100, 1 P. Seyitov Str., Nukus, Uzbekistan Due to the intensive use of the Internet, network security is becoming a key foundation for all web applications. Intrusion detection by analysing records in network processes is an important way to solve problems in the field of network security. It has been identified that an intrusion can threaten not only the integrity of the data but also the system itself. With the development of information technology and an increase in data transfer speeds, there are threats of incorrect use of the Internet. The authors determine that more reliable control systems are needed that solve the problem of network protection without human intervention. In a number of sources, attention is focused on the possibility of autonomous detection of the vulnerability of programmes and protocols by analysing the criteria for the behaviour of the system itself. Many models are built on informal methods, such as signature ones, in which it is difficult to obtain a correct assessment of effectiveness and completeness. The authors start from the fact that the attack is characterised by states and transitions. The possibility of using neural networks has been tested. A distinctive feature of a neural network is that they start working only after the learning process. This is one of the main advantages of a neural network over conventional algorithms. The paper shows that the development of information storages is possible provided that an equilibrium state is reached when the system does not allow expanding the attack space and the information storage is available for both external access and remote disconnection. The learning model consists of arrays of data with a distributed storage environment. This is the main component of improving the performance of the intrusion detection system. The experimental results obtained showed that the proposed approach identifies anomalies more effectively than known methods. The paper is devoted to the development of a method for detecting attacks based on information about the behaviour of deviating values in the network.http://pesjournal.net/journal/v5-n2/5.pdfdatabasesunauthorised accessinternet securitynetwork processesvirus software |
spellingShingle | Zohid A. Hakimov Asilbek Medatov Viktor Kotetunov Yuriy Kravtsov Alisher Abdullaev ALGORITHM FOR THE DEVELOPMENT OF INFORMATION REPOSITORIES FOR STORING CONFIDENTIAL INFORMATION Proceedings on Engineering Sciences databases unauthorised access internet security network processes virus software |
title | ALGORITHM FOR THE DEVELOPMENT OF INFORMATION REPOSITORIES FOR STORING CONFIDENTIAL INFORMATION |
title_full | ALGORITHM FOR THE DEVELOPMENT OF INFORMATION REPOSITORIES FOR STORING CONFIDENTIAL INFORMATION |
title_fullStr | ALGORITHM FOR THE DEVELOPMENT OF INFORMATION REPOSITORIES FOR STORING CONFIDENTIAL INFORMATION |
title_full_unstemmed | ALGORITHM FOR THE DEVELOPMENT OF INFORMATION REPOSITORIES FOR STORING CONFIDENTIAL INFORMATION |
title_short | ALGORITHM FOR THE DEVELOPMENT OF INFORMATION REPOSITORIES FOR STORING CONFIDENTIAL INFORMATION |
title_sort | algorithm for the development of information repositories for storing confidential information |
topic | databases unauthorised access internet security network processes virus software |
url | http://pesjournal.net/journal/v5-n2/5.pdf |
work_keys_str_mv | AT zohidahakimov algorithmforthedevelopmentofinformationrepositoriesforstoringconfidentialinformation AT asilbekmedatov algorithmforthedevelopmentofinformationrepositoriesforstoringconfidentialinformation AT viktorkotetunov algorithmforthedevelopmentofinformationrepositoriesforstoringconfidentialinformation AT yuriykravtsov algorithmforthedevelopmentofinformationrepositoriesforstoringconfidentialinformation AT alisherabdullaev algorithmforthedevelopmentofinformationrepositoriesforstoringconfidentialinformation |