Detection of computer attacks using network entities monitoring
This article discusses detection of computer attacks by analyzing behavior of the network elements. The aim of this study is to identify attacks using behavior of the network elements and their connections. Detection of computer attacks is the object of the work Modern means of intrusion detection...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
PC Technology Center
2015-09-01
|
Series: | Tehnologìčnij Audit ta Rezervi Virobnictva |
Subjects: | |
Online Access: | http://journals.uran.ua/tarp/article/view/51120 |
id |
doaj-d6da90243fd54d3eae8681a18f38be32 |
---|---|
record_format |
Article |
spelling |
doaj-d6da90243fd54d3eae8681a18f38be322020-11-25T01:32:01ZengPC Technology CenterTehnologìčnij Audit ta Rezervi Virobnictva2226-37802312-83722015-09-0156(25)363810.15587/2312-8372.2015.5112051120Detection of computer attacks using network entities monitoringСергей Вячеславович Балакин0National Aviation University, 1, Avenue Kosmonavta Komarova, Kyiv, Ukraine, 03680This article discusses detection of computer attacks by analyzing behavior of the network elements. The aim of this study is to identify attacks using behavior of the network elements and their connections. Detection of computer attacks is the object of the work Modern means of intrusion detection allows us to collect and analyze information from computer networks. In this paper, we propose a model of attacks in the form of transitions of network elements. Transitions can be switched from safe to dangerous mode. Transitions used to filter actions of the system. The results presented in this work show that method is correct. Changes to the formula of attacks improved performance. A model of intrusion detection based on the information about the behavior of network entities can be used in real network. The research results can be applied to protect information by experts in high-speed systems. Achieved one of the main purposes of this work, which was to create a method of intrusion detection based on the analysis of the behavior of network entities. This method detects more dangerous transit ions than the works previously proposed.http://journals.uran.ua/tarp/article/view/51120attackcomputer networknetwork objectsintrusioninformational systemthe state of the object |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Сергей Вячеславович Балакин |
spellingShingle |
Сергей Вячеславович Балакин Detection of computer attacks using network entities monitoring Tehnologìčnij Audit ta Rezervi Virobnictva attack computer network network objects intrusion informational system the state of the object |
author_facet |
Сергей Вячеславович Балакин |
author_sort |
Сергей Вячеславович Балакин |
title |
Detection of computer attacks using network entities monitoring |
title_short |
Detection of computer attacks using network entities monitoring |
title_full |
Detection of computer attacks using network entities monitoring |
title_fullStr |
Detection of computer attacks using network entities monitoring |
title_full_unstemmed |
Detection of computer attacks using network entities monitoring |
title_sort |
detection of computer attacks using network entities monitoring |
publisher |
PC Technology Center |
series |
Tehnologìčnij Audit ta Rezervi Virobnictva |
issn |
2226-3780 2312-8372 |
publishDate |
2015-09-01 |
description |
This article discusses detection of computer attacks by analyzing behavior of the network elements. The aim of this study is to identify attacks using behavior of the network elements and their connections. Detection of computer attacks is the object of the work
Modern means of intrusion detection allows us to collect and analyze information from computer networks. In this paper, we propose a model of attacks in the form of transitions of network elements. Transitions can be switched from safe to dangerous mode. Transitions used to filter actions of the system.
The results presented in this work show that method is correct. Changes to the formula of attacks improved performance. A model of intrusion detection based on the information about the behavior of network entities can be used in real network.
The research results can be applied to protect information by experts in high-speed systems.
Achieved one of the main purposes of this work, which was to create a method of intrusion detection based on the analysis of the behavior of network entities. This method detects more dangerous transit ions than the works previously proposed. |
topic |
attack computer network network objects intrusion informational system the state of the object |
url |
http://journals.uran.ua/tarp/article/view/51120 |
work_keys_str_mv |
AT sergejvâčeslavovičbalakin detectionofcomputerattacksusingnetworkentitiesmonitoring |
_version_ |
1725083814616629248 |