INTELLIGENT CYBER THREATS RECOGNITION SYSTEMS AS A COMPONENT OF THE INFORMATION SECURITY SYSTEM IN TRANSPORT
Keywords:
transport, automated control systems, cyber security, threat recognition, intelligent systemsAbstract
The transport industry, in particular the railway transport (RT), is increasingly using computerized systems for management, which makes it vulnerable to cyber attacks. Intelligent threat recognition systems are becoming important for the protection of information and cyber security in transport. Ensuring cyber security for information systems and automated control systems in transport is an important task for ensuring the national security of Ukraine. This makes it possible to prevent possible cyber attacks, preserve the confidentiality of information, ensure the reliable operation of the transport system and preserve the safety of citizens. The development and implementation of effective cyber security measures are necessary steps to ensure the stability and reliability of transport systems and the preservation of national security in Ukraine. This article describes the method of intelligent recognition of threats for information systems of transport management (on the example of railway transport – TZ). The method is based on discrete procedures and the use of logical functions and fuzzy sets.
References
1. Lakhno, V. A., Petrov, O. S., Hrabariev, A. V., Ivanchenko, Y. V., & Beketova, G. S. (2016). Improving of information transport security under the conditions of destructive influence on the information-communication system. Journal of Theoretical and Applied Information Technology, 89(2), 352–361.
2. Lakhno, V., Mohylnyi, H., Donchenko, V., Smahina, O., & Pyroh, M. (2016). A model developed for teaching an adaptive system of recognising cyberattacks among nonuniform queries in information systems. Eastern-European Journal of Enterprise Technologies, 4(9), 27–36. https://doi.org/10.15587/1729-4061.2016.73315
3. Lakhno, V. (2016). Creation of the adaptive cyber threat detection system on the basis of fuzzy feature clustering. Eastern-European Journal of Enterprise Technologies, 2(9), 18–25. https://doi.org/10.15587/1729-4061.2016.66015
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Інформаційні технології в економіці та природокористуванні

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.