CONSTRUCTION OF SYSTEMS OF DETECTION OF INVASIONS INTO THE INFORMATI TON AND TELECOMMUNICATIONS NETWORK ON THE BASIS OF METHODS OF INTELLECTUAL DISTRIBUTION OF DATA

Author:

Toliupa S.1,Pliushch O.2,Parhomenko I.1

Affiliation:

1. Taras Shevchenko National University of Kyiv

2. State University of Telecommunications

Abstract

The article proposes a combinatorial construction of a network attack detection system based on selected methods of data mining and conducts experimental research that confirms the effectiveness of the created detection model to protect the distributed information network. Experiments with a software prototype showed the high quality of detection of network attacks and proved the correctness of the choice of methods of data mining and the applicability of the developed techniques. The state of security of information and telecommunication systems against cyberattacks is analyzed, which allowed to draw conclusions that to ensure the security of cyberspace it is necessary to implement a set of systems and protection mechanisms, namely systems: delimitation of user access; firewall; cryptographic protection of information; virtual private networks; anti-virus protection of ITS elements; detection and prevention of intrusions; authentication, authorization and audit; data loss prevention; security and event management; security management. An analysis of publications of domestic and foreign experts, which summarizes: experience in building attack detection systems, their disadvantages and advantages; of attack and intrusion detection systems based on the use of intelligent systems. Based on the results of the review, proposals were formed on: construction of network attack detection systems on the basis of selected methods of data mining and experimental research, which confirms the effectiveness of the created detection model for the protection of the distributed information network.

Publisher

Taras Shevchenko National University of Kyiv

Subject

General Earth and Planetary Sciences,General Environmental Science

Reference25 articles.

1. Hacker attacks on Ukraine [Electronic resource] // Wikipedia: [site]. Kyiv, 2017. URL: https://is.gd/6lkWHY.

2. Hacker attacks in Ukraine. [Electronic resource] // Wikipedia: [site]. Kyiv, 2020. https://glavcom.ua/topics/ rosijskikhakeru.html.

3. Systems and methods of detection of intrusions: the current state and directions of improvement [Electronic resource] / A.A. Kornienko, I.M. Slyusarenko // CIT forum: [site]. 2009.

4. Analysis of systems and methods for detecting unauthorized intrusions into computer networks [Electronic resource] / V.V. Litvinov [etc.] // Mathematical Machines and Systems. K: IPMMS NAS of Ukraine, 2018. No 1. Pp.31-40.

5. Analysis and classification of methods for detecting network attacks / A.A. Branitsky, A.V. Kotenko // Tr. SPIIRAN. 2016. No 2 (45). Pp. 207-244.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3