Determination of suitability of network intrusion detection rules and their mathematical evaluation
... problems that arise when detecting network attacks using intrusion detection systems in the corporate network of an enterprise. The features of the formation of signatures of network attacks are considered. The problem of coincidence of parameters of network intrusions and parameters of damaged packets is investigated. To assess the suitability of the rules for detecting network attacks and their subsequent control, a method for upgrading the component composition of intrusion detection systems has been redesigned....
Features of the information security audit model of SCADA systems
... built-in SCADA-systems are considered. The possibilities of using the audit model in the operation of control systems in real and protected time modes are considered.
Galchenko O. V. Podtopelny V. V.
risk, information system, network attack, network intrusion, audit
5-13