首页> 美国政府科技报告 >Formal Methods for Information Protection Technology. Task 2: Mathematical Foundations, Architecture and Principles of Implementation of Multi-Agent Learning Components for Attack Detection in Computer Networks. Part 2
【24h】

Formal Methods for Information Protection Technology. Task 2: Mathematical Foundations, Architecture and Principles of Implementation of Multi-Agent Learning Components for Attack Detection in Computer Networks. Part 2

机译:信息保护技术的形式化方法。任务2:计算机网络中攻击检测的多智能学习组件的数学基础,体系结构和实现原理。第2部分

获取原文

摘要

The use of open computer networks as an environment for exchange of information across the globe in distributed applications requires improved security measures on the network, in particular, to information resources used in applications. Integrity, confidentiality and availability of the network resources must be assured. To detect and suppress different types of computer unauthorized intrusions, modern network security systems (NSS) must be armed with various protection means and be able to accumulate experience in order to increase its ability to front against known types of intrusions, and to learn new types of intrusions. The project will perform three main tasks. 1. Develop a mathematical model and a tool that simulates various coordinated intrusion scenarios against computer networks; 2. Develop the mathematical foundations, architecture, and principles of implementation of autonomous-software-tool technology implementing the learning system for intrusion detection; 3. Develop the fundamentals, architecture and software for the computer security system based on multi-level encoding for information protection in mass application. To detect and suppress different types of computer intrusions, modern NSS must be able to accumulate experience in order to increase its ability to front against known type of attacks/intrusions and to learn unknown simple and complex, local and distributed types of attacks. This requires the use of a powerful intelligent learning subsystem (LS) in NSS. That is why the second task of the project concerns to the development of the formal model, architecture, and software prototype of the autonomous intelligent learning system for detection of the attacks/intrusions against computer network.

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号