•  
  •  
 

Abstract

The structures of intelligent information protection systems are considered. The tree of tasks for protecting information of the information system of enterprise is presented. Information security management systems without automation of management processes and automated information security management systems are considered. The functional capabilities of multi-agent information protection systems are investigated and possible risks are analyzed. The proposed schemes of automated and automated information security management systems are described. The proposed technology for constructing a software package for an enterprise information security management system is considered, based on the concept of multi-agent systems as the basic technology for software implementation of an information security management system.

First Page

63

Last Page

71

References

1. T.F.Bekmuratov, F.B.Botirov, “Multi-agentli tizimlarni axborot xavfsizligi tizimlarida qо‘llanilishi”, Problemi informatiki i energetiki, no. 5, pp. 78-83, 2018.

2. T.F.Bekmuratov, F.B.Botirov, “Kiberhimoya boshqaruvining intellektual mexanizmlari”, Axborot texnologiyalari va kommunikatsiyalari sohasida axborot xavfsizligi va kiberxavfsizlik muammolari: Respublika miqyosidagi ilmiy-texnik konferensiyasi, Toshkent, 2018, 108-112 b.

3. T.F.Bekmuratov, “Concepts and post-modern intellectual systems of information and information technologies”, Problems of information security and cyber security in information technologies and communications: Republican scientific and technical conference, Tashkent, 2018, pp. 4-8.

4. T.F.Bekmuratov, “Mul'tiagentnaya gibridnaya nechetko-neyronnaya e`kspertnaya sistema informacionnoy bezopasnosti” [Multi-agent hybrid clearly-neural electronic information security system], Problemy' informatiki i e`nergetiki, no. 3-4, pp. 3-14, 2013 (in Russian).

5. T.F.Bekmuratov, “Nechetko-neyronnaya e`kspertnaya sistema informacionnoy bezopasnosti: harakteristiki, koncepciya i zadachi postroeniya” [Fuzzy-neural electronic information security system: characteristics, concept and tasks of construction], DAN RUz, no. 6, pp. 16-20, 2013 (in Russian).

6. T.F.Bekmuratov, F.B.Botirov, “Kiberhimoya boshqaruvning intellectual mexanizmlari”, Materialy' Respublikanskoy nauchno-prakticheskoy konferencii «Problemy' informacionnoy bezopasnosti i kiberbezopasnosti v sfere informacionno-kommunikacionnoy tehnologii», Tashkent, 22-23 noyabr', 2018, pp. 106-108.

7. K.YE.Legkov, “Metodicheskiye osnovi upravleniya informatsionnimi podsistemami avtomatizirovannix sistem upravleniya slojnimi obyektami spetsialnogo naznacheniya” [Methodological bases of information subsystem management automated control systems for complex special purpose objects], T-Comm: Telekommunikatsii i transport, vol. 12, no. 5, pp. 31-40, 2018 (in Russian).

8. M.A.Malkov, “Informatsionnaya bezopasnost i yazik programmirovaniya CS” [Information security and the CS programming language], Intellektualniye sistemi. Teoriya i prilojeniY, vol. 20, no. 3, pp. 209-213, 2016. (in Russian).

9. YE.A.Jidko, S.N.Razinkov, “Model podsistemi bezopasnosti i zashiti informatsii sistemi svyazi i upravleniya kriticheski vajnogo obyekta” [Model of the information security and protection subsystem of the communication and management system of a critical object], Sistemi upravleniya, svyazi i bezopasnosti, no. 1, pp. 122-135, 2018. (in Russian) URL: http://sccs.intelgr.com/archive/2018-01/06-Zhidko.pdf.

10. T.F.Bekmuratov, F.B.Botirov, “Multi-agent system of protecting information from unauthorized access”, Chemical technology. control and management, no. 1(85), pp. 72-77, 2019.

11. T.F.Bekmuratov, F.B.Botirov, M.M.Nabiyev, “Mashinali о‘qitish va chuqur о‘qitishning vazifalari va kiberxavfsizlik”, “Muhammad al- Xorazmiy avlodlari” ilmiy amaliy va axborot tahliliy jurnali, no. 3(9)/2019, pp. 3-7.

12. T.F.Bekmuratov, F.B.Botirov, “Problems of information security management”, Problems of information security in information technologies and communications: Republican scientific and technical conference, Tashkent, 2019, pp. 151-155.

13. YE.A.Jidko, “Nauchno-obosnovanniy podxod k klassifikatsii ugroz informatsionnoy bezopasnosti” [A science-based approach to classifying information security threats], Informatsionniye sistemi i texnologii, no. 1 (87), pp. 132-139, 2015 (in Russian).

14. S.A.Sazonova, “Otsenka nadejnosti raboti setevix obyektov” [Evaluating the reliability of network objects], Vestnik Voronejskogo instituta visokix texnologiy, no. 1 (16), pp. 40-42, 2016 (in Russian).

15. V.YE.Gavrilov, A.A.Zatsarinniy, “Nekotoriye sistemotexnicheskiye i normativno-metodicheskiye voprosi obespecheniya zashiti informatsii v avtomatizirovannix informatsionnix sistemax na oblachnix texnologiyax s ispolzovaniyem metodov iskusstvennogo intellekta” [Some of the system-technical and normative-methodical questions of ensuring the protection of information in automated information systems on the basis of textual criticism with the use of artificial intelligence methods], Sistemi i sredstva informatiki, vol. 26, no. 4, pp. 38-50, 2016 (in Russian).

16. A.Ghalechyan, Information Struggle in the military field (Teghekatvakan payqary’ r’azmakan olortum, in Armenian). Yerevan: Noravank SEF, 2016.

17. E.A.Harutyunyan, “The Problem of Combination of Civilization and Human Qualities (Qaghaqakrt’ut’yan u mardkayin orakneri hamateghman himnaharcy’, in Armenian) Transitional Society”, Socio-Cultural Transformations, pp. 52-68, 2002.

18. T.L.Partyka, & I.I.Polov, Information Security (Informatsionnaya bezopasnost’). Moscow: Infra, 2002 (in Russian).

19. I.S.Melyukhin, Informatsionnoe obshchestvo (Informational Socienty, in Russian). Moscow: MSU, 1999.

20. S.N.Mokrousov, “Security issues in the development of oil and gas resources on the continental shelf and on land of the Russian Federation”, Journal-directory Transport security and technology, no. 1, 2006.

21. Ian Goodfellow, Yoshua Bengio, Aaron Courville - Deep Learning The MIT Press Cambridge, Massachusetts London, England. ISBN 978-1-491-93799-0 (анг.) © 2017 Massachusetts Institute of Technology.

Included in

Engineering Commons

Share

COinS
 
 

To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.