• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

用于关键区域的认证、访问和监控系统,该系统将人工智能集成到数据中心的周边安全中。

Authentication, access, and monitoring system for critical areas with the use of artificial intelligence integrated into perimeter security in a data center.

作者信息

Villegas-Ch William, García-Ortiz Joselin

机构信息

Escuela de Ingeniería en Ciberseguridad, Facultad de Ingenierías y Ciencias aplicada, Universidad de Las Américas, Quito, Ecuador.

出版信息

Front Big Data. 2023 Aug 31;6:1200390. doi: 10.3389/fdata.2023.1200390. eCollection 2023.

DOI:10.3389/fdata.2023.1200390
PMID:37719684
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC10500307/
Abstract

Perimeter security in data centers helps protect systems and the data they store by preventing unauthorized access and protecting critical resources from potential threats. According to the report of the information security company SonicWall, in 2021, there was a 66% increase in the number of ransomware attacks. In addition, the message from the same company indicates that the total number of cyber threats detected in 2021 increased by 24% compared to 2019. Among these attacks, the infrastructure of data centers was compromised; for this reason, organizations include elements Physical such as security cameras, movement detection systems, authentication systems, etc., as an additional measure that contributes to perimeter security. This work proposes using artificial intelligence in the perimeter security of data centers. It allows the automation and optimization of security processes, which translates into greater efficiency and reliability in the operations that prevent intrusions through authentication, permit verification, and monitoring critical areas. It is crucial to ensure that AI-based perimeter security systems are designed to protect and respect user privacy. In addition, it is essential to regularly monitor the effectiveness and integrity of these systems to ensure that they function correctly and meet security standards.

摘要

数据中心的边界安全通过防止未经授权的访问并保护关键资源免受潜在威胁,有助于保护系统及其存储的数据。根据信息安全公司SonicWall的报告,2021年勒索软件攻击数量增加了66%。此外,同一家公司的消息表明,2021年检测到的网络威胁总数与2019年相比增加了24%。在这些攻击中,数据中心的基础设施遭到了破坏;因此,组织将安全摄像头、运动检测系统、认证系统等物理元素作为有助于边界安全的额外措施。这项工作提出在数据中心的边界安全中使用人工智能。它允许安全流程的自动化和优化,这转化为在通过认证防止入侵、许可验证和监控关键区域的操作中更高的效率和可靠性。确保基于人工智能的边界安全系统旨在保护和尊重用户隐私至关重要。此外,定期监控这些系统的有效性和完整性以确保它们正常运行并符合安全标准也很重要。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dff6/10500307/27fe65e7187e/fdata-06-1200390-g0009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dff6/10500307/81239a10de02/fdata-06-1200390-g0001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dff6/10500307/d08a9ca4a45d/fdata-06-1200390-g0002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dff6/10500307/79394b8e2787/fdata-06-1200390-g0003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dff6/10500307/3a2cdba71847/fdata-06-1200390-g0004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dff6/10500307/d017bd807099/fdata-06-1200390-g0005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dff6/10500307/4885939afab4/fdata-06-1200390-g0006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dff6/10500307/262f1336188a/fdata-06-1200390-g0007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dff6/10500307/69bc9ff7ebb0/fdata-06-1200390-g0008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dff6/10500307/27fe65e7187e/fdata-06-1200390-g0009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dff6/10500307/81239a10de02/fdata-06-1200390-g0001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dff6/10500307/d08a9ca4a45d/fdata-06-1200390-g0002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dff6/10500307/79394b8e2787/fdata-06-1200390-g0003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dff6/10500307/3a2cdba71847/fdata-06-1200390-g0004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dff6/10500307/d017bd807099/fdata-06-1200390-g0005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dff6/10500307/4885939afab4/fdata-06-1200390-g0006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dff6/10500307/262f1336188a/fdata-06-1200390-g0007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dff6/10500307/69bc9ff7ebb0/fdata-06-1200390-g0008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/dff6/10500307/27fe65e7187e/fdata-06-1200390-g0009.jpg

