Development of a model for detecting unauthorized traffic
Автор: Babenko Alexey A., Gushchina Yuliya M.
Журнал: НБИ технологии @nbi-technologies
Рубрика: Инновации в информатике, вычислительной технике и управлении
Статья в выпуске: 4 т.13, 2019 года.
Бесплатный доступ
Information systems and technologies are the main means of increasing people’s productivity and efficiency. And today, along with the tasks of effective processing and transmission of information, the most important task is to ensure the information security of enterprises. According to the global study by InfoWatch, the number of information leaks is growing every year. The largest number of data leaks were recorded in high-tech companies, educational institutions, government agencies and banks. Most often, network traffic is a threat. This threat consists in the interception of data over the network, the purpose of which is to obtain confidential data, passwords, corporate secrets, addresses of network computers, etc. There is a need to create hardware and software tools to protect network resources. Therefore, creating a tool for detecting unauthorized traffic is relevant. The authors consider the problem of information security in the enterprise computer network and carry out the analysis of unauthorized traffic in order to identify its signs. The researchers analyze methods for detecting unauthorized traffic to select the best one and present a developed formalized model for detecting unauthorized traffic.
Information security, computer network, attack, unauthorized traffic, methods for detecting unauthorized traffic
Короткий адрес: https://sciup.org/149129797
IDR: 149129797 | DOI: 10.15688/NBIT.jvolsu.2019.4.1