Detection of computer attacks using network entities monitoring

This article discusses detection of computer attacks by analyzing behavior of the network elements. The aim of this study is to identify attacks using behavior of the network elements and their connections. Detection of computer attacks is the object of the work Modern means of intrusion detection...

Full description

Bibliographic Details
Main Author: Сергей Вячеславович Балакин
Format: Article
Language:English
Published: PC Technology Center 2015-09-01
Series:Tehnologìčnij Audit ta Rezervi Virobnictva
Subjects:
Online Access:http://journals.uran.ua/tarp/article/view/51120
id doaj-d6da90243fd54d3eae8681a18f38be32
record_format Article
spelling doaj-d6da90243fd54d3eae8681a18f38be322020-11-25T01:32:01ZengPC Technology CenterTehnologìčnij Audit ta Rezervi Virobnictva2226-37802312-83722015-09-0156(25)363810.15587/2312-8372.2015.5112051120Detection of computer attacks using network entities monitoringСергей Вячеславович Балакин0National Aviation University, 1, Avenue Kosmonavta Komarova, Kyiv, Ukraine, 03680This article discusses detection of computer attacks by analyzing behavior of the network elements. The aim of this study is to identify attacks using behavior of the network elements and their connections. Detection of computer attacks is the object of the work Modern means of intrusion detection allows us to collect and analyze information from computer networks. In this paper, we propose a model of attacks in the form of transitions of network elements. Transitions can be switched from safe to dangerous mode. Transitions used to filter actions of the system. The results presented in this work show that method is correct. Changes to the formula of attacks improved performance. A model of intrusion detection based on the information about the behavior of network entities can be used in real network. The research results can be applied to protect information by experts in high-speed systems. Achieved one of the main purposes of this work, which was to create a method of intrusion detection based on the analysis of the behavior of network entities. This method detects more dangerous transit ions than the works previously proposed.http://journals.uran.ua/tarp/article/view/51120attackcomputer networknetwork objectsintrusioninformational systemthe state of the object
collection DOAJ
language English
format Article
sources DOAJ
author Сергей Вячеславович Балакин
spellingShingle Сергей Вячеславович Балакин
Detection of computer attacks using network entities monitoring
Tehnologìčnij Audit ta Rezervi Virobnictva
attack
computer network
network objects
intrusion
informational system
the state of the object
author_facet Сергей Вячеславович Балакин
author_sort Сергей Вячеславович Балакин
title Detection of computer attacks using network entities monitoring
title_short Detection of computer attacks using network entities monitoring
title_full Detection of computer attacks using network entities monitoring
title_fullStr Detection of computer attacks using network entities monitoring
title_full_unstemmed Detection of computer attacks using network entities monitoring
title_sort detection of computer attacks using network entities monitoring
publisher PC Technology Center
series Tehnologìčnij Audit ta Rezervi Virobnictva
issn 2226-3780
2312-8372
publishDate 2015-09-01
description This article discusses detection of computer attacks by analyzing behavior of the network elements. The aim of this study is to identify attacks using behavior of the network elements and their connections. Detection of computer attacks is the object of the work Modern means of intrusion detection allows us to collect and analyze information from computer networks. In this paper, we propose a model of attacks in the form of transitions of network elements. Transitions can be switched from safe to dangerous mode. Transitions used to filter actions of the system. The results presented in this work show that method is correct. Changes to the formula of attacks improved performance. A model of intrusion detection based on the information about the behavior of network entities can be used in real network. The research results can be applied to protect information by experts in high-speed systems. Achieved one of the main purposes of this work, which was to create a method of intrusion detection based on the analysis of the behavior of network entities. This method detects more dangerous transit ions than the works previously proposed.
topic attack
computer network
network objects
intrusion
informational system
the state of the object
url http://journals.uran.ua/tarp/article/view/51120
work_keys_str_mv AT sergejvâčeslavovičbalakin detectionofcomputerattacksusingnetworkentitiesmonitoring
_version_ 1725083814616629248