Article

Article title PROGNOSYS METHOD FOR COMPUTER ATTACKS EXPLICATION
Authors R.N. Selin, S.A. Churilov
Section SECTION VI. NEW INFORMATION TECHNOLOGIES IN POWER
Month, Year 02, 2011 @en
Index UDC 004.021
DOI
Abstract This article presents a model of network processes and an algorithm for detecting threats in a computer network designed to predict changes in the level of information security in dependence on the networking events. Shows the typical structure of a computer attack, it shows the complexity, we give the basic definitions needed to model the process of monitoring a computer network. The authors propose a new method of modeling the mechanism of information security threats, which allows you to anticipate the various options for the development of computer attacks.

Download PDF

Keywords Information security; security model; network event; system exploit; threat detection.
References 1. Monniaux D. Decision Procedures for the Analysis of Cryptographic Protocols by Logics of Belief // Proceedings of The 12th Computer Security Foundations Workshop. – 1999.
2. Чирилло Дж. Обнаружение хакерских атак (Hack Attacks Revealed). – СПб.: Питер, 2002. – 864 с.
3. Симонов С.В. Методология анализа рисков в информационных системах // Конфидент. – 2000. – № 1. – С. 72-76.
4. Милославская Н.Г., Толстой А.И. Интрасети: доступ в Internet, защита: Учебное пособие для вузов. – М.: ЮНИТИ-ДАНА, 2000.
5. Лукацкий А. Адаптивное управление защитой // Сети. – 1999. – № 10.
6. Польман Н., Кразерс Т. Архитектура брандмауэров для сетей предприятия: Пер. с англ. – М.: Изд-во Вильямс, 2003. – 432 c.
7. Онтаньон Р.Дж. Создание эффективной системы выявления атак // LAN / Журнал сетевых решений. – 2000. – № 10.

Comments are closed.