Vestnik of Samara State Technical University. Technical Sciences SeriesVestnik of Samara State Technical University. Technical Sciences Series1991-85422712-8938Samara State Technical University35217Research ArticleSoftware implementation and research of the system for intellectually adaptive management of the enterprise information infrastructureBasinyaEvgeny A.<p>(Ph.D. (Techn.)), Associate Professor</p>journal@eco-vector.comNovosibirsk State Technical University, Research Institute of Information and Communication Technologies2207202028162119072020Copyright © 2020, Samara State Technical University2020<p style="text-align: justify;">The paper describes the problems of information and communication interaction of technical objects and systems. The vulnerabilities of the TCP / IP protocol stack, the imperfection of operating systems and application software, the complexity of full mutual integration of various systems are analyzed. The consequence of saving vendors of network solutions on computing power in the form of architectural constraints and vulnerabilities is described. The design, software implementation and experimental study of the authors system of intellectually adaptive management of the enterprises information infrastructure, which operates on the basis of the previously presented method of the same name, is considered. A modern technology stack is used in combination with a flexible development methodology. The scientific novelty of the work lies in the proposed architecture of a comprehensive software product for managing the enterprise information infrastructure. Improving the efficiency, reliability, security and fault tolerance of the operation of technical objects and systems is achieved by using the automation platform for deploying and managing applications in a multi-layer virtualization environment. Isolation of work services is carried out with the ability to automatically restart any component without violating the normal operating mode of the infrastructure. A number of restrictions inherent in existing solutions, such as the number of simultaneously supported VPN connections, as well as defined policies and rules are removed. Increasing the level of confidentiality of network interaction, as well as countering anonymous unauthorized disturbances, is achieved by full integration with overlay technologies and networks, and also by supporting a wide range of modern cryptographic encryption algorithms with the possibility of multi-layer encapsulation. In order to evaluate the effectiveness of the developed system, an experimental comparative analysis is presented with various existing solutions: comprehensive firewalls, routers, intrusion detection and prevention systems, as well as other traffic management tools.</p>intellectually adaptive managementsystem analysisprocessingnetwork trafficlocal information processesTCP / IPIDS / IPSSIEMUTMNGFWинтеллектуально-адаптивное управлениесистемный анализобработкасетевой трафиклокальные информационные процессыTCP/IPIDS/IPSSIEMUTMNGFW[Yanyan L., Keyu J. Prospect for the Future Internet: A Study Based on TCP/IP Vulnerabilities // Proceedings of the International Conference on Computing, Measurement, Control and Sensor Network, Taiyuan, China, 2012, pp. 52–55.][Basinya E.A. Packet-switched computing network traffic management issues based on the TCP/IP protocol stak. Texnika i texnologiya: novy`e perspektivy` razvitiya, 2014, no. 15, pp. 48–57 (in Russian).][Christoph B., Horst S., Olaf S. Soft-Error Detection and Correction for Concurrent Data Structures. Transactions on Dependable and Secure Computing. 2017, vol. 14, no. 1, pp. 22–36.][Perevoshhikov V.A. Integrated Electronic Security Software Vulnerability Overview. Aktual`ny`e nauchny`e issledovaniya v sovremennom mire, 2017, no. 3–2 (23), pp. 76–77 (in Russian).][Motta R.C., Marcal K.O., Travassos G.H. Rethinking Interoperability in Contemporary Software Systems. Proceedings of the 5th International Workshop on Software Engineering for Systems-of-Systems and 11th Workshop on Distributed Software Development, Software Ecosystems and Systems-of-Systems (JSOS), Buenos Aires, Argentina, 2017, pp. 9–15.][James D.A., James B.D. Applying standard independent verification and validation (IV&V) techniques within an Agile framework: Is there a compatibility issue? Proceedings of the IEEE International Systems Conference (SysCon), Montreal, QC, Canada. 2017, pp. 1–5.][Monarev V.A., Pestunov A.I. Effective detection of steganographically hidden information by means of an integrated classifier based on data compression. Prikladnaya diskretnaya matematika. 2018, no. 40, pp. 59–71 (in Russian).][Monarev V.A., Pestunov A.I. Improving the effectiveness of steganalysis methods by pre-filtering containers. Prikladnaya diskretnaya matematika. 2016, no. 2, pp. 87–99 (in Russian).][Pestunov A.I. On the formalization and systematization of the basic concepts of differential cryptanalysis of iterative block ciphers. Problemy` informacionnoj bezopasnosti. Komp`yuterny`e sistemy`. 2014, no. 3, pp. 109–114 (in Russian).][Pestunov A.I., Kovalev V.A. Determination of the critical selling price of a technological machine in the equipment market from a buyer's perspective. Vestnik NGUE`U. 2019, no. 1, pp. 240–246 (in Russian).][Mutigullin A.S., Prasolova E.A. Overview of corporate information systems development methodologies. Nauchnoe obozrenie. Texnicheskie nauki. 2018, no. 6, pp. 41–45 (in Russian).][Tajlakov V.A., Izrailov K.E. Ways to automate the search for vulnerabilities in software at appropriate levels of its development. Nauchny`j aspect, 2018, vol. 6, no. 4, pp. 719–726 (in Russian).][Gorbacheva A., Smirnov S. Converging technologies and a modern man: emergence of a new type of thinking. AI & Society. 2017, vol. 32, no. 3, pp. 465–473.][Kroxin G.D., Arakelyan E`.K., Muxin V.S., Pestunov A.I. The use of artificial intelligence methodology for the formation of fuzzy information processing results. Vestnik Moskovskogo e`nergeticheskogo instituta. Vestnik ME`I. 2017, no. 5, pp. 130–138 (in Russian).][Basinya E.A., Safronov A.V. Decentralized approach for collecting and processing data of the enterprise information infrastructure. Vestnik UrFO. Bezopasnost` v informacionnoj sfere. 2019, No. 3 (33), pp. 43–54 (in Russian).][Basinya E.A. System for intellectually adaptive management of the enterprise network infrastructure. State registration of an intellectual property object (computer programs) № 2019660561 RF, publicati.]