Main parameters for information security intruder identification
DOI:
https://doi.org/10.18372/2410-7840.15.4221Keywords:
information security intruder, intruder detection system, intruder model, parameters, identification, robot, cortegeAbstract
Studying of the person of information security intruder has a great scientific and practical importance. In addition accordingly to normative documents intruders and threats models development is important stage in development of effective information security systems. From this viewpoint parameters formalization for intruder identification is an actual research problem. The solving of this problem is a subject of the paper. Definition of complete set (cortege) of host and network parameters can give a possibility to consider features of attacks (from people or robots) and to increase preventive measures & security systems efficiency. Given results can be the basis for intrusion detection systems based on honeypot-technology development.
References
Корт С.С. Структура систем обнаружения нарушителя [Електронний ресурс]: стаття / С.С. Корт. – Режим доступу: http://www.ssl.stu.neva.ru/sam/
Denning D.E. An Intrusion-Detection Model / Dorothy E. Denning // IEEE Transactions On Software Engineering. – February 1987. – Vol. SE-13, No. 2. – P. 222-232.
Бабак В.П. Інформаційна безпека та сучасні мережеві технології: Англо-українсько-російський словник термінів / В.П. Бабак, О.Г. Корченко. – К.: НАУ, 2003. – 670 с.
НД ТЗІ 1.4-001-00. Типове положення про службу захисту інформації в автоматизованій системі.
Головань С.М. Базові вимоги до побудови моделі загроз інформаційних систем / С.М. Головань // Інформаційна безпека. – 2009. – №1. – С.17-25.
Hacker [Електронній ресурс]: стаття словника // Энциклопедическом словаре хакера (Jargon File). – Режим доступу:
http://www.catb.org/~esr/jargon/html/H/hacker.html
Гудкова Д. Спам в 2012 году [Електронний ре-сурс]: стаття / Д. Гудкова. – Режим доступу: http://www.securelist.com/ru/analysis/208050782/Spam_v_2012_godu
Камлюк В. Ботнеты [Електронній ресурс]: стаття / Виталий Камлюк. – Режим доступу: http://www.securelist.com/ru/analysis?pubid=204007610.
Ботнеты: беда, откуда не ждали [Електронній ресурс]: стаття // UPgrade. – Июль 2012. – №584. – Режим доступу: http://www.upweek.ru/botnety-beda-otkuda-ne-zhdali.html.
Ptacek Thomas H. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection / Thomas H. Ptacek, Timothy N. Newsham. – Secure Networks, Inc, 1998. – 63 с.
Корт С.С. Методы обнаружения нарушителя [Електронній ресурс]: стаття / С.С. Корт. – Ре-жим доступу: http://www.ssl.stu.neva.ru/sam/
Kort S.S. Struktura sistem obnaruzheniya narushitelya [Electronic resource]: stattja / S.S. Kort. – Mode of access: http://www.ssl.stu.neva.ru/sam/
Denning D.E. An Intrusion-Detection Model / Dorothy E. Denning // IEEE Transactions On Software Engineering, February 1987, Vol. SE-13, No. 2, P. 222-232.
Babak V.P. Informatsijna bezpeka ta suchasni merezhevi tekhnologii: Anglo-ukrayins`ko-rosijs`kyj slovnyk terminiv / V.P. Babak, O.G. Korchenko, K.: NAU, 2003, 670 s.
ND TZI 1.4-001-00. Typove polozhennia pro sluzhbu zakhystu informatsii v avtomatyzovanii systemi.
Golovan` S.M. Bazovi vymogy do pobudovy modeli zagroz informatsijnykh system / S.M. Holovan` // Informatsijna bezpeka, 2009, №1, S.17-25.
Hacker [Electronic resource]: stattja slovnyka // Entsiklopedicheskiy slovar hakera (Jargon File). Mode of access: http://www.catb.org/~esr/jargon/html/H/hacker.html
Gudkova D. Spam v 2012 godu [Electronic resource]: stattja / D. Gudkova, Mode of access: http://www.securelist.com/ru/analysis/208050782/Spam_v_2012_godu
Kamlyuk V. Botnety [Electronic resource]: stattja / Vitaliy Kamlyuk., Mode of access: http://www.securelist.com/ru/analysis?pubid=204007610.
Botnety: beda, otkuda ne zhdali [Electronic resource]: stattja // Upgrade, July 2012. – №584. – Mode of access: http://www.upweek.ru/botnety-beda-otkuda-ne-zhdali.html.
Ptacek Thomas H. Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection / Thomas H. Ptacek, Timothy N. Newsham. – Secure Networks, Inc, 1998, 63 с.
Kort S.S Metody obnaruzheniya narushitelya [Elec-tronic resource]: stattja / S.S. Kort. – Mode of access: http://www.ssl.stu.neva.ru/sam/
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).