Репозиторий Евразийского национального университета имени Л.Н. Гумилева
Репозиторий Евразийского национального университета имени Л.Н. Гумилева
Репозиторий Евразийского национального университета имени Л.Н. Гумилева
Просмотр элемента 
  •   Главная
  • Научные статьи
  • 01. Публикации в изданиях зарубежных стран
  • Engineering
  • Просмотр элемента
  •   Главная
  • Научные статьи
  • 01. Публикации в изданиях зарубежных стран
  • Engineering
  • Просмотр элемента
JavaScript is disabled for your browser. Some features of this site may not work without it.

Cloud Service for Protecting Computer Networks of Enterprises Using Intelligent Hardware and Software Devices, Based on Raspberry Pi Microcomputers

Thumbnail
Автор
Ospanova, Ademi
Zharkimbekova, Aizhan
Kussepova, Lazzat
Tokkuliyeva, Aizhan
Kokkoz, Makhabbat
Дата
2022
Редактор
Acta Polytechnica Hungarica
ISSN
2064-2687
Аннотации
This paper describes the development of a unified cloud service, for protecting and monitoring corporate computer networks and SOHO-class networks, with intelligent mobile software and hardware clients, based on the Raspberry Pi type microcomputer. It is planned to develop an intelligent algorithm, that performs automatic decision-making and provides recommendations, when threats are detected in the network, to finalize software and hardware, taking into account the requirements of mobility and integrability, within the cloud service. The intelligent data processing algorithm, implemented on these devices, will be based on the developed linguistic processor and the procedure of automatic assessment of network threats. Implementation of this idea consists in the development of a web service with a replenished database of threats, incidents at the nodes of a computer network and standard solutions, a system for quantitative and qualitative risk assessment, as well as, in the subsequent integration of the described intelligent mobile software and hardware device into this web application. Thus, the developed cloud service, for protecting and monitoring computer networks, will be a centralized toolkit for the joint fight against network attacks, identifying vulnerabilities in the configuration of enterprises’ networks, for using and building up a database of investigated incidents and solutions, taking into account the permissible degree of data disclosure. This work presents a developed sequential plan for the implementation of this task. Attempts have been made to substantiate, theoretically, the feasibility of implementing the described task. The authors describe the relevant tools that are currently available.
URI
http://rep.enu.kz/handle/enu/19953
Открыть
CLOUD-~1.PDF (629.6Kb)
Collections
  • Engineering[651]
Показать полную информацию
CORE Recommender

Евразийский национальный университет имени Л.Н. Гумилева | Научная библиотека | Контакты
Яндекс.Метрика
Научная библиотека | Контакты
 

Просмотр

Весь DSpaceСообщества и коллекцииДата публикацииАвторыНазванияТематикаЭта коллекцияДата публикацииАвторыНазванияТематика

Моя учетная запись

ВойтиРегистрация

Евразийский национальный университет имени Л.Н. Гумилева | Научная библиотека | Контакты
Яндекс.Метрика
Научная библиотека | Контакты