Показать сокращенную информацию
dc.contributor.author | Ospanova, Ademi | |
dc.contributor.author | Zharkimbekova, Aizhan | |
dc.contributor.author | Kussepova, Lazzat | |
dc.contributor.author | Tokkuliyeva, Aizhan | |
dc.contributor.author | Kokkoz, Makhabbat | |
dc.date.accessioned | 2024-12-09T05:22:36Z | |
dc.date.available | 2024-12-09T05:22:36Z | |
dc.date.issued | 2022 | |
dc.identifier.issn | 2064-2687 | |
dc.identifier.uri | http://rep.enu.kz/handle/enu/19953 | |
dc.description.abstract | This paper describes the development of a unified cloud service, for protecting and monitoring corporate computer networks and SOHO-class networks, with intelligent mobile software and hardware clients, based on the Raspberry Pi type microcomputer. It is planned to develop an intelligent algorithm, that performs automatic decision-making and provides recommendations, when threats are detected in the network, to finalize software and hardware, taking into account the requirements of mobility and integrability, within the cloud service. The intelligent data processing algorithm, implemented on these devices, will be based on the developed linguistic processor and the procedure of automatic assessment of network threats. Implementation of this idea consists in the development of a web service with a replenished database of threats, incidents at the nodes of a computer network and standard solutions, a system for quantitative and qualitative risk assessment, as well as, in the subsequent integration of the described intelligent mobile software and hardware device into this web application. Thus, the developed cloud service, for protecting and monitoring computer networks, will be a centralized toolkit for the joint fight against network attacks, identifying vulnerabilities in the configuration of enterprises’ networks, for using and building up a database of investigated incidents and solutions, taking into account the permissible degree of data disclosure. This work presents a developed sequential plan for the implementation of this task. Attempts have been made to substantiate, theoretically, the feasibility of implementing the described task. The authors describe the relevant tools that are currently available. | ru |
dc.language.iso | en | ru |
dc.publisher | Acta Polytechnica Hungarica | ru |
dc.relation.ispartofseries | Vol. 19, No. 4; | |
dc.subject | corporate networks | ru |
dc.subject | computer networks security | ru |
dc.subject | cloud service | ru |
dc.subject | intelligent system | ru |
dc.subject | single-board computer | ru |
dc.subject | Raspberry Pi | ru |
dc.title | Cloud Service for Protecting Computer Networks of Enterprises Using Intelligent Hardware and Software Devices, Based on Raspberry Pi Microcomputers | ru |
dc.type | Article | ru |