Nothing Special   »   [go: up one dir, main page]

Skip to main content

Development of an Adaptive Fuzzy Algorithm for Identifying Technical Channels of Information Leakage

  • Conference paper
  • First Online:
Proceedings of Sixth International Congress on Information and Communication Technology

Abstract

This article is devoted to the problem of identifying technical channels of information leakage using a decision support subsystem and a neural network. Research is aimed at identifying technical channels of information leakage. The article describes a model for ensuring information security, which is based on an adaptive neuro-fuzzy system and a decision support subsystem that ensures the timely identification of technical channels of information leakage, the system also has the functionality to calculate sound insulation, vibration isolation, line-of-sight range, and acoustoelectric conversion. The system specified in the article makes it possible to identify technical channels of information leakage using the description of the premises, and also generates a report on the results of the data obtained with the ability to send such reports via e-mail to a specified address. The practical application of the proposed system is the possibility of its use in the initial research of the protected premises, which allows to build an effective protection system in the organization.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Clark L, Algaier W (2007) Surveillance detection the art of prevention, p 197. Cradle Press LLC

    Google Scholar 

  2. Keen P (1987) Decision support systems: the next decades. Decis Support Syst 3:253–265

    Google Scholar 

  3. Little J (1970) Models and managers: the concept of a decision calculus. Manage Sci 16(8):466–485

    Google Scholar 

  4. Pengyu L, Avraham A (2020) Extracting boolean and probabilistic rules from trained neural networks. Neural Netw 126:300–311

    Google Scholar 

  5. Yong G, Jian C, Qing D, Anton V, Den H, Qinfeng S, Mingkui T (2020) Multi-way backpropagation for training compact deep neural networks. Neural Netw 126:250–261

    Google Scholar 

  6. Zhengxin C (1992) A conceptual framework for expert system description. Comput Edu 18:259–266

    Google Scholar 

  7. Yee L (2020) Artificial intelligence and expert systems. International encyclopedia of human geography, 2nd edn, pp 209–215

    Google Scholar 

  8. Kushal A, Arun M (2018) Theoretical framework of quantitative analysis based information leakage warning system. Karbala Int J Mod Sci 4:151–163

    Google Scholar 

  9. Tao Z, Yangyang S, Yaqin W, Yanzhang G, Long F (2020) An overview of speech endpoint detection algorithms. Appl Acoust 160:107–133

    Google Scholar 

  10. Yu F, Tai A (1975) Information leakage through a passive optical channel. Opt Commun 14:51–55

    Google Scholar 

  11. Khuat T, Gabrys B (2020) Accelerated learning algorithms of general fuzzy min-max neural network using a novel hyperbox selection rule. Inf Sci

    Google Scholar 

  12. Vugar E (2020) Value of fuzzy logic for data mining and machine learning: a case study. Expert Syst Appl 162

    Google Scholar 

  13. Mordechai G, Ofer H, Gabi K, Yuval E (2016) An optical covert-channel to leak data through an air-gap. In: 14th Annual Conference on Privacy, Security and Trust (PST)

    Google Scholar 

  14. Zhentao G, Yuanyuan C, Zhang Y (2020) A novel method to compute the weights of neural networks. Neurocomputing 407:409–427

    Google Scholar 

  15. Mourad G (2020) Hybrid deep neural networks for recommender systems. Neurocomputing 413:23–30

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Razumov, P.V. et al. (2022). Development of an Adaptive Fuzzy Algorithm for Identifying Technical Channels of Information Leakage. In: Yang, XS., Sherratt, S., Dey, N., Joshi, A. (eds) Proceedings of Sixth International Congress on Information and Communication Technology. Lecture Notes in Networks and Systems, vol 216. Springer, Singapore. https://doi.org/10.1007/978-981-16-1781-2_28

Download citation

Publish with us

Policies and ethics