АНАЛІЗ СУЧАСНИХ МЕТОДІВ ВИЯВЛЕННЯ АТАК НА РЕСУРСИ ІНФОРМАЦІЙНО-ТЕЛЕКОМУНІКАЦІЙНИХ СИСТЕМ
DOI:
https://doi.org/10.18372/2410-7840.13.2006Keywords:
методи виявлення аномалій, методи виявлення зловживань, нейронні мережі, імунні системи, сигатурні методи виявлення, кластерний аналіз, графи сценаріїв атак, MARS, SVMAbstract
У статті розглянуто основні групи методів виявлення атак із врахуванням сучасних тенденцій їх розвитку. Висвітленні основні принципи, проведено аналіз ефективності функціонування згідно запропонованих критеріїв.References
Stefan Axelsson Research in Intrusion-Detection Systems: A Survey // Department of Computer Engineering, Chalmers University of Technology, Goteborg. – 1999.
Stefan Axelsson Intrusion detection systems: A survey and taxonomy // Technical Report 99-15, Chalmers University of Technology, Goteborg. - 2000.
Смелянский Р.Л., Гамаюнов Д. Ю. Современные некоммерческие средства обнаружения атак // Факультет Вычислительной Математики и Кибернетики, МГУ им. М. В. Ломоносова, Москва. - 2002.
Hakan Kvarnstrom A survey of commercial tools for intrusion detection // Technical Report 99-8, Department of Computer Engineering, Chalmers University of Technology, Goteborg, Sweden. - 1999.
Tomas Lunt Automated Audit Trail Analysis and Intrusion Detection: A Survey // Proceedings of the 11th National Security Conference, Baltimore, MD. - 1988.
Сердюк В. А. Новое в защите от взлома корпоративных систем.- Москва: Техносфера, 2007.- 360 с.
An Attack Language for State-based Intrusion Detection / S.T. Eckmann, G. Vigna, and R. A. Kemmerer // Dept. of Computer Science, University of California, Santa Barbara. - 2000.
Sheyner Oleg Scenario Graphs and Attack Graphs // PhD thesis, SCS, Carnegie Mellon University. - 2004.
Смелянский Р.Л., Качалин А.И. Применения нейросетей для обнаружения аномального поведения объектов в компьютерных сетях // Факультет Вычислительной Математики и Кибернетики, МГУ им. М. В. Ломоносова, Москва. - 2004.
S.A. Hofmeyr An immunological model of distributed detection and its application to computer security // Ph.D. thesis, University of New Mexico. - 1999.
M.P.Zielinski Applying Mobile Agents in an Immune-system-based intrusion detection system // University of South Africa. - 2004.
Srinivas Mukkamala, Andrew H. Sung, Ajith Abraham Intrusion detection using an ensemble of intelligent paradigms // Journal of Network and Computer Applications. - 2005.
R.A. Whitehurst Expert Systems in Intrusion Detection: A Case Study //Computer Science Laboratory, SRI International, Menlo Park, CA. - 1987.
Calvin Ko Execution Monitoring of Security-critical Programs in a Distributed System: A Specification-based Approach // PhD thesis, Department of Computer Science, University of California at Davis, USA. - 1996.
S. Smaha Haystack: an intrusion detection system // 4th Aerospace Computer Security Applications Conf. - 1988. - pp. 37–44.
Sandeep Kumar and Eugene H. Spafford An application of pattern matching in intrusion detection // Technical Report CSD-TR-94-013, The COAST Project, Dept. of Computer Sciences, Purdue University, West Lafayette, IN, USA. - 1994.
Detecting unusual program behavior using the statistical component of the next generation intrusion detection system (NIDES) / Debra Anderson, Teresa F. Lunt, Harold Javitz, Ann Tamaru, and Alfonso Valdes // Technical Report SRI-CSL-95-06, Computer Science Laboratory, SRI International, Menlo Park, CA, USA. - 1995.
Architecture design of a scalable intrusion detection system for the emerging network infrastructure / Y. Frank Jou, Fengmin Gong, Chandru Sargor // Technical Report CDRL A005, Dept. of Computer Science, North Carolina State University, Releigh, N.C, USA. - 1997.
Ahmed Awad E. Ahmed, Issa Traore Anomaly Intrusion Detection based on Biometrics // Proceedings of the 2005 IEEE, Workshop on Information Assurance, United States Military Academy, West Point, NY. - 2005.
Downloads
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).