ON THE USE OF PREDICTIVE ANALYSIS TECHNIQUES TO PROTECT INFORMATION INFRASTRUCTURE
Keywords:
: information security, predictive analytics, behavioral analysis, UEBA, information security automationAbstract
The aim of the work was an analytical review of intelligent technologies and methods with predictive potential for solving the problems of protecting information infrastructure, allowing you to create a more secure environment; some "secondary" problems for protection associated with the very methodology for the implementation of security measures are identified, and possible directions for solving.
References
Mironova N.G. Filosofskoe osmyslenie social'nyh riskov intellektual'noj avtomatizacii social'nogo upravlenija // Cifrovoj uchenyj: laboratorija filosofa. 2021. T.4. № 2. S. 125-144. DOI: 10.32326/2618-9267-2021-4-2-125-144 - URL: https://www.elibrary.ru/item.asp?id=47145602
Suhanov A.V. Razrabotka teoreticheskih osnov i metodologii monitoringa bezopasnosti informacionnyh sistem dlja kriticheskih shem primenenijam // Dissertacija na soiskanie uchenoj stepeni doktora tehnicheskih nauk, SPb, 2010, S. 368.
Uchjonye RF primenjat geneticheskie algoritmy v sistemah cifrovoj bezopasnosti predprijatij // Informacionnyj portal «Budushhee Rossii. Nacional'nye proekty», Moskva. [Data publikacii: 08.09.2020]
Arrieta A.B., Díaz-Rodríguez N., Del Ser J., Bennetot A., Tabik S., Barbado A., Garcia S., GilLopez S., Molina D., Benjamins R., Chatila R., Herrera F. Explainable Artificial Intelligence (XAI): concepts, taxonomies, opportunities and challenges toward responsible AI // Information Fusion. Vol. 58. 2020. P. 82-115. URL: https://www.sciencedirect.com/science/article/pii/S1566253519308103 (data obrashhenija: 3.04.2021)
Knight W. DARPA is funding projects that will try to open up AI’s black boxes // MIT Technology Review. 2017. URL: https://www.technologyreview.com/2017/04/13/15259 0/the-financial-world-wants-to-open-ais-black-boxes (data obrashhenija: 5.04.2021)
Shrikumar A., Greenside P., Kundaje A. Learning Important Features Through Propagating Activation Differences – URL: https://www.arxivvanity.com/papers/1704.02685;
Shrikumar A., Greenside P., Shcherbina A., Kundaje A. Not just a black box: Learning important features through propagating activation differences. arXiv preprint arXiv:1605.01713, 2016. – URL: https://www.arxiv-vanity.com/papers/1605.01713/
Downloads
Published
Issue
Section
License
This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.
CC BY-ND
A work licensed in this way allows the following:
1. The freedom to use and perform the work: The licensee must be allowed to make any use, private or public, of the work.
2. The freedom to study the work and apply the information: The licensee must be allowed to examine the work and to use the knowledge gained from the work in any way. The license may not, for example, restrict "reverse engineering."
2. The freedom to redistribute copies: Copies may be sold, swapped or given away for free, in the same form as the original.