CONTROL MODEL OF DATA STREAM TRANSMITTED OVER A NETWORK BASED ON PROXYING TECHNOLOGY
Network traffic control model is described in the work, including data mining modules transmitted in the network as well as further qualified data analysis module based on artificial intelligence methods and means, namely recursive and convolutional neural networks. The topicality of work is proved by the intensive scientific research conducted in the field of information security, big data intelligent data processing tools, and stipulated by growing necessity to limit access of children to aggressive information, which can impact on the child’s psychoemotional state. Particular attention is paid in the article to proxy-server development for HTTP query receipt, search for a match in white and black lists and decision making as to data legality.
communication system traffic control; data transfer; access protocols; learning systems
Barabanov А.В., Markov А.С., Cirlov В.L.: Sertifikatsiya sistem obnaruzheniya vtorzheniy. Otkrytyye sistemy. SUBD 3/2012, 31–33.
Huan T.: The Application of SSL Protocol in Computer Network Communication. Intelligence Computation and Evolutionary Computation. Advances in Intelligent Systems and Computing 180/2013, 779–783.
Kuznetsova E.S., Loukachevitch N.V., Chetviorkin I.I.: Testing rules for a sentiment analysis system. Computational Linguistics and Intellectual Technologies 12(2)/2013, 71–80.
Pak A., Paroubek P.: Language independent approach to sentiment analysis (LIMSI participation in ROMIP ’11). Computational Linguistics and Intellectual Technologies 11(2)/2012, 37–50.
Scherer S., Schwenker F., Palm G.: Emotion Recognition from Speech Using Multi-Classifier Systems and RBF-Ensembles. Studies in Computational Intelligence 83/2008, 49–70.
Sentsova A.Yu., Mashkyna Y.V.: Avtomatizatsiya ekspertnogo audita informatsionnoy bezopasnosti na osnove ispol'zovaniya iskusstvennoy neyronnoy seti. Bezopasnost' informatsionnykh tekhnologiy 2/2014, 65–70.
Wan S., Ren Z.: Research on Full-Proxy Based TCP Congestion Control Strategy. Advances in Intelligent and Soft Computing 133/2012, 371–378.
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.