CONTROL MODEL OF DATA STREAM TRANSMITTED OVER A NETWORK BASED ON PROXYING TECHNOLOGY
Olesia Barkovska
olesia.barkovska@nure.uaKharkiv National University of Radioelectronics, Electronic Computer Department (Ukraine)
Vitaliy Serdechnyi
Kharkiv National University of Radioelectronics, Electronic Computer Department (Ukraine)
Abstract
Network traffic control model is described in the work, including data mining modules transmitted in the network as well as further qualified data analysis module based on artificial intelligence methods and means, namely recursive and convolutional neural networks. The topicality of work is proved by the intensive scientific research conducted in the field of information security, big data intelligent data processing tools, and stipulated by growing necessity to limit access of children to aggressive information, which can impact on the child’s psychoemotional state. Particular attention is paid in the article to proxy-server development for HTTP query receipt, search for a match in white and black lists and decision making as to data legality.
Keywords:
communication system traffic control, data transfer, access protocols, learning systemsReferences
Barabanov А.В., Markov А.С., Cirlov В.L.: Sertifikatsiya sistem obnaruzheniya vtorzheniy. Otkrytyye sistemy. SUBD 3/2012, 31–33.
Google Scholar
Huan T.: The Application of SSL Protocol in Computer Network Communication. Intelligence Computation and Evolutionary Computation. Advances in Intelligent Systems and Computing 180/2013, 779–783.
Google Scholar
Kuznetsova E.S., Loukachevitch N.V., Chetviorkin I.I.: Testing rules for a sentiment analysis system. Computational Linguistics and Intellectual Technologies 12(2)/2013, 71–80.
Google Scholar
Pak A., Paroubek P.: Language independent approach to sentiment analysis (LIMSI participation in ROMIP ’11). Computational Linguistics and Intellectual Technologies 11(2)/2012, 37–50.
Google Scholar
Scherer S., Schwenker F., Palm G.: Emotion Recognition from Speech Using Multi-Classifier Systems and RBF-Ensembles. Studies in Computational Intelligence 83/2008, 49–70.
Google Scholar
Sentsova A.Yu., Mashkyna Y.V.: Avtomatizatsiya ekspertnogo audita informatsionnoy bezopasnosti na osnove ispol'zovaniya iskusstvennoy neyronnoy seti. Bezopasnost' informatsionnykh tekhnologiy 2/2014, 65–70.
Google Scholar
Wan S., Ren Z.: Research on Full-Proxy Based TCP Congestion Control Strategy. Advances in Intelligent and Soft Computing 133/2012, 371–378.
Google Scholar
Authors
Olesia Barkovskaolesia.barkovska@nure.ua
Kharkiv National University of Radioelectronics, Electronic Computer Department Ukraine
Authors
Vitaliy SerdechnyiKharkiv National University of Radioelectronics, Electronic Computer Department Ukraine
Statistics
Abstract views: 211PDF downloads: 73
License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.