Кафедри

Постійне посилання на розділhttps://repository.kpi.kharkov.ua/handle/KhPI-Press/35393

Переглянути

Результати пошуку

Зараз показуємо 1 - 3 з 3
  • Ескіз
    Документ
    Processing information on the state of a computer system using probabilistic automata
    (Institute of Electrical and Electronics Engineers, 2017) Semyonov, S. G.; Gavrylenko, Svitlana; Chelak, Viktor
    The paper deals with the processing of information about the state of a computer system using a probabilistic automaton. A model of an intelligent system for detection and classification of malicious software is proposed, which compares a set of features that are characteristic for different classes of viruses with multiple states of the machine. The analysis process is reduced to modeling the operation of the automaton taking into account the probability of transition from state to state, which at each step is recalculated depending on the reaction of the environment. The received results of research allow to reach a conclusion about the possibility of using the offered system for detection of the harmful software.
  • Ескіз
    Документ
    Development of anomalous computer behavior detection method based on probabilistic automaton
    (National University of Civil Protection of Ukraine, 2019) Chelak, Viktor; Chelak, E.; Gavrylenko, Svitlana; Semenov, Serhii
    This work proposes anomalous computer system behavior detection method based on probabilistic automaton. Main components of the method are automaton structure generation model and its modification procedure. The distinctive feature of the method is the adaptation of the automaton structure generation procedure for detecting attack scenarios of the same type, by restructuring the automaton upon a match and by recalculating the probability of state changes. Proposed method allows to speed up the detection of anomalous computer behavior, as well as to detect anomalies in computer systems, scenario profiles of which only partially match the instances used to generate automaton structure. The obtained results allow us to conclude that the developed meth-od can be used in heuristic analyzers of anomaly detection systems.
  • Ескіз
    Документ
    Development of a heuristic scanner for an antivirus program on the basis of the mamdani fuzzy logic method
    (Technical University of Sofia, 2018) Gavrylenko, Svitlana; Chelak, Viktor; Gornostal, Aleksey
    The article considers the means of antivirus protection of information, their advantages and disadvantages. An analysis of modern decision-making systems is carried out. The system of fuzzy logic is chosen. A module based on the Mamdani fuzzy logic method was developed, and the developed system was tested. The obtained results of the research showed the possibility of using the developed module in heuristic analyzers of intrusion detection systems.