•  
  •  
 

Abstract

In this paper, the methods of information protection in bio systems are studied. The paper considers the use of intelligent tools in information security systems and the use of adaptive information security systems. Several articles on the field of information protection in bio systems are analyzed. Disadvantages and advantages of neural network technologies in modern information security systems are described. The characteristics of bio systems and the specificity of DNA, the main features of the DNA code that provide information security and functional stability of bio systems data protection structure. Application of intelligent tools to create a comprehensive adaptive protection of IT systems based on biosimilar.

First Page

72

Last Page

77

References

  1. V.L.Kuznetsova, M.A Rakov, self-Organization in technical systems, Kiev: Nauk, Dumka, 1987.
  2. M.E.Lobashev, Genetika [Genetics]. Leningrad: Leningrad University, 1969.
  3. A.I.Galushkin, Neyrokomputery i ikh primenenie [Neurocomputers and their application]. Moscow: IPRZHR, 2000.
  4. L.G.Osovetskiy, “Technical and Scientific prerequisites for the growth and role of information security in modern information technologies”, Izv. higher educational. Instrument making, vol. 46, no. 7, pp. 5-18, 2003.
  5. K.Draining, Protection will be active. Computerworld Russia, 2004, no. 11. 49 p.
  6. P.Robert, Protection on the client. Computerworld Russia, 2004, no. 16, 44 p.
  7. Lokacija. V. attack Detection, 2nd ed. Saint Petersburg: BHV-Petersburg, 2003, 608 p.
  8. To.Tan, “The Application of Neural Networks to UNIX Computer Security”, Proc. of the IEEE International Conf. on Neural Networks, vol. l, pp. 476-481, 1995.
  9. P.Helman, G.Liepins, W.Richards, “Foundations of Intrusion Detection”, Proc. of the 15th Computer Security Foundations Workshop, pp. 114-120, 1992.
  10. S.Kumar, E.Spafford, “A Pattern Matching Model for Misuse Intrusion Detection”, Proc. of the 17th National Computer Security Conference, pp. 11-21, 1994.
  11. J.Allen, A.Christie, W.Fithen, J.McHugh, J.Pickel, E.Stoner, “State of the Practice of Intrusion Detection Technologies”, Carnegie Mellon University. Networked Systems Survivability Program. Technical Report CMU/SEI-99-TR-028 ESC-99-028, 2000.
  12. H.I.Chervyakov, O.P.Malofey, A.V.Shaposhnikov, V.V.Bondar, “Neural networks in systems of cryptographic information protection”, Neurocomputers: development and application, no. 10, 2001.
  13. L.A.Fu, “Neural Network Model for Learning Rule-Based Systems”, Proc. of the International Joint Conference on Neural Networks, vol. 1, pp. 343-348, 1992.
  14. M.Negneyitsky, Artificial intelligence: a guide to intelligent systems. Addison-Wesley, 2002.
  15. R.Fuller, Neural Fuzzy Systems. Abo: Abo Akademi University, 1995.
  16. G.F.Nesteruk, M.S.Kupriyanov, L.G.Nesteruk, “On the implementation of intelligent systems in fuzzy and neural networkbases”, docl. VI Mezhdunarod. Conf. SCM' 2003, vol. 1, pp. 330-333, 2003.
  17. G.Ph.Nesterak, М.With.Kupnyanov, “Neural-fuzzy systems with fiizzy links”, II Proc. of the Vl-th Int. Conference SCM' 2003, vol. 1, pp. 341-344, 2003.
  18. I.V.Melik-Gaynazyan, Information processes and reality, Moscow: Nauka, 1998, 192 p.
  19. K.Kaspersky, “Attack on Windows NT. Tab "overview of antivirus tools from AIDSTEST to the information immune system"”, LAN Journal of network solutions, December, pp. 88 – 95, 2000.
  20. N.N.Yakovlev, Life and environment: Molecular and functional bases of adaptation of an organism to environmental conditions. Moscow: Nauka, 1986.

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.