Chemical Technology, Control and Management


In this paper, the methods of information protection in bio systems are studied. The paper considers the use of intelligent tools in information security systems and the use of adaptive information security systems. Several articles on the field of information protection in bio systems are analyzed. Disadvantages and advantages of neural network technologies in modern information security systems are described. The characteristics of bio systems and the specificity of DNA, the main features of the DNA code that provide information security and functional stability of bio systems data protection structure. Application of intelligent tools to create a comprehensive adaptive protection of IT systems based on biosimilar.

First Page


Last Page



  1. Kuznetsova V. L., Rakov M. A. self-Organization in technical systems. - Kiev: Nauk, Dumka, 1987.
  2. LobashevM. E. Genetika [Genetics]. - Leningrad: publishing house of the Leningrad University, 1969.
  3. Galushkin A. I. neyrokomputery I ikh primenenie [Neurocomputers and their application]. - Moscow: IPRZHR, 2000. 3.
  4. Osovetskiy L. G. technical and Scientific prerequisites for the growth and role of information security in modern information technologies // Izv. higher educational. Instrument making. 2003. Vol. 46, No. 7. P. 5-18
  5. Draining K. Protection will be active / / Computerworld Russia. 2004, No. 11. C. 49.
  6. Robert P. Protection on the client / / Computerworld Russia. 2004, No. 16. C. 44.
  7. Lokacija. V. attack Detection. - 2nd ed. Saint Petersburg: BHV-Petersburg, 2003. -608 p.
  8. Tan To. The Application of Neural Networks to UNIX Computer Security //Proc. of the IEEE International Conf. on Neural Networks, 1995. V.l. P. 476-481.
  9. Helman P., Liepins G., Richards W. Foundations of Intrusion Detection // Proc. of the 15th Computer Security Foundations Workshop. 1992. P. 114-120.
  10. Kumar S., Spafford E. A Pattern Matching Model for Misuse Intrusion Detection // Proc. of the 17th National Computer Security Conference. 1994. P. 11-21.
  11. Allen J., Christie A., Fithen W., McHugh J., Pickel J., Stoner E. State of the Practice of Intrusion Detection Technologies. Carnegie Mellon University. Networked Systems Survivability Program. Technical Report CMU/SEI-99-TR-028 ESC-99-028. 2000, January.
  12. Chervyakov H.I., MalofeyO. P., Shaposhnikov A.V., Bondar V. V. Neural networks in systems of cryptographic information protection.Neurocomputers: development and application. 2001, № 10.
  13. Fu L. A Neural Network Model for Learning Rule-Based Systems // Proc. of the International Joint Conference on Neural Networks. 1992.1. P. 343-348.
  14. Negneyitsky M. Artificial intelligence: a guide to intelligent systems. Addison-Wesley, 2002.
  15. Fuller R. Neural Fuzzy Systems. -Abo: Abo Akademi University, 1995.
  16. NesterukG. F., Kupriyanov M. S., NesterukL. G. On the implementation of intelligent systems in fuzzy and neural networkbases// . docl. VI Mezhdunarod. Conf. SCM'2003. Saint Petersburg: SPGETU publ., 2003. t. 1. C. 330-333.
  17. Nesterak G. Ph., Kupnyanov М. With. Neural-fuzzy systems with fiizzy links II Proc. of the Vl-th Int. Conference SCM'2003. Saint Petersburg: SPGETU publ., 2003. t. 1. C. 341-344.
  18. Melik-GaynazyanI. V. Information processes and reality, Moscow: Nauka, 1998, 192 p.
  19. KasperskyK. Attack on Windows NT. Tab "overview of antivirus tools from AIDSTESTto the information immune system" / / LAN / Journal of network solutions. 2000, December, Pp. 88 - 95.
  20. Yakovlev N. N. Life and environment: Molecular and functional bases of adaptation of an organism to environmental conditions. — Moscow: Nauka Publ., 1986.



To view the content in your browser, please download Adobe Reader or, alternately,
you may Download the file to your hard drive.

NOTE: The latest versions of Adobe Reader do not support viewing PDF files within Firefox on Mac OS and if you are using a modern (Intel) Mac, there is no official plugin for viewing PDF files within the browser window.