Authentication, access, and monitoring system for critical areas with the use of artificial intelligence integrated into perimeter security in a data center.

IF 2.4 Q3 COMPUTER SCIENCE, INFORMATION SYSTEMS Frontiers in Big Data Pub Date : 2023-08-31 eCollection Date: 2023-01-01 DOI:10.3389/fdata.2023.1200390
William Villegas-Ch, Joselin García-Ortiz
{"title":"Authentication, access, and monitoring system for critical areas with the use of artificial intelligence integrated into perimeter security in a data center.","authors":"William Villegas-Ch,&nbsp;Joselin García-Ortiz","doi":"10.3389/fdata.2023.1200390","DOIUrl":null,"url":null,"abstract":"<p><p>Perimeter security in data centers helps protect systems and the data they store by preventing unauthorized access and protecting critical resources from potential threats. According to the report of the information security company SonicWall, in 2021, there was a 66% increase in the number of ransomware attacks. In addition, the message from the same company indicates that the total number of cyber threats detected in 2021 increased by 24% compared to 2019. Among these attacks, the infrastructure of data centers was compromised; for this reason, organizations include elements Physical such as security cameras, movement detection systems, authentication systems, etc., as an additional measure that contributes to perimeter security. This work proposes using artificial intelligence in the perimeter security of data centers. It allows the automation and optimization of security processes, which translates into greater efficiency and reliability in the operations that prevent intrusions through authentication, permit verification, and monitoring critical areas. It is crucial to ensure that AI-based perimeter security systems are designed to protect and respect user privacy. In addition, it is essential to regularly monitor the effectiveness and integrity of these systems to ensure that they function correctly and meet security standards.</p>","PeriodicalId":52859,"journal":{"name":"Frontiers in Big Data","volume":"6 ","pages":"1200390"},"PeriodicalIF":2.4000,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10500307/pdf/","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Frontiers in Big Data","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.3389/fdata.2023.1200390","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"2023/1/1 0:00:00","PubModel":"eCollection","JCR":"Q3","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Perimeter security in data centers helps protect systems and the data they store by preventing unauthorized access and protecting critical resources from potential threats. According to the report of the information security company SonicWall, in 2021, there was a 66% increase in the number of ransomware attacks. In addition, the message from the same company indicates that the total number of cyber threats detected in 2021 increased by 24% compared to 2019. Among these attacks, the infrastructure of data centers was compromised; for this reason, organizations include elements Physical such as security cameras, movement detection systems, authentication systems, etc., as an additional measure that contributes to perimeter security. This work proposes using artificial intelligence in the perimeter security of data centers. It allows the automation and optimization of security processes, which translates into greater efficiency and reliability in the operations that prevent intrusions through authentication, permit verification, and monitoring critical areas. It is crucial to ensure that AI-based perimeter security systems are designed to protect and respect user privacy. In addition, it is essential to regularly monitor the effectiveness and integrity of these systems to ensure that they function correctly and meet security standards.

Abstract Image

Abstract Image

Abstract Image

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
关键区域的身份验证、访问和监控系统,将人工智能集成到数据中心的外围安全中。
数据中心的周界安全通过防止未经授权的访问和保护关键资源免受潜在威胁,有助于保护系统及其存储的数据。根据信息安全公司SonicWall的报告,2021年,勒索软件攻击的数量增加了66%。此外,来自同一家公司的消息显示,2021年检测到的网络威胁总数比2019年增加了24%。在这些攻击中,数据中心的基础设施遭到破坏;出于这个原因,组织包括物理元素,如安全摄像头、移动检测系统、身份验证系统等,作为有助于周边安全的额外措施。这项工作建议在数据中心的外围安全中使用人工智能。它允许安全流程的自动化和优化,从而提高操作的效率和可靠性,通过身份验证、许可证验证和监控关键区域来防止入侵。至关重要的是要确保基于人工智能的周边安全系统旨在保护和尊重用户隐私。此外,必须定期监测这些系统的有效性和完整性,以确保它们正确运行并符合安全标准。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
CiteScore
5.20
自引率
3.20%
发文量
122
审稿时长
13 weeks
期刊最新文献
Cybermycelium: a reference architecture for domain-driven distributed big data systems. Cognitive warfare: a conceptual analysis of the NATO ACT cognitive warfare exploratory concept. An enhanced whale optimization algorithm for task scheduling in edge computing environments. Promoting fairness in link prediction with graph enhancement. Exploring code portability solutions for HEP with a particle tracking test code.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1