La inteligencia artificial en la seguridad informática: Una revisión literaria
Bernabé Ortega-Tenezaca,
No information about this author
Lady Rodriguez Carmona,
No information about this author
Edgar Macías Farias
No information about this author
et al.
Arandu-UTIC.,
Journal Year:
2025,
Volume and Issue:
11(2), P. 2798 - 2819
Published: Jan. 8, 2025
El
presente
trabajo
tiene
como
objetivo,
presentar
una
revisión
y
análisis
de
la
literatura
científica
más
reciente,
relativa
a
aplicación
uso
inteligencia
artificial,
en
detección
amenazas,
el
campo
seguridad
informática,
mediante
algoritmos
los
aprendizaje
automático,
sus
principales
tendencias
para
enfrentar
desafíos
actuales,
relativas
ataques
evasivos
que
intentan
burlar
sistemas
tradicionales,
tomando
cuenta
las
fortalezas,
debilidades
retos
aún
persisten
identificación
patrones
sospechosos,
necesidad
grandes
cantidades
datos
alta
calidad
entrenar
modelos
IA.
La
importancia
este
radica
sirve
guía,
investigadores,
desarrolladores
software
profesionales
se
encuentren
interesados
generar
fallas
robustos
eficientes,
congruentes
con
necesidades
actuales.
Modeling and Assessing the Attack Behaviour of Weak Passwords Based on Attack Graph
Xiao He,
No information about this author
X. R. Chen,
No information about this author
Chengliang Gao
No information about this author
et al.
Communications in computer and information science,
Journal Year:
2025,
Volume and Issue:
unknown, P. 128 - 144
Published: Jan. 1, 2025
Language: Английский
Towards Double-Layer Dynamic Heterogeneous Redundancy Architecture for Reliable Railway Passenger Service System
Xinghua Wu,
No information about this author
Mingzhe Wang,
No information about this author
Jinsheng Shen
No information about this author
et al.
Electronics,
Journal Year:
2024,
Volume and Issue:
13(18), P. 3592 - 3592
Published: Sept. 10, 2024
Researchers
have
proposed
the
dynamic
heterogeneous
redundancy
(DHR)
architecture,
which
integrates
dynamic,
heterogeneous,
redundant,
and
closed-loop
feedback
elements
into
system,
to
fortify
reliability
of
railway
passenger
service
system
(RPSS).
However,
there
are
at
least
two
weaknesses
with
common
DHR
architectures:
(1)
they
need
nodes
enough
computing
storage
resources;
(2)
hardly
considered
architecture.
To
this
end,
paper
proposes
a
double-layer
(DDHR)
architecture
ensure
RPSS.
This
introduces
set
algorithms,
optimized
co-computation
ruling
weight
optimization
algorithms
for
data
processing
flow
DDHR
improves
For
evaluation
also
metrics:
Dynamic
available
similarity
metric.
metric
does
not
rely
on
overall
redundant
executor
sets
but
evaluates
their
performance
under
specified
interaction
paths
within
single
scheduling
cycle.
The
smaller
its
similarity,
higher
reliability.
Scheduling
cycle
dual-layer
threshold.
RPSS
actual
conditions
by
setting
schedulable
thresholds
between
same
different
layers
executives
in
process.
Finally,
analog
simulation
experiments
prototype
building
carried
out,
whose
numerical
experimental
results
show
that
outperforms
traditional
terms
dynamically
thresholds,
while
algorithmic
complexity
multi-tasking
concurrency
slightly
weaker
than
can
be
applied
main
operations
general.
Language: Английский
Cloud Edge Integrated Security Architecture of New Cloud Manufacturing System
Longbo Zhao,
No information about this author
Bohu Li,
No information about this author
Haitao Yuan
No information about this author
et al.
Journal of Systems Engineering and Electronics,
Journal Year:
2024,
Volume and Issue:
35(5), P. 1177 - 1189
Published: Oct. 1, 2024
Language: Английский
Application of anti-mapping security access technology in network security protection
Applied Mathematics and Nonlinear Sciences,
Journal Year:
2024,
Volume and Issue:
9(1)
Published: Jan. 1, 2024
Abstract
In
the
current
era,
characterized
by
pervasive
Internet
of
Everything,
trillions
data
points
are
exposed
to
high-level
threats,
presenting
novel
challenges
domain
cyberspace
security.
This
paper
introduces
a
cybersecurity
protection
framework
derived
from
PDRR
model,
enriched
with
integrated
measures.
Utilizing
mapping
architecture
that
incorporates
anti-mapping
security
access
technology,
we
analyze
robustness
protections.
The
employs
penetration
testing
queue
technology
uncover
vulnerabilities
within
cyberspace,
Hidden
Markov
Model
assess
posture,
and
QPSO-LightGBM
model
evaluate
vulnerabilities.
To
validate
efficacy
in
employing
have
systematically
conducted
various
experimental
methodologies,
including
testing,
posture
sensing,
vulnerability
assessment.
approach
provides
comprehensive
for
addressing
complex
posed
vast
scale
today’s
interconnected
environments.
average
send/receive
telegram
packets
network
I/O
graph
state
SYN
flooding
attack
grows
60
packets/sec
normal
2.2*10
4
packets/sec,
minimum
time
perception
is
only
51.28ms.
accuracy
assessment
reaches
86.58%.
Fully
utilizing
anti-marker
can
improve
understanding
threat
situation
enhance
ability.
Language: Английский
Emerging Authentication Technologies for Zero Trust on the Internet of Things
Chanapha Bast,
No information about this author
Kuo‐Hui Yeh
No information about this author
Symmetry,
Journal Year:
2024,
Volume and Issue:
16(8), P. 993 - 993
Published: Aug. 5, 2024
The
large
and
interconnected
nature
of
the
Internet
Things
(IoT)
presents
unique
security
challenges,
even
as
it
revolutionizes
various
sectors.
With
numerous
devices,
often
limited
in
resources,
traditional
perimeter-based
methods
struggle
to
keep
pace.
“never
trust,
always
verify”
principle
zero
trust
offers
a
viable
solution.
Zero
is
concept
that
has
become
increasingly
popular,
using
key
exchange
techniques
ensure
secure
authenticated
communication
within
network,
especially
managing
risks
critical
infrastructure.
Authentication
process
identify
an
entity,
prerequisite
for
authorization,
essential
granting
access
control.
It
fundamentally
relies
on
management
generate
manage
cryptographic
keys
authentication.
aim
this
study
enhance
context
by
investigating
authentication
discussing
several
potential
solutions
successful
implementation.
This
also
performance
evaluation
criteria
IoT
introduces
advanced
approaches
different
scenarios,
including
lightweight
cryptography,
mutual
authentication,
blockchain
technology.
Finally,
we
address
challenges
related
implementation
future
directions
research.
Language: Английский