Intelligent System for Information Security Management: Architecture and Design Problems

Authors

  • O’rinov Nodirbek Toxirjonovich Teacher, Department of Information Technology, Andijan State University
  • Abduraxmanov Jamolidin Komoldinovich Candidate of physical and mathematical sciences, Department of Information Technology, Andijan State University

Keywords:

information security management, cyber security, intelligent system, architecture, agent based the control

Abstract

The limitations of each security technology, combined with the rise in cyber attacks, are affecting the effectiveness of information security management and increase the amount of work that must be performed network administrators and security personnel. Therefore, there is a need to increase the automated audit and intellectual reporting mechanisms for cyber trust. Intelligent systems are emerging computing systems based on intelligent methods that support continuous monitoring and control of the plant. Intelligence improves a person's ability to make better decisions. This article presents the proposed architecture of an intelligent information security system. Management (ISISM). The purpose of this system is to improve security management processes. such as monitoring, control and decision making with an effect size that is higher than security expert, providing mechanisms to enhance active knowledge building about threats, policies, procedures and risks. We focus on the requirements and design challenges for base Components of an intelligent system.

References

Berengi, HR (1994). unique strength from fuzzy logics the control. IEEE Expert, nine (4), 4.

Bhatti, R., Bertino, E., Gafur, A., & Joshi, JBD (2004). XML-based specification for web services document security. IEEE computer, 37 (4), 41-49.

Bradshaw, J.M., Suri, N., Kanas, A.J., Davis, R., Ford, K., Hoffman, R., Jeffers, R., and Reichherzer, T. (2001). Terraforming Cyberspace. A computer, 34 (7) 48-56.

Bradshaw, J. M. Kabri, J., & Montanari, R. (2003). The return of cyberspace. IEEE Computer, 36 (7), 89- 92.

Cardoso, R.K. and Freire, M.M. (2005). Security vulnerabilities and risks in Internet systems and services vices. In M. Pagani, (Ed.), Encyclopedia of Multimedia Technologies and Networks (pp. 910-916). Her- hey, Pennsylvania, IDEA GROUP REFERENCE.

Chan, H. & Perrig, A. (2003). Security and privacy in sensor networks. IEEE Computer, 36 (10), 103-105. chang, PAC (2002). Protection against flood-based distributed denial of service attacks: BUT management. IEEE Communications magazine, 40 (ten), 42-51.

Devi, SES & Ramachandran, V. (2002). Agent-based control of embedded applications. Received de-September sixteen, 2006 from http://www.hipc.org/hipc2002/2002Posters/AgentControl.pdf

Dowd, PW & McHenry, JT (1998). Network security: This time to take This is jokes aside. IEEE computer, 31 (nine), 24-28.

Giarratano, J. & riley, GRAM. (1989). Expert systems principles and programming. Boston, Massachusetts, PWS-KENT Publishing Co.

Gordon, L.A., Loeb, M.P. and Lyutsishin, V. (2003). Information security spending and real options: A wait and see an approach. A computer security log, XIX (2) 1-7.

Gordon, L.A., Loeb, M.P. and Lyutsishin, V. (2006). Computer and Cyber Security Violations: Schumpeter in save. A computer security log, XXII (4), 9-10.

Hamidi, H., & Mohammadi, K. (2006). Modeling the fault-tolerant and secure execution of mobile agents at a distance tribute systems. International Magazine from Reasonable Information Technology, 2 (one), 21-36.

Hamerl, J. L. & Voight, H. (2005). Measurement: the basis for developing and managing a security program. ment. Journal of Computer Security, XXI (2), 1-20.

Hentea, M. (1997). Architecture and design issues in a knowledge-based hybrid expert system for intellectual - gentleman qualitative the control. PhD Thesis, Illinois Institute from Technology, Chicago, Illinois.

hentea, M. (1999). Reasonable an approach behind network control system: Architecture and design questions behind ATM a computer networks. Proceedings from 1999 Advanced Modeling Technology conference, San Diego, California.

Hentea, M. (2003). An intelligent model for detecting and preventing cyberattacks. Proceedings of ISCA 12th international conference Intelligent and Adaptive Systems and Software Engineering, San Francisco. sisco, California, 5-10.

Hentea, M. (2004). A descriptive data mining model for intrusion detection systems. materials 2004 International Conference of the Information Resource Management Association, New Orleans, Lu- Isiana , 1118-1119.

Hentea, M. (2005a). Information security management. In M. Pagani, (ed.), Multimedia Encyclopedia. technology and network (p. 390-395). Hershey, Pennsylvania, IDEA GROUP REFERENCE.

Hentea, M. (2005b). Increasing Intrusion Awareness with a Neural Network Classifier. materials ISCA 14th International Conference Intelligent and Adaptive Systems and Software Development, To ronto, Canada, 163-168.

Hentea, M. (2005c). Using intelligence templates for a smart monitoring model. materials 2005 Information Resource Management Association International Conference, San Diego, CA-nya 160-163.

Hentea, M. (2006). Improving information security risk management with a fuzzy model. Proceedings 19th International Conference on Computer Applications in Industry and Engineering, Las Vegas, Nevada, 132-139.

Hwang, M3-S. Tseng, SF. and Tsai, CS. (2003). New Secure Generalization of Threshold Signature scheme. Proceedings from International Technology behind Research and education, 282-285.

