An algorithm based on artificial intelligence for solving information security tasks
نویسندگان
چکیده
In the age of rapidly developing information technologies, when process informatization has long touched almost all aspects human life, it is impossible to imagine a single company that would not use computer network for its functioning. And also with development software and hardware infrastructure companies, security requirements are growing. But business through introduction Internet only increases number threats associated availability, integrity confidentiality information. The antivirus software, intrusion detection prevention systems does fundamentally change statistics on attacks enterprises. variety growing every year, financial losses from viruses unauthorized access system proportionally. Artificial intelligence (AI) present in areas our activities. Whether household area or commercial one. this regard, AI fields more often observed, which promising research. article describes ways possible application artificial methods field protection, proposes an algorithm protection abnormal requests. immune makes increase effectiveness threat by comparison existing analogues. A distinctive feature these ability solve multidimensional problems enormous computational complexity real time.
منابع مشابه
the algorithm for solving the inverse numerical range problem
برد عددی ماتریس مربعی a را با w(a) نشان داده و به این صورت تعریف می کنیم w(a)={x8ax:x ?s1} ، که در آن s1 گوی واحد است. در سال 2009، راسل کاردن مساله برد عددی معکوس را به این صورت مطرح کرده است : برای نقطه z?w(a)، بردار x?s1 را به گونه ای می یابیم که z=x*ax، در این پایان نامه ، الگوریتمی برای حل مساله برد عددی معکوس ارانه می دهیم.
15 صفحه اولArtificial Intelligence for Homeland Security
T he tragic events of 11 September 2001, and the subsequent anthrax letter contaminations had drastic effects on many aspects of US society. Terrorism became the most significant threat to national security because of its real and potential damage to our infrastructure, economy, and people. In response to this challenge, federal authorities began actively implementing comprehensive strategies a...
متن کاملAn artificial intelligence model based on LS-SVM for third-party logistics provider selection
The use of third-party logistics (3PL) providers is regarded as new strategy in logistics management. The relationships by considering 3PL are sometimes more complicated than any classical logistics supplier relationships. These relationships have taken into account as a well-known way to highlight organizations' flexibilities to regard rapidly uncertain market conditions, follow core competenc...
متن کاملArtificial intelligence and security: An overview
The junction of AI and computer security is an area of increasing concern, due to the imminent application of AI to fielded systems. Two new areas of research need are identified: artificial intelligence techniques in the development of secure systems and in analyzing the security characteristics of software; and verification of the security of artificial intelligence. Current and proposed rese...
متن کاملAN IMPROVED INTELLIGENT ALGORITHM BASED ON THE GROUP SEARCH ALGORITHM AND THE ARTIFICIAL FISH SWARM ALGORITHM
This article introduces two swarm intelligent algorithms, a group search optimizer (GSO) and an artificial fish swarm algorithm (AFSA). A single intelligent algorithm always has both merits in its specific formulation and deficiencies due to its inherent limitations. Therefore, we propose a mixture of these algorithms to create a new hybrid optimization algorithm known as the group search-artif...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: E3S web of conferences
سال: 2023
ISSN: ['2555-0403', '2267-1242']
DOI: https://doi.org/10.1051/e3sconf/202337103066