Skip to main content
Log in

Using Artificial Neural Networks to Estimate the Probability of Information Security Threat Occurrences

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

This article defines the possibility of using artificial neural networks for evaluating the probability of information safety threat occurrences and the development of a computer program. The result of analyzing the threat occurrence probability has shown that artificial neural networks can be used to evaluate the probability of information security threat occurrence. An application for evaluating the threat occurrence probability is developed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.
Fig. 5.
Fig. 6.
Fig. 7.

Similar content being viewed by others

REFERENCES

  1. GOST R (State Standard) ISO/MEK 27001–2006: Information Technology. Methods and Tools of Security. Systems of Management of Information Security. Requirements, 2006.

  2. GOST R (State Standard) 50922–2006: Information Protection. Main Terminology and Definitions, 2006.

  3. Vasiliev, Y.S., Zegzhda, P.D., and Zegzhda, D.P., Providing security for automated process control systems at hydropower engineering facilities, Therm. Eng., 2016, vol. 63, no. 13, pp. 948–956. https://doi.org/10.1134/S0040601516130073

    Article  Google Scholar 

  4. Zegzhda, D.P. and Pavlenko, E.Yu., Cyber-sustainability of software-defined networks based on situational management, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 984–992.  https://doi.org/10.3103/S0146411618080291

    Article  Google Scholar 

  5. Zegzhda, D., Lavrova, D., and Poltavtseva, M., Multifractal security analysis of cyberphysical systems, Nonlin. Phenom. Complex Syst. (Minsk, Belarus), 2019, vol. 22, no. 2, pp. 196–204.

    Google Scholar 

  6. Database of information security threats, Gos. Nauch.-Issled. Ispytatel’nyi Inst. Probl. Tekh. Zashchity Inf. https://bdu.fstec.ru/documents. Cited November 11, 2020.

  7. Bodyanskii, E.V. and Rudenko, O.G., Iskusstvennye neironnye seti. Arkhitektury, obuchenie, primeneniya (Artificial Neural Networks: Architectures, Learning, Applications), Kharkov: Teletekh, 2004.

  8. Khaikin, S., Neironnye seti. Polnyi kurs (Neural Networks: Complete Course), Moscow: Vil’yams, 2008, 2nd ed.

  9. Bishop, C.M., Neural Networks for Pattern Recognition, Oxford: Oxford Univ. Press, 1995.

    MATH  Google Scholar 

  10. Anisimov, V.V., Iskusstvennye neironnye seti. Metodicheskie materialy dlya vypolneniya kursovogo proekta (Artificial Neural Networks: Methodological Materials for a Course Project), Khabarovsk: Dal’nevost. Gos. Univ. Putei Soobshcheniya, 2011.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to E. V. Karachanskaya.

Ethics declarations

The authors declare that they have no conflicts of interest.

Additional information

Translated by S. Kuznetsov

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Antonov, R.A., Karachanskaya, E.V. & Khandozhko, G.V. Using Artificial Neural Networks to Estimate the Probability of Information Security Threat Occurrences. Aut. Control Comp. Sci. 55, 941–948 (2021). https://doi.org/10.3103/S0146411621080046

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411621080046

Keywords:

Navigation