Abstract
In this paper, the methods of information protection in bio systems are studied. The paper considers the use of intelligent tools in information security systems and the use of adaptive information security systems. Several articles on the field of information protection in bio systems are analyzed. Disadvantages and advantages of neural network technologies in modern information security systems are described. The characteristics of bio systems and the specificity of DNA, the main features of the DNA code that provide information security and functional stability of bio systems data protection structure. Application of intelligent tools to create a comprehensive adaptive protection of IT systems based on biosimilar.
First Page
72
Last Page
77
References
- V.L.Kuznetsova, M.A Rakov, self-Organization in technical systems, Kiev: Nauk, Dumka, 1987.
- M.E.Lobashev, Genetika [Genetics]. Leningrad: Leningrad University, 1969.
- A.I.Galushkin, Neyrokomputery i ikh primenenie [Neurocomputers and their application]. Moscow: IPRZHR, 2000.
- L.G.Osovetskiy, “Technical and Scientific prerequisites for the growth and role of information security in modern information technologies”, Izv. higher educational. Instrument making, vol. 46, no. 7, pp. 5-18, 2003.
- K.Draining, Protection will be active. Computerworld Russia, 2004, no. 11. 49 p.
- P.Robert, Protection on the client. Computerworld Russia, 2004, no. 16, 44 p.
- Lokacija. V. attack Detection, 2nd ed. Saint Petersburg: BHV-Petersburg, 2003, 608 p.
- To.Tan, “The Application of Neural Networks to UNIX Computer Security”, Proc. of the IEEE International Conf. on Neural Networks, vol. l, pp. 476-481, 1995.
- P.Helman, G.Liepins, W.Richards, “Foundations of Intrusion Detection”, Proc. of the 15th Computer Security Foundations Workshop, pp. 114-120, 1992.
- S.Kumar, E.Spafford, “A Pattern Matching Model for Misuse Intrusion Detection”, Proc. of the 17th National Computer Security Conference, pp. 11-21, 1994.
- J.Allen, A.Christie, W.Fithen, J.McHugh, J.Pickel, E.Stoner, “State of the Practice of Intrusion Detection Technologies”, Carnegie Mellon University. Networked Systems Survivability Program. Technical Report CMU/SEI-99-TR-028 ESC-99-028, 2000.
- H.I.Chervyakov, O.P.Malofey, A.V.Shaposhnikov, V.V.Bondar, “Neural networks in systems of cryptographic information protection”, Neurocomputers: development and application, no. 10, 2001.
- L.A.Fu, “Neural Network Model for Learning Rule-Based Systems”, Proc. of the International Joint Conference on Neural Networks, vol. 1, pp. 343-348, 1992.
- M.Negneyitsky, Artificial intelligence: a guide to intelligent systems. Addison-Wesley, 2002.
- R.Fuller, Neural Fuzzy Systems. Abo: Abo Akademi University, 1995.
- G.F.Nesteruk, M.S.Kupriyanov, L.G.Nesteruk, “On the implementation of intelligent systems in fuzzy and neural networkbases”, docl. VI Mezhdunarod. Conf. SCM' 2003, vol. 1, pp. 330-333, 2003.
- G.Ph.Nesterak, М.With.Kupnyanov, “Neural-fuzzy systems with fiizzy links”, II Proc. of the Vl-th Int. Conference SCM' 2003, vol. 1, pp. 341-344, 2003.
- I.V.Melik-Gaynazyan, Information processes and reality, Moscow: Nauka, 1998, 192 p.
- K.Kaspersky, “Attack on Windows NT. Tab "overview of antivirus tools from AIDSTEST to the information immune system"”, LAN Journal of network solutions, December, pp. 88 – 95, 2000.
- N.N.Yakovlev, Life and environment: Molecular and functional bases of adaptation of an organism to environmental conditions. Moscow: Nauka, 1986.
Recommended Citation
Sayfullaev, Sherzod
(2020)
"ANALYSIS OF INFORMATION SECURITY METHODS IN BIOSYSTEMS AND APPLICATION OF INTELLIGENT TOOLS IN INFORMATION SECURITY SYSTEMS,"
Chemical Technology, Control and Management: Vol. 2020:
Iss.
3, Article 12.
DOI: https://doi.org/10.34920/2020.3.72-77
Included in
Complex Fluids Commons, Controls and Control Theory Commons, Industrial Technology Commons, Other Computer Engineering Commons, Process Control and Systems Commons, Systems and Integrative Engineering Commons