Methods and systems for the detection of unauthorized access to modern information and communication systems and networks
DOI:
https://doi.org/10.18372/2225-5036.17.3391Keywords:
information security, unauthorized access, attacks, information and communication system and network, vulnerabilitiesAbstract
In this paper, an analysis of modern methods and systems to detect unauthorized access to modern information and communication systems and networks. As a result, the analysis highlighted the advantages and disadvantages of existing methods and systems. Select the most efficient in terms of improving data protection and security to counter threats such as deliberate and accidental.
References
Koral Ilgun, Richard A Kemmerer, and Phillip A Porras, “State transition analysis: A rule-based intrusion detection approach”. // IEEE Transactions on Software Engineering, 21(3):181–199, March 1995
Sheyner, Oleg “Scenario Graphs and Attack Graphs.” // PhD thesis, SCS, Carnegie Mellon University, 2004.
Смелянский Р.Л., Качалин А.И. “Применения нейросетей для обнаружения аномального поведения объектов в компьютерных сетях”. // Факультет Вычислительной Математики и Кибернетики, МГУ им. М. В. Ломоносова, Москва, 2004.
Sebring, M., Shellhouse, E., Hanna, M. & Whitehurst, R. Expert Systems in Intrusion Detection: A Case Study. // Proceedings of the 11th National Computer Security Conference, 1988.
Calvin Ko, “Execution Monitoring of Security-critical Programs in a Distributed System: A Specification-based Approach.” // PhD thesis, Department of Computer Science, University of California at Davis, USA, 1996.
Koral Ilgun, Richard A Kemmerer, and Phillip A Porras, “State transition analysis: A rule-based intrusion detection approach”. // IEEE Transactions on Software Engineering, 21(3):181–199, March 1995.
Sandeep Kumar and Eugene H. Spafford, “A pattern matching model for misuse intrusion detection.” // Proceedings of the 17th National Computer Security Conference, pages 11–21, Baltimore MD, USA, 1994.
Debra Anderson, Teresa F. Lunt, Harold Javitz, Ann Tamaru, and Alfonso Valdes, “Detecting unusual program behavior using the statistical component of the next generation intrusion detection system (NIDES)”. // Technical Report SRI-CSL-95-06, Computer Science Laboratory, SRI International, Menlo Park, USA, May 1995.
Y. Frank Jou, Fengmin Gong, Chandru Sargor, Shyhtsun FelixWu, and CleavelandW Rance, “Architecture design of a scalable intrusion detection system for the emerging network infrastructure.” // Technical Report CDRL A005, Dept. of Computer Science, North Carolina State University, Releigh, N.C, USA, April 1997.
Sebring, M., Shellhouse, E., Hanna, M. & Whitehurst, R. Expert Systems in Intrusion Detection: A Case Study. // Proceedings of the 11th National Computer Security Conference, 1988
Herve Debar, Monique Becker, and Didier Siboni, “A neural networkcomponent for an intrusion detection system.” // Proceedings of the 1992 IEEE Computer Sociecty Symposium on Research in Security and Privacy,pages 240–250, Oakland, CA, USA, May 1992.
M.P.Zielinski, “Applying Mobile Agents in an Immune-system-based intrusion detection system.” // University of South Africa, 2004.
Sheyner, Oleg “Scenario Graphs and Attack Graphs.” // PhD thesis, SCS,Carnegie Mellon University, 2004.