Determination of suitability of network intrusion detection rules and their mathematical evaluation
The article deals with the problems that arise when detecting network attacks using intrusion detection systems in the corporate network of an enterprise. The features of the formation of signatures of network attacks are considered. The problem of coincidence of parameters of network intrusions and parameters of damaged packets is investigated. To assess the suitability of the rules for detecting network attacks and their subsequent control, a method for ...
Features of the information security audit model of SCADA systems
... presence of built-in SCADA-systems are considered. The possibilities of using the audit model in the operation of control systems in real and protected time modes are considered.
Galchenko O. V. Podtopelny V. V.
risk, information system, network attack, network intrusion, audit
5-13
Cartographic module for visualizing the location of IP-addresses
Due to the continuously increasing number of network attacks and, accordingly, the volume of work performed by analysts to identify individuals who violate the security of critical information infrastructure objects, the development of software tools that provide visualization of the information analyzed ...