Web 3.0: The Distributed Information Network Economy

Author(s):  
Abeba N. Turi
Author(s):  
S. Toliupa ◽  
O. Pliushch ◽  
I. Parhomenko

The article proposes a combinatorial construction of a network attack detection system based on selected methods of data mining and conducts experimental research that confirms the effectiveness of the created detection model to protect the distributed information network. Experiments with a software prototype showed the high quality of detection of network attacks and proved the correctness of the choice of methods of data mining and the applicability of the developed techniques. The state of security of information and telecommunication systems against cyberattacks is analyzed, which allowed to draw conclusions that to ensure the security of cyberspace it is necessary to implement a set of systems and protection mechanisms, namely systems: delimitation of user access; firewall; cryptographic protection of information; virtual private networks; anti-virus protection of ITS elements; detection and prevention of intrusions; authentication, authorization and audit; data loss prevention; security and event management; security management. An analysis of publications of domestic and foreign experts, which summarizes: experience in building attack detection systems, their disadvantages and advantages; of attack and intrusion detection systems based on the use of intelligent systems. Based on the results of the review, proposals were formed on: construction of network attack detection systems on the basis of selected methods of data mining and experimental research, which confirms the effectiveness of the created detection model for the protection of the distributed information network.


Author(s):  
Н.Б. БАКАНОВА ◽  
Т.В. АТАНАСОВА

Рассматривается метод автоматизированного анализа обращений пользователей, поступающих в Центр обслуживания крупномасштабной распределенной информационной сети. Метод базируется на выявлении проблематики поступающих обращений и предложений, связанных с функционированием информационных комплексов организации. Проведено исследование по функционированию сети на основе анализа обращений пользователей. Показано, что оперативная обработка обращений и принятие решений по их исполнению позволит обеспечить эффективное обслуживание информационной сети организации. A method of automated analysis of user requests arriving at the service center of a large-scale distributed information network isconsidered. The method is based on identifying the problems of incoming requests and proposals related to the functioning of the organization's information systems. A study on the functioning of the network based on the analysis of user requestswas carried out. It isshownthat the promptprocessing of requests and decision-making on their execution will ensure effective maintenance of the organization's information network.


Online Review ◽  
1979 ◽  
Vol 3 (2) ◽  
pp. 181-194 ◽  
Author(s):  
R.T. Niehoff ◽  
S. Kwasny

Sign in / Sign up

Export Citation Format

Share Document