Репозиторий Евразийского национального университета имени Л.Н. Гумилева
Репозиторий Евразийского национального университета имени Л.Н. Гумилева
Репозиторий Евразийского национального университета имени Л.Н. Гумилева
View Item 
  •   DSpace Home
  • Научные статьи
  • 01. Публикации в изданиях зарубежных стран
  • Engineering
  • View Item
  •   DSpace Home
  • Научные статьи
  • 01. Публикации в изданиях зарубежных стран
  • Engineering
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Cloud Service for Protecting Computer Networks of Enterprises Using Intelligent Hardware and Software Devices, Based on Raspberry Pi Microcomputers

Thumbnail
Authors
Ospanova, Ademi
Zharkimbekova, Aizhan
Kussepova, Lazzat
Tokkuliyeva, Aizhan
Kokkoz, Makhabbat
Date
2022
Publisher
Acta Polytechnica Hungarica
ISSN
2064-2687
Abstract
This paper describes the development of a unified cloud service, for protecting and monitoring corporate computer networks and SOHO-class networks, with intelligent mobile software and hardware clients, based on the Raspberry Pi type microcomputer. It is planned to develop an intelligent algorithm, that performs automatic decision-making and provides recommendations, when threats are detected in the network, to finalize software and hardware, taking into account the requirements of mobility and integrability, within the cloud service. The intelligent data processing algorithm, implemented on these devices, will be based on the developed linguistic processor and the procedure of automatic assessment of network threats. Implementation of this idea consists in the development of a web service with a replenished database of threats, incidents at the nodes of a computer network and standard solutions, a system for quantitative and qualitative risk assessment, as well as, in the subsequent integration of the described intelligent mobile software and hardware device into this web application. Thus, the developed cloud service, for protecting and monitoring computer networks, will be a centralized toolkit for the joint fight against network attacks, identifying vulnerabilities in the configuration of enterprises’ networks, for using and building up a database of investigated incidents and solutions, taking into account the permissible degree of data disclosure. This work presents a developed sequential plan for the implementation of this task. Attempts have been made to substantiate, theoretically, the feasibility of implementing the described task. The authors describe the relevant tools that are currently available.
URI
http://rep.enu.kz/handle/enu/19953
View/Open
CLOUD-~1.PDF (629.6Kb)
Collections
  • Engineering[651]
Show full item record
CORE Recommender

Евразийский национальный университет имени Л.Н. Гумилева | Научная библиотека | Contact Us
Яндекс.Метрика
Научная библиотека | Contact Us
 

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

LoginRegister

Евразийский национальный университет имени Л.Н. Гумилева | Научная библиотека | Contact Us
Яндекс.Метрика
Научная библиотека | Contact Us