The purpose of this article is to create a convolutional neural network model for identifying and predicting audio deepfakes by classifying voice content using deep machine learning algorithms and python programming language libraries. The audio content datasets are basic for the neural network learning process and are represented by mel spectrograms. The processing of graphic images of the audio signal in the heatmap format forms the knowledge base of the convolutional neural network. The results of the visualization of mel spectrograms in the ratio of the measurement of the frequency of sound and chalk determine the key characteristics of the audio signal and provide a comparison procedure between a real voice and artificial speech. Modern speech synthesizers use a complex selection and generate synthetic speech based on the recording of a person's voice and a language model. We note the importance of mel spectrograms, including for speech synthesis models, where this type of spectrograms is used to record the timbre of a voice and encode the speaker's original speech. Convolutional neural networks allow you to automate the processing of mel spectrograms and classify voice content: original or fake. The experiments conducted on test voice sets proved the success of learning and using convolutional neural networks using images of MFCC spectral coefficients to classify and study audio content, and the use of this type of neural networks in the field of information security to identify audio deepfakes.
Keywords: neural networks, detection of voice deepfakes, information security, speech synthesis models, deep machine learning, categorical cross-entropy, loss function, algorithms for detecting voice deepfakes, convolutional neural networks, mel-spectrograms
The article considers mathematical models for the collection and processing of voice content, on the basis of which a fundamentally logical scheme for predicting synthetic voice deepfakes has been developed. Experiments have been conducted on selected mathematical formulas and sets of python programming language libraries that allow real-time analysis of audio content in an organization. The software capabilities of neural networks for detecting voice fakes and generated synthetic (artificial) speech are considered and the main criteria for the study of voice messages are determined. Based on the results of the experiments, a mathematical apparatus has been formed that is necessary for positive solutions to problems of detecting voice deepfakes. A list of technical standards recommended for collecting voice information and improving the quality of information security in the organization has been formed.
Keywords: neural networks, detection of voice defects, information security, synthetic voice speech, voice deepfakes, technical standards for collecting voice information, algorithms for detecting audio deepfakes, voice cloning
This article presents an overview of the tools for solving the problem of monitoring the network infrastructure. Foreign solutions are considered, their characteristics are presented, key features are described, as well as their shortcomings. The problem of import substitution in the Russian Federation is emphasized. The results were summed up, and the relevance of developing a domestic IT infrastructure monitoring system with additional functionality was developed.
Keywords: monitoring, IT infrastructure, network infrastructure, negios, zabbix, cacti, import substitution, information security, Linux, Windows
This article describes the process of inventorying equipment in a typical IT department. A new approach to inventory is proposed, which will eliminate the "double work" and solve a number of typical problems. The relationship with an already developed product for monitoring network infrastructure is described.
Keywords: monitoring, network infrastructure, inventory, QR code, Telegram, information technology, information technology department
The article examines the concept and scope of edutainment technology. A variant of the application of this technology in teaching students information security issues is proposed. Examples of the implementation of edutainment technology in a number of games covering cybercrime and information security are given.
Keywords: edutainment-technology, edutainment, information security, teaching, data protection, game
This article describes the experience of implementing a system for monitoring the stability of a network infrastructure using the Telegram messenger in a government institution. The functionality of the system and further plans for its development are presented. The tendency towards the spread of the Telegram messenger in the society is described.
Keywords: Telegram, ping, monitoring, inventory, infrastructure, network
This paper describes the methods of interaction between clients of the information system and the control center. A protocol is defined for this interaction, and its advantages and disadvantages are described. Calculations of the transmission time of a complete package of information were performed as part of the task of monitoring workstations in an organization, and conclusions were also drawn based on the results of calculations.
Keywords: Active Directory, client, server, monitoring, TCP, protocol, RTT
This paper describes the tools for managing the Windows operating system - Windows Management Instrumentation, and also analyzes its applicability for monitoring and auditing the enterprise IT infrastructure. The main WMI classes and their purpose are given. Two methods for using WMI are described: local and network. In addition, the advantages and disadvantages of each method are given.
Keywords: operating system, Windows, Windows Management Instrumentation, WMI, audit, monitoring, IT infrastructure, wbemtest
The article analyzes network traffic in WINDOWS operating systems, as well as a description of its tools to identify a certain redundancy of network activity. The authors also conduct a comparative analysis of the most common software products that perform the functions of monitoring network traffic.
Keywords: operating system, detection systems, network protocol, network traffic analysis, networks, sniffer, traffic, network activity
This paper presents the functionality of the software, which are recommended for use in the case of developing an information system for an enterprise. Such functionality is helpful in order to save working time of system administrators and company cash in the future. Attention is paid to the access control based on roles, to a mechanism for self-updating, to logging of user operations, and to the creation of a separate administration panel.
Keywords: information system, enterprise, access control, roles, update, logging, Microsoft SQL Server, administration, system administrator
This article describes an existing university database of automobile passes in Microsoft Excel. The university has two databases: permanent and temporary car passes. The negative sides of databases in Microsoft Excel are described in this article. Also, the authors analyzed the possibility of using 1C company software to account for car passes. A new database is described in the Microsoft SQL Server database management system. This article defines methods for unification an outdated database for later migration to Microsoft SQL Server. The main components of the future application software for working with the new database have been designed. By creating additional software, the likelihood of errors in the databases is minimized.
Keywords: database, Microsoft SQL Server, Microsoft Excel, university, car pass, registry, unification, migration, C#, software