GRAMOTA Publishers suggests publishing your scientific articles in periodicals
Pan-ArtPedagogy. Theory & PracticePhilology. Theory & PracticeManuscript

Archive of Scientific Articles

SOURCE:    Almanac of Modern Science and Education. Tambov: Gramota, 2016. № 11. P. 60-66.
SCIENTIFIC AREA:    Technical Sciences
Procedure of Scientific Articles Publication | To Show Issue Content | To Show All Articles in Section | Subject Index

License Agreement on scientific materials use.

IDENTIFICATION OF VULNERABILITIES OF INFORMATION SYSTEMS THROUGH COMBINED ANALYSIS OF PARAMETRIC DATA DETERMINED BY SYSTEMS FOR MONITORING NETWORKS

Konovalenko Sergei Aleksandrovich, Korolev Igor' Dmitrievich
Krasnodar Higher Military School


Abstract. The article compares signature and behavioral analyses of parametric data determined by systems for monitoring networks. The authors construct a generalized model of the combined method of parametric data analysis on the basis of technologies of intellectual analysis of data, which enables to increase efficiency of the specialist’s work on identification of vulnerabilities of controlled information systems.
Key words and phrases: комбинированный метод анализа данных, поведенческий метод анализа данных, сигнатурный метод анализа данных, системы мониторинга, технологии интеллектуального анализа данных, combined method of data analysis, behavioral method of data analysis, signature method of data analysis, monitoring systems, technologies of intellectual analysis of data
Open the whole article in PDF format. Free PDF-files viewer can be downloaded here.
References:
  1. Achilov R. Sistema Nagios. Kompleksnyi monitoring. Chast' 1 // Sistemnyi administrator. 2014. № 9 (142). S. 28-31.
  2. Barsegyan A. A., Kupriyanov M. S., Kholod I. I., Tess M. D., Elizarov S. I. Analiz dannykh i protsessov: ucheb. posobie. 3-e izd., pererab. i dop. SPb.: BKhV-Peterburg, 2009. 512 s.
  3. Beshkov A. Monitoring Windows-serverov s pomoshch'yu Nagios // Sistemnyi administrator. 2003. № 7 (8). S. 12-19.
  4. Branitskii A. A., Kotenko I. V. Analiz i klassifikatsiya metodov obnaruzheniya setevykh atak // Trudy Sankt-Peterburgskogo instituta informatiki i avtomatizatsii Rossiiskoi akademii nauk: sb. nauch. trudov / red. R. M. Yusupov. SPb.: SPIIRAN, 2016. № 2 (45). S. 207-244.
  5. Buldakova T. I., Dzhalolov A. Sh. Vybor tekhnologii Data Mining dlya sistem obnaruzheniya vtorzhenii v korporativnuyu set' [Elektronnyi resurs] // Inzhenernyi zhurnal: nauka i innovatsii. 2013. № 11 (23). URL: http://elibrary.ru/item. asp?id=20928241 (data obrashcheniya: 24.11.2016).
  6. Kenin A. M. Prakticheskoe rukovodstvo sistemnogo administratora. 2-e izd. SPb.: BKhV-Peterburg, 2010. 464 s.
  7. Kenin A. M. Samouchitel' sistemnogo administratora. 3-e izd., pererab. i dop. SPb.: BKhV-Peterburg, 2012. 512 s.
  8. Klimov S. M. Metody i modeli protivodeistviya komp'yuternym atakam. Lyubertsy: KATALIT, 2008. 316 s.
  9. Konovalenko S. A., Korolev I. D. Analiz sistem monitoringa vychislitel'nykh setei // Molodoi uchenyi. 2016. № 23 (127). Ch. 1. S. 66-72.
  10. Konovalenko S. A., Korolev I. D., Novoselov D. A. Bazovye funktsional'nye vozmozhnosti sushchestvuyushchikh sistem monitoringa vychislitel'nykh setei // Privolzhskii nauchnyi vestnik. 2016. № 12 (64).
  11. Korneev V. V., Raikh V. V. Integratsiya signaturnogo i povedencheskogo mekhanizmov analiza dannykh monitoringa v sistemakh obnaruzheniya atak // Materialy II Mezhdunarodnoi nauchnoi konferentsii po problemam bezopasnosti i protivodeistviya terrorizmu (Moskovskii gosudarstvennyi universitet im. M. V. Lomonosova, 25-26 oktyabrya 2006 g.). M.: MTsNMO, 2006. S. 186-198.
  12. Lukatskii A. V. Obnaruzhenie atak. 2-e izd. SPb.: BKhV-Peterburg, 2003. 608 s.
  13. Morris U. T. Nauka ob upravlenii. Baiesovskii podkhod. M.: Mir, 1971. 304 s.
  14. Nortkat S., Novak D. Obnaruzhenie narushenii bezopasnosti v setyakh / per. s angl. 3-e izd. M.: Izdatel'skii dom "Vil'yams", 2003. 448 s.
  15. Serdyuk V. A. Novoe v zashchite ot vzloma korporativnykh sistem. M.: Tekhnosfera, 2007. 360 s.
  16. Tulup'ev A. L., Nikolepko S. I., Sirotkin A. V. Baiesovskie seti: logiko-veroyatnostnyi podkhod. SPb.: Nauka, 2006. 607 s.
  17. Ustanovka sistemy Cacti pod Unix [Elektronnyi resurs]. URL: http://www.cacti.net/downloads/docs/contrib/ install_russian_unix.pdf (data obrashcheniya: 08.11.2016).
  18. Ustanovka sistemy Cacti pod Windows [Elektronnyi resurs]. URL: http://www.cacti.net/downloads/docs/ contrib/install_russian_windows.pdf (data obrashcheniya: 07.11.2016).
  19. Khaikin S. Neironnye seti: polnyi kurs / per. s angl. 2-e izd. M.: Izdatel'skii dom "Vil'yams", 2006. 1104 s.
  20. Yaremchuk S. Cacti - prostoi i udobnyi instrument dlya monitoringa i analiza seti // Sistemnyi administrator. 2007. № 4 (53). S. 22-27.
  21. The Cacti Manual [Elektronnyi resurs]. URL: http://www.cacti.net/downloads/docs/pdf/manual.pdf (data obrashcheniya: 07.11.2016).
  22. Unix i Linux: rukovodstvo sistemnogo administratora / E. Nemet, G. Snaider, T. Khein, B. Ueili; pod red. D. A. Klyushina; per. s angl. 4-e izd. M.: OOO "I.D. Vil'yams", 2012. 1312 s.
  23. Zabbix Documentation [Elektronnyi resurs]. URL: https://www.zabbix.com/documentation (data obrashcheniya: 05.11.2016).

Procedure of Scientific Articles Publication | To Show Issue Content | To Show All Articles in Section | Subject Index

© 2006-2024 GRAMOTA Publishers

site development and search engine optimization (seo): krav.ru