Development of a model for detecting unauthorized traffic

Бесплатный доступ

Information systems and technologies are the main means of increasing people’s productivity and efficiency. And today, along with the tasks of effective processing and transmission of information, the most important task is to ensure the information security of enterprises. According to the global study by InfoWatch, the number of information leaks is growing every year. The largest number of data leaks were recorded in high-tech companies, educational institutions, government agencies and banks. Most often, network traffic is a threat. This threat consists in the interception of data over the network, the purpose of which is to obtain confidential data, passwords, corporate secrets, addresses of network computers, etc. There is a need to create hardware and software tools to protect network resources. Therefore, creating a tool for detecting unauthorized traffic is relevant. The authors consider the problem of information security in the enterprise computer network and carry out the analysis of unauthorized traffic in order to identify its signs. The researchers analyze methods for detecting unauthorized traffic to select the best one and present a developed formalized model for detecting unauthorized traffic.

Еще

Information security, computer network, attack, unauthorized traffic, methods for detecting unauthorized traffic

Короткий адрес: https://sciup.org/149129797

IDR: 149129797   |   DOI: 10.15688/NBIT.jvolsu.2019.4.1

Статья научная