FIELD: computer engineering.
SUBSTANCE: said result is achieved by obtaining a list of known vulnerabilities and threats; creating artificial neural networks (ANN); obtaining a set of training samples of ANN vulnerabilities; training ANN; obtaining a list of detected vulnerabilities; signals of detected vulnerabilities are supplied to ANN inputs and probability of corresponding threat realization is obtained at the output; forming a database of signs of using information technologies; obtaining a list of known threats; creating an ANN to determine the possibility of implementing threats; obtaining a set of training samples of signs of using groups of information technologies for ANN; training ANN; obtaining a list of information technology groups; signs of each group of information technologies are supplied to the input of the ANN and the probability of the implementation of the corresponding threat is obtained at the output; generating a list of potential threats ranked by probability of implementation; forming a list of actual threats to the information infrastructure object, rejecting all threats, the implementation of which requires an intruder potential higher than a given one.
EFFECT: enabling identification of actual threats to information security of information infrastructure objects.
1 cl, 3 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD OF DETERMINING POTENTIAL THREATS TO INFORMATION SECURITY BASED ON INFORMATION ON VULNERABILITIES OF SOFTWARE | 2019 |
|
RU2705460C1 |
METHOD OF DETERMINING ACTUAL THREATS TO INFORMATION SECURITY OF INFORMATION INFRASTRUCTURE OBJECTS BASED ON WORD VECTORIZATION METHOD IN ARTIFICIAL NEURAL NETWORK | 2024 |
|
RU2833173C1 |
METHOD AND SYSTEM FOR AUTOMATED DOCUMENTATION OF SECURITY THREATS AND VULNERABILITIES RELATED TO AN INFORMATION RESOURCE | 2022 |
|
RU2789990C1 |
METHOD FOR IDENTIFYING SOFTWARE VULNERABILITIES FORMING THE CONDITIONS FOR INFORMATION SECURITY VIOLATION IN AN INFORMATION SYSTEM DUE TO A COMPUTER ATTACK | 2021 |
|
RU2783224C1 |
SYSTEM AND METHOD FOR PROTECTING USER DEVICES | 2020 |
|
RU2770146C2 |
METHOD FOR ADJUSTING THE PARAMETERS OF A MACHINE LEARNING MODEL IN ORDER TO IDENTIFY FALSE TRIGGERING AND INFORMATION SECURITY INCIDENTS | 2020 |
|
RU2763115C1 |
METHOD AND SYSTEM OF CYBER TRAINING | 2022 |
|
RU2808388C1 |
METHOD FOR PROCESSING INFORMATION SECURITY EVENTS PRIOR TO TRANSMISSION FOR ANALYSIS | 2020 |
|
RU2762528C1 |
METHOD OF PRIORITIZING INFORMATION SECURITY THREATS BASED ON DATA FROM OPEN SOURCES | 2023 |
|
RU2833413C1 |
SYSTEM AND METHOD FOR DETERMINING PROCESS ASSOCIATED WITH MALWARE ENCRYPTING COMPUTER SYSTEM FILES | 2020 |
|
RU2770570C2 |
Authors
Dates
2025-02-14—Published
2024-06-27—Filed