USING GENETIC ALGORITHMS TO OPTIMISE CYBERSECURITY PROTOCOLS IN DATA MANAGEMENT SYSTEMS

  • Ecole Nationale Superieure Polytechnique,Universite Marien NGOUABI, Republic of Congo.
  • Abstract
  • Keywords
  • Cite This Article as
  • Corresponding Author

Faced with the increasing complexity of cyberattack scenarios against information systems, ensuring the proper functioning of multi-layered protection systems requires the synchronization of all components, both at the overall system level and at the level of its individual components at each line of defense. Intelligent data analysis methods and approaches make it possible to solve these problems efficiently and at a lower cost. This article aims to study the practical aspects of using a genetic algorithm to optimize cybersecurity protocols in data management systems. It presents an approach for selecting the optimal set of cybersecurity protocols based on a genetic algorithm and data analysis. One of the major strengths of this approach lies in its ability to simultaneously optimize different cybersecurity protocols based on specific target functions. Test results on the algorithm demonstrate that it is a practical tool for developing an information protection strategy that is both effective and cost-effective. A distinctive feature and advantage of this approach is the ability to simultaneously optimize various cybersecurity protocols in accordance with specified target functions. The results of testing the algorithm indicate that it provides a practical tool for forming the most effective and economically feasible information protection strategy.


[Oboulhas Tsahat Conrad Onesime and Nkouka Moukengue Charmolavy Goslavy Lionel (2025); USING GENETIC ALGORITHMS TO OPTIMISE CYBERSECURITY PROTOCOLS IN DATA MANAGEMENT SYSTEMS Int. J. of Adv. Res. (Dec). 207-215] (ISSN 2320-5407). www.journalijar.com


OBOULHAS TSAHAT Conrad Onesime
Ecole Nationale Supérieure Polytechnique, Université Marien NGOUABI, Republic of Congo
Congo