THE PROBLEMS OF INFORMATION DEFENCE IN DIAGNOSIS INTELLIGENT SYSTEMS OF MICROPROCESSOR DEVICES
DOI:
https://doi.org/10.47839/ijc.4.2.336Keywords:
Microprocessor devices diagnosis system, authentication, artificial neural networks, keystroke dynamicsAbstract
The method for protection of diagnosis intelligent system of microprocessor devices is represented in the paper. This method based on background authentication of the user in the process of keyboarding. The user’s keystroke dynamics characteristics are the means of authentication. For realization of the user authentication method uses the artificial neural networks of ART2 architecture.References
V.Lokazyuk. The problem of control and diagnosis contemporary microprocessor devices and systems. Measuring and computing devices in technological processes. 2 (2000). p.10-17
V.Lokazyuk, O.Pomorova, A.Dominov. Intellectual diagnosis of microprocessor devices and systems.”Taki spravi”. Kyiv, 2001. p.286.
E. Popov. Expert systems: Solution of unformalized tasks on dialogue from the computer. Science. Moscow, 1992. p.288.
Trusted Computer System Evaluation Criteria (TCSEC), US Do 5200.28-STD, 1983.
Information Technology Securite Evaluation Criteria. Harmonised Criteria of Franse – Germany – the Netherlands – the United Kindom. Department of Trade and Industry, London, 1991.
A.Grusho, E. Timonina. Theoretical bases of the information protection. Publishing house of agency " Yahtsmen". Moscow, 1996. p. 192.
Scherbakov. Learning in the theory and practice of computer safety. Publishing Molgacheva, 2001. p. 352.
F.Monrose, Aviel D. Rubin. Keystroke Dynamics as a Biometric for Authentication. Future Generation Computer Systems. (March, 2000) p. 15.
A.Gince. Biometric technology in monitoring systems of access control. Systems of safety 46 (2002). P. 46-49.
V. Tarasenko, A. Mykhailyk, D.Vorobei. Problem of expert systems information safety. Materials of Anniversary scientific and technical conference " Legal, normative and metrological supports of a protection system of the information in Ukraine", Kyiv, 1998. - pp. 62-64
G.Carpenter, S.Grossberg. ART2: Seif-organization of stable category recognition codes for analog input patterns. Applied Optics 26 (23): P.4919-4930, 1987.
M.S.Obaidat, D.T. Macchairolo. A Multilayer Neural Network System for Computer Access Security. IEEE Transactions on Systems, Man and Cybernetics, Vol.24, No.5, P.806-813, 1994.
R.Joyce, G.Gupta. Identity Authentication Based on Keystroke Latencies. Communications of ACM. Vol. 33, No. 2, P.168-176, 1990.
Downloads
Published
How to Cite
Issue
Section
License
International Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.