Academic Journal
Analysis of intrusion detection systems ; Анализ систем обнаружения вторжений ; Аналіз систем виявлення вторгнень
العنوان: | Analysis of intrusion detection systems ; Анализ систем обнаружения вторжений ; Аналіз систем виявлення вторгнень |
---|---|
المؤلفون: | Казмірчук, Світлана Володимирівна, Корченко, Анна Олександрівнa, Паращук, Тарас Іванович |
المصدر: | Ukrainian Information Security Research Journal; Vol. 20 No. 4 (2018); 259-276 ; Защита информации; Том 20 № 4 (2018); 259-276 ; Захист інформації; Том 20 № 4 (2018); 259-276 ; 2410-7840 ; 2221-5212 |
بيانات النشر: | National Aviation University |
سنة النشر: | 2018 |
المجموعة: | Science Journals of National Aviation University, Ukraine |
مصطلحات موضوعية: | Attacks, Cyberattacks, Anomalies, Exploits, Intrusion Detection Systems, Cyberattack Detection Systems, Anomaly Detection Systems, Information Systems Anomaly Detection, UDC 004.056.53(045), атаки, кибератаки, аномалии, злоупотребления, системы обнаружения вторжений, системы обнаружения кибератак, системы обнаружения аномалий, выявление аномалий в информационных системах, УДК 004.056.53(045), кібератаки, аномалії, зловживання, системи виявлення вторгнень, системи виявлення кібератак, системи виявлення аномалій, виявлення аномалій в інформаційних системах |
الوصف: | As information technologies progress further, the number of vulnerabilities and threats to various data processing systems increases, creating a need for specialized security tools to ensure proper systems functioning and intrusion prevention. A promising area of rapid growth within the field of information security is cyberattack detection and information systems intrusion prevention of unauthorized party access. To identify network intrusions, intrusion detection and prevention systems use modern methods, models, controls and integrated technical solutions that can remain effective when new or modified types of cyberthreats occur. In general, whenever new threats and anomalies are generated by attacks with unidentified or vaguely defined properties, these tools do not always remain effective and require extended time resources to adapt to aforementioned security gaps. Thus, intrusion detection systems must be continuously researched and refined to ensure their effective operational continuity. Such systems include specialized software that is designed to detect suspicious activities or information system intrusions and take sufficient measures to prevent cyberattacks. Source analysis has shown that the issue of rapid detection of exploits and anomalies is a major concern for modern information systems and networks. Most papers only include a partial analysis and classification of intrusion detection systems, and provide a general description of corresponding controls that does not address their wide variety and does not include a required set of characteristics needed for an integrated assessment of such systems. Therefore, the paper presents a generalized analysis of intrusion detection software using a defined basic set of characteristics ("Cyberattack Category", "Adaptivity", "Detection Methods", "System Management", "Scalability", "Observation Level", "Cyberattack Response", "Security"and" Operating System Support"), which will provide certain options when choosing such tools and developing for them the ... |
نوع الوثيقة: | article in journal/newspaper |
وصف الملف: | application/pdf |
اللغة: | Ukrainian English Russian |
Relation: | http://jrnl.nau.edu.ua/index.php/ZI/article/view/13425/18724; http://jrnl.nau.edu.ua/index.php/ZI/article/view/13425/18725; http://jrnl.nau.edu.ua/index.php/ZI/article/view/13425/18726; http://jrnl.nau.edu.ua/index.php/ZI/article/view/13425 |
DOI: | 10.18372/2410-7840.20.13425 |
الاتاحة: | http://jrnl.nau.edu.ua/index.php/ZI/article/view/13425 https://doi.org/10.18372/2410-7840.20.13425 |
رقم الانضمام: | edsbas.B4C57CD6 |
قاعدة البيانات: | BASE |
DOI: | 10.18372/2410-7840.20.13425 |
---|