scholarly journals Development of a Model for Detecting Unauthorized Traffic

2020 ◽  
pp. 6-11
Author(s):  
Alexey Babenko ◽  
Yuliya Gushchina

Information systems and technologies are the main means of increasing people’s productivity and efficiency. And today, along with the tasks of effective processing and transmission of information, the most important task is to ensure the information security of enterprises. According to the global study by InfoWatch, the number of information leaks is growing every year. The largest number of data leaks were recorded in high-tech companies, educational institutions, government agencies and banks. Most often, network traffic is a threat. This threat consists in the interception of data over the network, the purpose of which is to obtain confidential data, passwords, corporate secrets, addresses of network computers, etc. There is a need to create hardware and software tools to protect network resources. Therefore, creating a tool for detecting unauthorized traffic is relevant. The authors consider the problem of information security in the enterprise computer network and carry out the analysis of unauthorized traffic in order to identify its signs. The researchers analyze methods for detecting unauthorized traffic to select the best one and present a developed formalized model for detecting unauthorized traffic.

Author(s):  
Ю.С. Шевнина ◽  
Л.Г. Гагарина ◽  
А.В. Чирков ◽  
Н.С. Миронов

Исследовано три решения проблематики нелинейного процесса организации доступа в АИС образовательного спектра. Определены ключевые причины появления затруднений с использованием автоматизированных информационных систем и проведен анализ существующих средств и методик, которые применяются при организации взаимодействия между пользователями и АИС. Статья объясняет, каким образом можно упростить доступ к АИС путем использования принципов декомпозиции и иерархичности. В реализации указано, какой может быть структура АИС типового образовательного учреждения. Проведено сравнение преимуществ и недостатков разных систем бухгалтерского, управленческого, хозяйственно-экономического учета с точки зрения интеграции в работу высших учебных заведений. Отдельное внимание уделено анализу механизмов и особенностей взаимодействия между подсистемами АИС и базой данных на примере проведения аттестационных мероприятий. На основании изученных аспектов функционирования АИС сделан вывод о недостаточности использования вузами локальных систем и необходимости разработки и последующей интеграции персонализированных высокотехнологичных решений, которые позволят увеличить эффективность образовательной деятельности. В перспективах показано, какие задачи можно поставить перед собой, чтобы внедрить дополнительные аспекты декомпозиции и иерархичности в аналогичных системах We investigate three solutions to the problem of the nonlinear process of organizing access to the AIS of the educational spectrum. We identified the key reasons for the emergence of difficulties with the use of automated information systems and carried out the analysis of existing tools and techniques that are used in organizing interaction between users and AIS. We explained in what way we can simplify the access to AIS by using the principles of decomposition and hierarchy. The implementation indicates what the structure of the AIS of a typical educational institution can be. We carried out comparison of the advantages and disadvantages of different systems of accounting, managerial economic and economic accounting from the point of view of integration into the work of higher educational institutions. Special attention is paid to the analysis of the mechanisms and features of the interaction between the AIS subsystems and the database on the example of carrying out certification activities. On the basis of the studied aspects of the functioning of the AIS, we made a conclusion about the insufficient use of local systems by universities and the need for the development and subsequent integration of personalized high-tech solutions that will increase the efficiency of educational activities. The perspectives show what tasks you can set in order to implement additional aspects of decomposition and hierarchy in similar systems


2012 ◽  
Vol 562-564 ◽  
pp. 872-875
Author(s):  
Xin Cui ◽  
Li Jiang

The crux of safety communication of computer network lies in the accuracy of data transmission and the security of confidential data. Information security is the premise and foundation of all communication based on computer network. Business online becomes much more risky. Security technologies, such as authentication, encryption, must be implemented to ensure the security of the transactions. Digital signature technology plays an irreplaceable role in the fields of identification and authentication, data integrity, anti-repudiation and so on, which has a very wide range of application in e-commerce and e-government. The radical methods and traits of digital signature are introduced. The approach of digital signature based on Java is presented, and its rationality, effectively and feasibility are reasoned, the test results achieved the expected goals and ensured the confidentiality, integrity, and non-repudiation of the information. This solution can be widely used in digital campus, enterprise nets, etc, and has a good application prospect.


10.28945/2855 ◽  
2005 ◽  
Author(s):  
Mariana Hentea

The guidelines “Towards a Culture of Security” emphasize a culture of security in all aspects of information systems, from designing and planning through to everyday use, and among all participants, from government down through business to consumers. In response to national needs, Information Security education has become a priority for many educational institutions in US for the past years. More universities and colleges have established courses or specialized programs to teach Information Security skills to students enrolled in degrees related to computers such as computer information systems, computer engineering, and computer science. However, there are aspects of the security education model that need attention. This paper discusses these issues including changes to improve security awareness education. Through close coordination between faculty, industry, government agencies, and universities, the critical education of future graduates, Information Technology professionals, Information Security professionals, and public can be accelerated.


2020 ◽  
Vol 1 (3) ◽  
pp. 44-53
Author(s):  
E.T. Mannopova ◽  

This article describes the main approaches to the development of an intellectual information system for managing the educational process. When developing, the experience of some foreign and national universities is taken into account, taking into account the general principles of the educational process. The analysis showed that in the development of IP there is a need for a specific approach to the development of the system.


Author(s):  
Вадим Георгиевич Ерышов ◽  
Никита Вадимович Ерышов

В статье проведен анализ актуальных угроз информационной безопасности информационных систем, возникших при переходе сотрудников организаций на удаленный режим работы. The article analyzes the current threats to information security of information systems that occurred when employees of organizations switch to remote mode of operation.


2018 ◽  
Vol 7 (4.38) ◽  
pp. 82
Author(s):  
Aleksey Valentinovich Bogdanov ◽  
Igor Gennadievich Malygin

The paper considers the conceptual provisions of building a promising cognitive information security system of the museum complex on a cyber-physical basis. The stratified model of cognitive information security system of the museum complex was presented. It was shown that the key technological platform for the security of the museum complex is information and network technologies integrated (converged) with the technologies of industrial artificial intelligence. The generalized structural scheme of the cognitive cycle of the information security system of the museum complex was considered. The characteristic of the basic processes realized in a cognitive contour was given.   


2014 ◽  
Vol 701-702 ◽  
pp. 919-922
Author(s):  
Hong Fei Xu ◽  
Si Rui Pang ◽  
Jian Wen Du ◽  
Xue Mei Li

A system includes three power information security defense line is constructed, to achieve the information network, information outside the network, scheduling data network depth protection. According to the information security protection requirements, starting from the overall structure of information systems, taking into account the information system to schedule production system as the core, based on independent research and development of core information security isolation unit, set up three lines of defense in the power of information systems, electricity secondary system, information network systems, information systems outside the network partition protection.


Sign in / Sign up

Export Citation Format

Share Document