Ibrahim, S.A., Folorunso, O. and Adjayi, O.B. (2005). Discovery of knowledge about closed patterns of frequent calls terns in the telecommunications database. Proceedings of the conference "Information Science and IT Education" for 2005 Joint Conference, Flagstaff, Arizona, 137–148. Can be bought at http://proceedings.informingscience.org/InSITE2005/P13f80Ibra.pdf

ISAM. (2007). Intelligent Systems Architecture for Manufacturing (ISAM): Reference Model Architect - for Intelligent Manufacturing Systems. Retrieved January 15, 2007 from http://www.isd.mel.nist.gov/projects/rcs/isam/ISAM_web.htm#framework

Jennings, N.R., Sicara, K. & Wooldridge, M. (1998). Agent research and development roadmap. Hotel. Jennings, C. Sicara, M. Georgeff (eds.), Autonomous Agents and Multi-Agent Systems, 1 (1), pp. 7-38. Boston, Massachusetts, Klyuver Academician Publishers.

Kephart, J. O. and Chess, D. M. (2003). Vision of automatic calculations. IEEE Compute, 36 (1), 41-50.

Copen, J., Sulatanik, E., Naik, GRAM., hawley, I., Peisakhov, M., Chichirello, V.A., Kam, M., & Regli, AT. (2005). Service calculations on the manets: Inclusion dynamic interoperability from first defendants. IEEE Reasonable systems, nineteen (5), 17-25.

Kung, S.Yu., Mack, M.V. and Lin, S.H. (2005). Biometric authentication. Upper Saddle River, New Jersey Prentice Hall Professional Technical reference.

Layton, F. T. (2004). Hearing on the State of Cybersecurity in the US Government. A computer Security Magazine, XX (one), 15-22.

Lindqvist, W. & Porras, P.A. (2001). eXpert - BSM: Intrusion Detection Host Solution for Sun So laris. Proceedings from in 17th _ Annual A computer Security Application Conference, 240-251.

Maywald, E. (2004). Fundamentals of Network Security. New York, New York, McGraw-Hill / Technology Education.

Manicopoulos, K. & Papavassiliou, S. (2002). Network Intrusion and Fault Detection: A Statistical Anomaly an approach. IEEE Communications magazine, 40 (ten), 76-82.

Mena, J. (2004). Homeland security linking DOTS. Software Engineering, 12 (5), 34-41.

Meistel, AM & Albus, DM, (2002). Reasonable systems architecture, design, and the control. New york, New york, John Wylie & sons, Inc.

Miller SC (2001). Facing in call from wireless security. IEEE computer, 34 (7) 16-18.

Moore, D., Paxson, V., Savage, S., Shannon, K., Stanford, S., & Weaver, N. (2003). Inside the prison worm. IEEE Security & Confidentiality, one (4), 33-39.

Passino, K.M., and Ozguner, W.W. (1996). Intellectual control: from theory to application. IEEE Expert Intelligant System and Their applications _ eleven (2) 28-30.

Ramanujan, S. & Capretez, MAM (2005). ADAM: multi-agent system for autonomous database. care and maintenance. International Journal of Intelligent Information Technology, 1 (3), 14-33.

Rodd, M.G. (1992). Real-time AI for industrial control: an overview. ICARV '92 Second International Conlink on the Automation, Robotics and computer vision, Singapore, 36-38.

Russell, S. & Norvig, P. (2003). Artificial Intelligence: A Modern Approach ( 2nd ed .). River Upper Saddle, New Jersey: Prentice Hall.

Rykhtitsky, N. (2005). Intelligent systems for production at Ford Motor Company. Intelligent IEEE systems, nineteen (5), 16-19.

Tassabeji, R. (2005). Threats to information security. In M. Pagani, (ed.), Encyclopedia of Multimedia Technology and networks ( p. 404-410). Hershey, Pennsylvania: Idea Group.

Turban, E., Aronson, JE & liang, TP. (2005). Decision support systems and reasonable systems ( 2nd ed.). Upper Saddle, New Jersey: Prentice Hall.

Volonino, L. & Robinson. (2004). SR Principles and exercise from Information safety. Upper Saddle River, New Jersey: Pearson Prentice Hall.

Wallich, P. (2003). Receiving in message. IEEE spectrum, 40 (4), 39-42.

Wang, F.Ya. (2005). Agent control for network traffic management systems. IEEE Intelligent System tems, nineteen (5), 92-96.

Wang, W. (2005). Intelligent proactive technology to ensure and secure information. Received January 5, 2005, p.

http://security.ittoolbox.com/browse.asp?c=SecurityPeerPublishing&r=http%3A%2F%2Fhosteddocs% 2Eittoolbox%2Ecom%2FIntelligentIPDMTheWinningFormula%2Epdf

Willow, C. C. (2005). An agent environment based on a neural network for managing a mail server. International Magazine from Intelligent information technologies, 1 (4), 36-52.

Jan, L. & wang, F.G. (2005). Driving in reasonable space with all-pervading communications. IEEE Intelligent System, 19 (5), 12-15.

Yao, Y., Wang, F. Y., Zeng, D. & Wang, J. (2005). Rule + Exception Strategies for Security Information analysis. IEEE Reasonable systems, nineteen (5), 52-57.

Zahedi, F. (1993). Intelligent systems for business Expert systems with neural networks. Belmont, California: Wadsworth Publishing Company.

Published

2022-04-23

How to Cite

Toxirjonovich, O. N. ., & Komoldinovich, A. J. . (2022). Intelligent System for Information Security Management: Architecture and Design Problems. European Multidisciplinary Journal of Modern Science, 5, 383–397. Retrieved from https://emjms.academicjournal.io/index.php/emjms/article/view/284

Issue

Section

Articles

Most read articles by the same author(s)