Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

In this work considered the problem of safety analysis of control mechanisms in modern information systems, including control software systems of cyberphysical and industrial facilities, digital control systems for distributed cyber environments VANET, FANET, MARINET, industrial Internet of things and sensor networks. The representation of security violation as a property of the system described by a complex function is proposed, in which the method of finding violations is described in the form of approximation of that function and the calculation of its values for specific systems. Various approaches to the interpolation of such function are considered in the work, it is shown that the most promising option is the use of deep neural networks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

REFERENCES

  1. Kalinin, M.O., Krundyshev, V.M., and Semianov, P.V., Architectures for building secure vehicular networks based on SDN technology, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 907–914.

    Article  Google Scholar 

  2. Kushik, N.G., Mammar, A., Cavalli, A., Yevtushenko, N.V., Jimenez, W., and Montes de Oca, E., A SPIN-based approach for detecting vulnerabilities in C programs, Autom. Control Comput. Sci., 2012, vol. 46, no. 7, pp. 379–386.

    Article  Google Scholar 

  3. Godefroid, P., Microsoft Research, Fuzzing, Microsoft—A Research Perspective, ACSC 2017.

    Google Scholar 

  4. Pechenkin, A.I. and Nikolskiy, A.V., Architecture of a scalable system of fuzzing network protocols on a multiprocessor cluster, Autom. Control Comp. Sci., 2015, vol. 49, no. 8, pp. 758–765.

    Article  Google Scholar 

  5. Poosankam, P., Pfenning, F., Platzer, A., Brumley, D., and McCamant, S., Scaling concolic execution of binary programs for security applications, PhD Thesis, Carnegie Mellon University, 2013.

  6. Hornik, K., Stinchcombe, M., and White, H., Multilayer feedforward networks are universal approximators, Neural Networks, 1989, vol. 2, no. 5, pp. 359–366.

    Article  MATH  Google Scholar 

  7. Hastad, J., Computational Limitations of Small-Depth Circuits, Cambridge, MA: MIT Press, 1987.

    Google Scholar 

  8. Yoshua Bengio, Learning deep architectures for AI, Found. Trends Mach. Learn., 2009, vol. 2, no. 1, pp. 1–127. http://dx.doi.org/.10.1561/2200000006

    Article  MATH  Google Scholar 

  9. Bengio, Y. and LeCun, Y., Scaling learning algorithms towards AI, in Large Scale Kernel Machines, Bottou, L., Chapelle, O., DeCoste, D., and Weston, J., Eds., MIT Press, 2007.

    Google Scholar 

  10. Rumelhart, D.E., Hinton, G.E., and Williams, R.J., Learning representations by back-propagating errors, Nature, 1986, vol. 323, pp. 533–536.

    Article  MATH  Google Scholar 

  11. Szegedy, C., et al., Going deeper with convolutions, 2015 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), Boston, 2015, pp. 1–9.

  12. Alemi, A.A., Ioffe, S., Szegedy, C., and Vanhoucke, V., Inceptionv4, Inception-ResNet and the impact of residual connections on learning, AAAI, 2017, vol. 4, p. 12.

    Google Scholar 

  13. Aliaksei, S. and Moschitti, S., Learning to rank short text pairs with convolutional deep neural networks, SIGIR’15 Proceedings of the 38th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2015, pp. 373–382.

  14. Ng, A.Y., et al., Deep Speech: Scaling up end-to-end speech recognition, Presentation from a SF Meetup hosted event at NVIDIA (October 6th, 2015).

  15. Graves, A., Wayne, G., and Danihelka, I., Neural Turing Machines, 2014. http://arxiv.org/abs/1410.5401.

  16. Hinton, G.E., To Recognize Shapes, First Learn to Generate Images, Tech. Rep. UTML TR 2006-003, University of Toronto, 2016.

    Google Scholar 

  17. Erhan, D., Manzagol, P.-A., Bengio, Y., Bengio, S., and Vincent, P., The difficulty of training deep architectures and the effect of unsupervised pre-training, Proceedings of The Twelfth International Conference on Artificial Intelligence and Statistics (AISTATS’09), 2009, pp. 153–160.

  18. Srivastava, N., et al., Dropout: A simple way to prevent neural networks from overfitting, J. Mach. Learn. Res., 2014, vol. 15, no. 1, pp. 1929–1958.

    MathSciNet  MATH  Google Scholar 

Download references

ACKNOWLEDGMENTS

The project results are achieved using the resources of supercomputer center of Peter the Great St. Petersburg Polytechnic University – SCC “Polytechnichesky” (www.spbstu.ru).

The project is financially supported by Ministry of Science and Higher Education of the Russian Federation, Federal Program “Researching and Development in Priority Directions of Scientific and Technological Sphere in Russia within 2014–2020” (Contract no. 14.575.21.0131, September 26, 2017, the unique identifier of the agreement RFMEFI57517X0131).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to R. A. Demidov, A. I. Pechenkin, P. D. Zegzhda or M. O. Kalinin.

Additional information

The article was translated by the authors.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Demidov, R.A., Pechenkin, A.I., Zegzhda, P.D. et al. Application Model of Modern Artificial Neural Network Methods for the Analysis of Information Systems Security. Aut. Control Comp. Sci. 52, 965–970 (2018). https://doi.org/10.3103/S0146411618080072

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411618080072

Keywords: