N. Boldyrikhin, O. Safaryan, P. Razumov, V. Porksheyan, I. Smirnov, D. Korochentsev, L. Cherckesova, Artem M. Romanov
{"title":"Controlling the Resources of the Intrusion Detection System at Network Objects Monitoring","authors":"N. Boldyrikhin, O. Safaryan, P. Razumov, V. Porksheyan, I. Smirnov, D. Korochentsev, L. Cherckesova, Artem M. Romanov","doi":"10.1109/ICCAIS48893.2020.9096741","DOIUrl":null,"url":null,"abstract":"The article is devoted to the optimization of intrusion detection system resources when monitoring a set of network objects. The application of the approach proposed in the article makes it possible to optimally distribute the computing resources of an information system between several objects of a network infrastructure based on the available a priori information about these objects. The scientific novelty lies in the fact that the proposed approach allows us to adapt the mathematical apparatus of the theory of observation control to the tasks of providing information protection for communication networks.","PeriodicalId":422184,"journal":{"name":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 3rd International Conference on Computer Applications & Information Security (ICCAIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCAIS48893.2020.9096741","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The article is devoted to the optimization of intrusion detection system resources when monitoring a set of network objects. The application of the approach proposed in the article makes it possible to optimally distribute the computing resources of an information system between several objects of a network infrastructure based on the available a priori information about these objects. The scientific novelty lies in the fact that the proposed approach allows us to adapt the mathematical apparatus of the theory of observation control to the tasks of providing information protection for communication networks.