PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
2012 | 12 | 3 |

Tytuł artykułu

Information security company in a DoS (DDoS) attack

Autorzy

Treść / Zawartość

Warianty tytułu

RU
Informacionnaja bezopasnost' kompanii pri DoS (DDoS) atake

Języki publikacji

EN

Abstrakty

EN
The article to contain results of the researches, allowing to raise level of protection of the automated and intellectual information systems enterprises (AIS). The article discusses the use of discrete procedures to detect threats DoS (DDoS) attacks for information resources.
RU
Статья содержит результаты исследований, позволяющие повысить уровень защиты автоматизированных и интеллектуальных информационных систем предприятий и компаний. В статье предложена модель системы поддержки принятия решений в случае выявления DoS (DDoS) атаки для варианта нечеткой входной информации.

Wydawca

-

Rocznik

Tom

12

Numer

3

Opis fizyczny

p.84-89,fig.,ref.

Twórcy

autor
  • Lugansk National Agrarian University, Lugansk, Ukraine

Bibliografia

  • 1. Ahmad D., Dubrovskiy A., Flinn Х., 2005.: Defense from the hackers of corporate networks. Trudged. with angl. - 2th izd. M.: Companies AyTi; DMK - Press. 864 p.
  • 2. Atighetchi M., Pal P., Webber F., Schantz R., Jones C., Loyall J., 2004.: Adaptive Cyberdefense for Survival and Intrusion Tolerance // Internet Computing. Vol. 8, No.6. p.25-33.
  • 3. Atighetchi M., Pal P.P., Jones C.C., Rubel P., Schantz R.E., Loyall J.P., Zinky J.A., 2003.: Building Auto-Adaptive Distributed Applications: The QuO-APOD Experience // Proceedings of 3rd International Workshop Distributed Auto-adaptive and Reconfigurable Systems (DARES). Providence, RhodeIsland, USA. p.74-84.
  • 4. Chapman C., Ward S., 2003.: Project Risk Management: processes, techniques and insights.Chichester, John Wiley. Vol. 1210.
  • 5. Chi S., Park J., Jung K., Lee J., 2001.: Network Security Modeling and Cyber At-tack Simulation Methodology//LNCS. Vol. 2119.
  • 6. Goldman R., 2002.: A Stochastic Model for Intrusions//LNCS. Vol. 2516.
  • 7. Gorodetski V., Kotenko I., 2002.: Attacks against Computer Network: Formal Grammar-based Framework and Simulation Tool. RAID 2000//LNCS. Vol. 2516.
  • 8. Harel D. Statecharts: A., 1987.: Visual Formalism for Complex Systems, Science of Computer Programming 8. p. 231-274.
  • 9. Hariri S., Qu G., Dharmagadda T., Ramkishore M., Raghavendra C., 2003.: Impact Analysis of Faults and Attacks in Large-Scale Networks//IEEE Security & Privacy. р. 456-459.
  • 10. Hatley D., Pirbhai I., 1988.: Strategies for Real-Time System Specification, Dorset House Publishing Co., Inc., NY. 930 р.
  • 11. Keromytis A., Parekh J., Gross P., Kaiser G., Misra V., Nieh J., Rubensteiny D., Stolfo S., 2003.: A Holistic Approach to Service Survivability // Proceedings of ACM Workshop on Survivable and Self-Regenerative Systems. Fairfax, VA. p. 11-22.
  • 12. Lahno V., Petrov A. 2011.: Modelling of discrete recognition and information vulnerability search procedures. TEKA. Volume XI A. p. 137-144.
  • 13. Lahno V., Petrov A. 2011.: Ensuring security of automated information systems, transportation companies with the intensification of traffic: Monograph. Lugansk. 2011.
  • 14. Lahno V.A. Petrov A.S. 2011.: Task The Research of the conflict Request Threads in the Data Protection Systems. Marketing and logistics problems in the management of organization. Edited by: Honorata Howaniec, Wieslaw Waszkielewicz. Chapter XV. Academia Techniczno – Humanistyczna w Bielsko-Biala. 2011. p. 230-251.
  • 15. Lahno V.A., Petrov A.S. 2011.: Experimental studies of productivity change in corporate information systems for companies in terms of computer attacks. Information security № 1 (5), 2011. p.181-189.
  • 16. Lahno V., Petrov A., 2009.: Prevention from Penetration into Dynamic Database of Corporate Information Systems of Enterprises. Management of Organizatoon Finances, Production, Information. Bielsko-Biala. p. 282-290.
  • 17. Smirniy M., Lahno V., Petrov A., 2009.: The research of the conflict request threads in the data protection systems. Proceedings of Lugansk branch of the International Academy of Informatization. № 2(20). V 2. 2009. р. 23-30.
  • 18. Templeton S., Levitt K., 2000.: A Requires/Provides Model for Computer Attacks. Proc. of the New Security Paradigms Workshop. p. 274-280.
  • 19. Xiang Y., Zhou W., Chowdhury M., 2004.: A Survey of Active and Passive Defence Mechanisms against DDoS Attacks. Technical Report, TR C04/02, School of Information Technology, Deakin University, Australia. р. 38-43.
  • 20. Slobodyanuk M., Nechaev G. 2010.: The evaluation technique of logistics system cargo transportation efficiency development.TEKA Kom. Mot I Energ. Roln, - OL PAN, 10B. Lublin, 2010. p. 162-170.

Typ dokumentu

Bibliografia

Identyfikatory

Identyfikator YADDA

bwmeta1.element.agro-7962da82-57bc-4376-b6b0-60723780efb7
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.