Abstract
Trends in modern security technologies with honeypot technologies use are analyzed to detect and explore intruders’ behavior for counteract measures development. Scalable solution proposed and tested within Microsoft Azure exploratory installation. DDoS attack stress test of the solution is performed.
Publisher
Bonch-Bruevich State University of Telecommunications
Reference34 articles.
1. Varonis. 60 Must-Know Cybersecurity Statistics for 2019. Available from: https://www.varonis.com/blog/cybersecurity-statistics [Accessed 26th April 2019]
2. Buinevich M.V., Vladyko A.G., Dotsenko S.M., Simonina O.A. Organizational and technical provision of functioning and security of public communications network. St. Petersburg: The Bonch-Bruevich Saint-Petersburg State University of Telecommunications Publ.; 2013. 192 p. (in Russ.)
3. Buinevich M.V., Vasilyeva I.N., Vorobev T.M., Gnidenko I.G., Egorova I.V., Enikeeva L.A., et al. Zashchita informatsii v kompiuternykh sistemakh [Information Security in Computer Systems]. St. Petersburg: Saint-Petersburg State University of Economics Publ.; 2017. 163 p. (in Russ.)
4. Izrailov K. Analysis of the Security State of Software. Proceedings of the IId International Conference on Infotelecommunications in Science and Education, 27‒28 February 2013, St. Petersburg, Russia. St. Petersburg: The Bonch-Bruevich Saint-Petersburg State University of Telecommunications Publ.; 2013. p.874‒877. (in Russ.)
5. Izrailov K. Model of Forecasting the Telecommunication System Threats on the Basis of the Artificial Neural Network. Vestnik INZHEKONa. Seriia: Tekhnicheskie nauki. 2012;8(59):150‒153. (in Russ.)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献