Computational intelligence technologies stack for protecting the critical digital infrastructures against security intrusions

التفاصيل البيبلوغرافية
العنوان: Computational intelligence technologies stack for protecting the critical digital infrastructures against security intrusions
المؤلفون: Maxim O. Kalinin, Vasiliy Krundyshev
المصدر: 2021 Fifth World Conference on Smart Trends in Systems Security and Sustainability (WorldS4).
بيانات النشر: IEEE, 2021.
سنة النشر: 2021
مصطلحات موضوعية: Dynamic network analysis, Network Access Protection, Wireless network, Computer science, business.industry, Control reconfiguration, Computational intelligence, Computer security, computer.software_genre, Network management, Network performance, Security management, business, computer
الوصف: Over the past decade, an infotelecommunication technology has made significant strides forward. With the advent of new generation wireless networks and the massive digitalization of industries, the object of protection has changed. The digital transformation has led to an increased opportunity for cybercriminals. The ability of computational intelligence to quickly process large amounts of data makes the intrusions tailored to specific environments. Polymorphic attacks that have mutations in their sequences of acts adapt to the communication environments, operating systems and service frameworks, and also try to deceive the defense tools. The poor protection of most Internet of Things devices allows the attackers to take control over them creating the megabotnets. In this regard, traditional methods of network protection become rigid and low-effective. The paper reviews a computational intelligence (CI) enabled software- defined network (SDN) for the network management, providing dynamic network reconfiguration to improve network performance and security control. Advanced machine learning and artificial neural networks are promising in detection of false data injections. Bioinformatics methods make it possible to detect polymorphic attacks. Swarm intelligence detects dynamic routing anomalies. Quantum machine learning is effective at processing the large volumes of security-relevant datasets. The CI technology stack provides a comprehensive protection against a variative cyberthreats scope.
DOI: 10.1109/worlds451998.2021.9514004
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::5a54eed9492f6584fa16539bcc279c4a
https://doi.org/10.1109/worlds451998.2021.9514004
Rights: CLOSED
رقم الانضمام: edsair.doi...........5a54eed9492f6584fa16539bcc279c4a
قاعدة البيانات: OpenAIRE
الوصف
DOI:10.1109/worlds451998.2021.9514004