This paper proposes traffic analysis procedure that is very effective and sometimes single countermeasure on counteracting of network attacks and information leakage channels (hidden control channels). Traffic analysis envisages certain measures to control the security of the Russian Federation information technology infrastructure and, most importantly, to establish the reasons of the occurred and predictable computer incidents
The article considers the methods that affect the operation of the intrusion detection system. Using...
This report presents two models that are used to detect the user abnormal behavior and network intru...
The semestral thesis deals with the analysis of the modern open-source NIDPS tools for monitoring an...
Thesis topic concerns the issue of information security in corporate environments. Literature search...
The last years brought substantial changes in solutions of problem of access defence to the resourc...
This thesis focuses on description of the current state of research in the detection of network atta...
The article addresses the issue of monitoring of the network activity of employee’s computers in ord...
Abstract. Aim Important contemporary trends in the theory and functional practice of secure automate...
In this paper the problem of information security in the network is considered. The methods of detec...
Computer security is to protect the data inside the computer, relay the information, expose the info...
The article touches upon the concepts of design services for collection and processing of network pa...
Cyber-attacks are becoming more common and over the last decade, many attacks have made top news, ta...
This paper focuses on theoretical and practical methods for detecting bandwidth attacks upon network...
Network traffic monitoring and analysis has several practical implications. It can be used for malic...
The article aims to describe and explain the basic principles of using the detection of suspicious b...
The article considers the methods that affect the operation of the intrusion detection system. Using...
This report presents two models that are used to detect the user abnormal behavior and network intru...
The semestral thesis deals with the analysis of the modern open-source NIDPS tools for monitoring an...
Thesis topic concerns the issue of information security in corporate environments. Literature search...
The last years brought substantial changes in solutions of problem of access defence to the resourc...
This thesis focuses on description of the current state of research in the detection of network atta...
The article addresses the issue of monitoring of the network activity of employee’s computers in ord...
Abstract. Aim Important contemporary trends in the theory and functional practice of secure automate...
In this paper the problem of information security in the network is considered. The methods of detec...
Computer security is to protect the data inside the computer, relay the information, expose the info...
The article touches upon the concepts of design services for collection and processing of network pa...
Cyber-attacks are becoming more common and over the last decade, many attacks have made top news, ta...
This paper focuses on theoretical and practical methods for detecting bandwidth attacks upon network...
Network traffic monitoring and analysis has several practical implications. It can be used for malic...
The article aims to describe and explain the basic principles of using the detection of suspicious b...
The article considers the methods that affect the operation of the intrusion detection system. Using...
This report presents two models that are used to detect the user abnormal behavior and network intru...
The semestral thesis deals with the analysis of the modern open-source NIDPS tools for monitoring an...