Modelling and Data Analysis
2024. Vol. 14, no. 3, 7–21
doi:10.17759/mda.2024140301
ISSN: 2219-3758 / 2311-9454 (online)
Analysis of Threats to Information Security of Public Authorities Using Neural Networks
Abstract
Ensuring the information security of public authorities requires the use of specialized tools that take into account various sources of information threats and their constant changes. This study aims to develop a methodology for analyzing these threats using neural networks. The research uses methods such as machine learning and neural network analysis to systematize the data. The authors adapted the Multi-Layer Perceptron (MLP) architecture and configured the hyperparameters of the neural network to achieve their objectives. The neural network was trained using the Python programming language, and its effectiveness was evaluated using metrics such as accuracy, precision, recall, and F1 score. The results of the study included the development of a method for creating a data set that encompasses assessments of threats to the information security of various public authorities and their sources. Additionally, the study evaluated the effectiveness of neural networks in solving classification problems for public authorities. Finally, the study interpreted the results of neural network analysis to determine the resistance of public authorities against information security threats.
General Information
Keywords: public authorities, information security, information threats, neural network, data set
Journal rubric: Data Analysis
Article type: scientific article
DOI: https://doi.org/10.17759/mda.2024140301
Received: 19.07.2024
Accepted:
For citation: Puinko L.E., Tolkacheva E.V. Analysis of Threats to Information Security of Public Authorities Using Neural Networks. Modelirovanie i analiz dannikh = Modelling and Data Analysis, 2024. Vol. 14, no. 3, pp. 7–21. DOI: 10.17759/mda.2024140301. (In Russ., аbstr. in Engl.)
References
- Ershov V.N., Smirnova P.L. Informatsionnaya zashchita personal'nykh dannykh: dominiruyushchii istochnik ugrozy [Information protection of personal data: the dominant source of threat]. Biznes-informatika = Business Informatics. 2012. no. 2 (20).
- Klimenko L.V. Kontseptual'nye osnovaniya issledovaniya sotsietal'noi sfery polikul'turnykh regionov [Conceptual foundations for the study of the societal sphere of multicultural regions]. Materialy mezhdunarodnoi nauchno-prakticheskoi konferentsii “Etnosotsial'nye protsessy na Yuge Rossii: sposoby regulirovaniya” (g. Maikop, 21–22 noyabrya 2017 g.) [Proceedings of the International Scientific and Practical Conference “Ethnosocial processes in the South of Russia: methods of regulation”]. Maykop: Publ. Electronic Publishing Technologies LLC, 2017. pp. 48-50.
- Laptev A.S. Tsifrovoi portal “Kriminologicheskoe planirovanie” - osnovnoi pomoshchnik v prinyatii upravlencheskikh reshenii v sfere preduprezhdeniya prestuplenii [Digital portal “Criminological planning” - the main assistant in making managerial decisions in the field of crime prevention]. Yuridicheskie issledovaniya = Legal research. 2023. no. 8. pp. 84-95. doi:10.25136/2409-7136.2023.8.43734
- Mamiev O.A., Finogenov N.A., Sologub G.B. Ispol'zovanie metodov mashinnogo obucheniya dlya resheniya zadach prognozirovaniya summy i veroyatnosti pokupki na osnove dannykh elektronnoi kommertsii [Using machine learning methods to solve problems of predicting the amount and probability of purchase based on e-commerce data]. Modelirovanie i analiz dannykh = Modeling and data analysis. 2020. T. 10. no. 4. pp. 31-40. doi:10.17759/mda.2020100403
- Mikhailova L.S. O nekotorykh problemakh obespecheniya informatsionnoi bezopasnosti organov ispolnitel'noi vlasti [About some problems of ensuring information security of executive authorities]. Vestnik Voronezhskogo instituta MVD Rossii = Bulletin of the Voronezh Institute of the Ministry of Internal Affairs of Russia. 2022. no. 2. pp. 276-282.
- Perkov A.S. [i dr.] Sravnenie metodov obucheniya neironnykh setei v zadache klassifikatsii [Comparison of neural network training methods in the classification problem] Izvestiya SPbGETU LETI = Izvestiya SPbGETU LETI. 2019. no. 6. pp. 53-61.
- Puchkov A.Yu. [i dr.] Algoritm vyyavleniya ugroz informatsionnoi bezopasnosti v raspredelennykh mul'tiservisnykh setyakh organov gosudarstvennogo upravleniya [Algorithm for identifying information security threats in distributed multiservice networks of government agencies] Prikladnaya informatika = Applied Informatics. 2023. T. 18. no. 2 (104). pp. 85-102. doi:10.37791/2687-0649-2023-18-2-85-102
- Sidenko A.I. O podgotovke strategii informatsionnoi bezopasnosti ispolnitel'nykh organov gosudarstvennoi vlasti Sankt-Peterburga [On the preparation of the information security strategy of the executive bodies of state power of St. Petersburg]. Sbornik trudov Sankt-Peterburgskoi mezhdunarodnoi konferentsii “Regional'naya informatika i informatsionnaya bezopasnost'” (g. Sankt-Peterburg, 25–27 oktyabrya 2023 g.) [Proceedings of the St. Petersburg International Conference "Regional Informatics and Information Security"]. St. Petersburg: Publ. St. Petersburg Society of Informatics, Computer Technology, Communication and Management Systems, 2023. pp. 8-18.
- Azad S. et al. IoT Cybersecurity: On the Use of Machine Learning Approaches for Unbalanced Datasets 2021 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE), Brisbane, Australia. 2021. pp. 1-6. doi:10.1109/CSDE53843.2021.9718426
- Bohme G. Am Ende des Beconschen Zeitalters, Wissenschaft und Gesellschaft. Science and. Society. no. 3. 129 p.
- Resch C. Designing an information security system 5th Annual IEEE Information Assurance Workshop. 2004. pp. 449-450. doi:10.1109/IAW.2004.1437857
- Stephen D.G. IT Audit Drivers The Basics of IT Audit. 2014. pp. 129 – 148. doi:10.1016/B978-0-12-417159-6.00007-9
Information About the Authors
Metrics
Views
Total: 68
Previous month: 56
Current month: 12
Downloads
Total: 14
Previous month: 12
Current month: 2