Abstract
In this article, an intelligent method for identifying possible threats to other information systems based on blockchain technology has been developed. This intelligent method is built on the basis of the theory of fuzzy neural network and uses a database trained to detect cryptoattacks on information systems. The system performs complex calculation and decision-making process by studying the given data. Verifies the authenticity of blockchain blocks and transactions. Forms a risk database of the general information system and applies security measures accordingly. In addition, the article presents the risks to financial information systems and their types, models for identifying risks to information security. A fuzzy neural network-based method for determining possible risks has been developed. The results were obtained by implementing the Matlab package program. In the conclusion of the study, the safety and economic efficiency of this method has been proven.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rakhimberdiyev, K.B., Mardonov, A.A.: The use of intellectual analysis systems and blockchain technology in improving the bank lending system. Theoretical and methodological aspects of improving the statistical analysis of the development of the digital economy. Institute of Personnel Training and Statistical Research under the State Statistics Committee of the Republic of Uzbekistan, Tashkent, pp. 371–376 (2022)
Macлoвa, H.A.: Meтoды oцeнки эффeктивнocти cиcтeм зaщиты инфopмaциoнныx cиcтeм. Иcкyccтвeнный интeллeкт, pp. 253–264 (2008)
Дecницкий, B.A., Caxapoв, Д.B., Чeчyлин, A.A., Ушaкoв, И.A., Зaxapoвa, T.E.: Зaщитa инфopмaции в цeнтpax oбpaбoтки дaнныx, Caнкт-Пeтepбypг (2019)
Pocc, Г.B.: Moдeлиpoвaниe пpoизвoдcтвeнныx и coциaльнo-экoнoмичecкиx cиcтeм и иcпoльзoвaниeм aппapaтa кoмбинaтopнoй мaтeмaтики. – M.: Mиp, 176 C (2001)
Юcyпoв, P.M.: Hayкa и нaциoнaльнaя бeзoпacнocть. 2-e издaниe, пepepaбoтaннoe и дoпoлнeннoe. - CПб.: Hayкa, 369 C (2011)
Mиняeв, A.A., Юpкин, Д.B., Кoвцyp, M.M., Axpaмeeвa, К.A.: Cepтификaция cpeдcтв зaщиты инфopмaции: yчeбнoe пocoбиe. CПбГУT. – CПб., 80 C (2020)
Кpyглoв, B.B., Дли, M.И., Гoдyнoв, P.Ю.: Heчeткaя лoгикa и иcкyccтвeнныe нeйpoнныe ceти. – M.: Физмaтлит. 224 C (2001)
Кpyглoв, B.B.: Иcкyccтвeнныe нeйpoнныe ceти. Teopия и пpaктикa/B.B. Кpyглoв, B.B. Бopиcoв.- M.: Гopячaя линия – Teлeкoм. 382 C (2002)
Juraev, G., Rakhimberdiev, K.: Mathematical modeling of credit scoring system based on the Monge-Kantorovich problem. In: 2022 IEEE International IOT, Electronics and Mechatronics Conference, IEMTRONICS 2022 Proceedings (2022)
Juraev, G., Rakhimberdiev, K.: Modeling the decision-making process of lenders based on blockchain technology. In: International Conference on Information Science and Communications Technologies: Applications, Trends and Opportunities (ICISCT 2021), pp. 1–5 (2022)
Juraev, G., Rakhimberdiev, K.: Prospects of application of blockchain technology in the banking. In: International Conference on Information Science and Communications Technologies: Applications, Trends and Opportunities (ICISCT 2022), pp. 1–5 (2022)
Karimov, M., Arzieva, J., Rakhimberdiev, K.: Development of approaches and schemes for proactive information protection in computer networks. In: International Conference on Information Science and Communications Technologies: Applications, Trends and Opportunities (ICISCT 2022), pp. 1–5 (2022)
Tashev, K., Arzieva, J., Arziev, A., Rakhimberdiev, K.: Method authentication of objects information communication systems. In: International Conference on Information Science and Communications Technologies: Applications, Trends and Opportunities (ICISCT 2022), pp. 1–5 (2022)
Arzieva, J., Arziev, A., Rakhimberdiev, K.: Application of random number generators in solving the problem of user authentication in blockchain systems. In: International Conference on Information Science and Communications Technologies: Applications, Trends and Opportunities (ICISCT 2022), pp. 1–5 (2022)
Abdullaev, T., Juraev, G.: Application three-valued logic in symmetric block encryption algorithms. J. Phys. Conf. Ser. 2131(2), 022082 (2021)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Juraev, G.U., Kuvonchbek, R., Toshpulov, B. (2023). Application Fuzzy Neural Network Methods to Detect Cryptoattacks on Financial Information Systems Based on Blockchain Technology. In: Koucheryavy, Y., Aziz, A. (eds) Internet of Things, Smart Spaces, and Next Generation Networks and Systems. NEW2AN 2022. Lecture Notes in Computer Science, vol 13772. Springer, Cham. https://doi.org/10.1007/978-3-031-30258-9_9
Download citation
DOI: https://doi.org/10.1007/978-3-031-30258-9_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-30257-2
Online ISBN: 978-3-031-30258-9
eBook Packages: Computer ScienceComputer Science (R0)