相似文献

1
Authentication, access, and monitoring system for critical areas with the use of artificial intelligence integrated into perimeter security in a data center.用于关键区域的认证、访问和监控系统,该系统将人工智能集成到数据中心的周边安全中。
Front Big Data. 2023 Aug 31;6:1200390. doi: 10.3389/fdata.2023.1200390. eCollection 2023.
2
Security Baseline for Substation Automation Systems.变电站自动化系统安全基线
Sensors (Basel). 2023 Aug 11;23(16):7125. doi: 10.3390/s23167125.
3
Privacy Preservation in Patient Information Exchange Systems Based on Blockchain: System Design Study.基于区块链的患者信息交换系统中的隐私保护:系统设计研究。
J Med Internet Res. 2022 Mar 22;24(3):e29108. doi: 10.2196/29108.
4
An artificial intelligence lightweight blockchain security model for security and privacy in IIoT systems.一种用于工业物联网(IIoT)系统安全与隐私的人工智能轻量级区块链安全模型。
J Cloud Comput (Heidelb). 2023;12(1):38. doi: 10.1186/s13677-023-00412-y. Epub 2023 Mar 16.
5
CANon: Lightweight and Practical Cyber-Attack Detection for Automotive Controller Area Networks.CANon:用于汽车控制器局域网的轻量级实用网络攻击检测
Sensors (Basel). 2022 Mar 29;22(7):2636. doi: 10.3390/s22072636.
6
Cloud-assisted mutual authentication and privacy preservation protocol for telecare medical information systems.云辅助的远程医疗信息系统中的相互认证和隐私保护协议。
Comput Methods Programs Biomed. 2018 Apr;157:191-203. doi: 10.1016/j.cmpb.2018.02.002.
7
Improved Wireless Medical Cyber-Physical System (IWMCPS) Based on Machine Learning.基于机器学习的改进型无线医疗信息物理系统(IWMCPS)
Healthcare (Basel). 2023 Jan 29;11(3):384. doi: 10.3390/healthcare11030384.
8
Artificial Intelligence-Based Ethical Hacking for Health Information Systems: Simulation Study.基于人工智能的健康信息系统伦理黑客攻击:模拟研究。
J Med Internet Res. 2023 Apr 25;25:e41748. doi: 10.2196/41748.
9
A Lightweight Mutual Authentication and Privacy-preservation Scheme for Intelligent Wearable Devices in Industrial-CPS.一种用于工业信息物理系统中智能可穿戴设备的轻量级相互认证与隐私保护方案。
IEEE Trans Industr Inform. 2021 Aug;17(8):5829-5839. doi: 10.1109/tii.2020.3043802. Epub 2020 Dec 10.
10
Secure anonymity-preserving password-based user authentication and session key agreement scheme for telecare medicine information systems.用于远程医疗信息系统的基于密码的安全匿名用户认证和会话密钥协商方案。
Comput Methods Programs Biomed. 2016 Oct;135:167-85. doi: 10.1016/j.cmpb.2016.07.028. Epub 2016 Jul 29.

本文引用的文献

1
Real-Time Multi-Class Disturbance Detection for Φ-OTDR Based on YOLO Algorithm.基于 YOLO 算法的 Φ-OTDR 实时多类干扰检测。
Sensors (Basel). 2022 Mar 3;22(5):1994. doi: 10.3390/s22051994.
2
An Interpretable Deep Learning Model for Covid-19 Detection With Chest -Ray Images.一种用于通过胸部X光图像检测新冠肺炎的可解释深度学习模型。
IEEE Access. 2021 Jun 8;9:85198-85208. doi: 10.1109/ACCESS.2021.3087583. eCollection 2021.
3
Disturbance location and pattern recognition of a distributed optical fiber sensor based on dual-Michelson interferometers.
基于双迈克尔逊干涉仪的分布式光纤传感器的扰动位置与模式识别
Appl Opt. 2022 Jan 1;61(1):241-248. doi: 10.1364/AO.445528.
4
Intrusion behavior classification method applied in a perimeter security monitoring system.应用于周界安全监控系统的入侵行为分类方法。
Opt Express. 2021 Mar 15;29(6):8592-8605. doi: 10.1364/OE.415929.
5
Statistical pattern recognition reveals shared neural signatures for displaying and recognizing specific facial expressions.统计模式识别揭示了显示和识别特定面部表情的共享神经特征。
Soc Cogn Affect Neurosci. 2020 Oct 8;15(8):803-813. doi: 10.1093/scan/nsaa110.
6
Cycle Tracks and Parking Environments in China: Learning from College Students at Peking University.中国的自行车道与停车环境:向北京大学的大学生学习
Int J Environ Res Public Health. 2017 Aug 18;14(8):930. doi: 10.3390/ijerph14080930.
7
An intelligent surveillance platform for large metropolitan areas with dense sensor deployment.用于传感器密集部署的大都市的智能监控平台。
Sensors (Basel). 2013 Jun 7;13(6):7414-42. doi: 10.3390/s130607414.