scholarly journals Corrigendum to: Y. V. Kosolapov, “On the Detection of Exploitation of Vulnerabilities Leading to the Execution of a Malicious Code”, Modeling and analysis of information systems, vol. 27, no. 2, pp. 138–151, 2020. DOI: https://doi.org/10.18255/1818-1015-2020-2-138-151

2021 ◽  
Vol 28 (3) ◽  
pp. 314-316
Author(s):  
Yury V. Kosolapov

In the article by Y. V. Kosolapov “On the Detection of Exploitation of Vulnerabilities Leading to the Execution of a Malicious Code” (Modeling and analysis of information systems, vol. 27, no. 2, pp. 138–151, 2020; https://doi.org/10.18255/1818-1015-2020-2-138-151) an inaccurate description of the algorithm CheckTrace is committed. The correct description of the algorithm CheckTrace is given below. The author apologises for the inconvenience.

2015 ◽  
Vol 2015 ◽  
pp. 1-8 ◽  
Author(s):  
Dohoon Kim ◽  
Donghee Choi ◽  
Jonghyun Jin

Most advanced persistent threat attacks target web users through malicious code within landing (exploit) or distribution sites. There is an urgent need to block the affected websites. Attacks on biomedical information systems are no exception to this issue. In this paper, we present a method for locating malicious websites that attempt to attack biomedical information systems. Our approach uses malicious code crawling to rearrange websites in the order of their risk index by analyzing the centrality between malware sites and proactively eliminates the root of these sites by finding the core-hub node, thereby reducing unnecessary security policies. In particular, we dynamically estimate the risk index of the affected websites by analyzing various centrality measures and converting them into a single quantified vector. On average, the proactive elimination of core malicious websites results in an average improvement in zero-day attack detection of more than 20%.


Author(s):  
Alexei Lapouchnian ◽  
Eric Yu ◽  
Stephanie Deng

As modern organizations increasingly need to operate in uncertain and fast-paced business environments, pressures increase on information systems (IS) to support these enterprises in a dynamically changing world. Consequently, systems need to deliver results given incompletely known and constantly changing requirements and contexts and other uncertainties. Their development is no longer a progression from clear and stable requirements to solutions meeting them. Rather, it is a continuous process involving multiple iterations of analysis and exploration, design, and development taking into consideration changing organizational needs, available resources, and feedback from previous iterations. Since current modeling and analysis notations generally assume stable and predictable settings for IS development, this paper explores the difficulties in applying several such techniques for modeling continuously evolving systems in uncertain and rapidly changing socio-technical domains and identifies requirements for a comprehensive modeling notation suitable for these environments. Business intelligence capability implementation in enterprises is used as an illustration.


Author(s):  
Евгений Романович Нежельский ◽  
Андрей Константинович Журавлев ◽  
Виктория Викторовна Исламгулова ◽  
Константин Александрович Разинкин ◽  
Игорь Леонидович Батаронов ◽  
...  

С каждым годом происходит рост атак злоумышленников на информационные системы с применением как вредоносного кода, так и методов социальной инженерии и вредоносных контентов. Существующие системы анализа эпидемических процессов предоставляют в основном средства визуализации результатов моделирования и не подходят для практического применения с целью воспроизведения реальных процессов диффузии вредоносного кода и контента в распределенных автоматизированных информационных системах. В статье приведена последовательность мероприятий, проведенных в рамках модернизации программно-технического комплекса «NetEpidemic» в направлении риск-мониторинга эпидемических процессов, протекающих в информационных системах, отвечающего требованиям в первую очередь прогнозирования и качественной визуализации результатов с целью его актуализации как инструмента научно-исследовательских изысканий и дальнейшего продвижения на рынке программного обеспечения. Every year, there is an increase in attacks by cybercriminals on information systems using both malicious code and methods of social engineering and malicious content. Existing systems for analyzing epidemic processes provide mainly visualization tools for modeling results and are not suitable for practical use in order to reproduce real processes of diffusion of malicious code and content in distributed automated information systems. The article provides a sequence of measures taken as part of the modernization of the software and hardware complex "NetEpidemic" in the direction of risk monitoring of epidemic processes occurring in information systems, which meets the requirements, first of all, of forecasting and high-quality visualization of results in order to update it as a research tool and further advancement in the software market.


2007 ◽  
Vol 12 (1) ◽  
pp. 51-54 ◽  
Author(s):  
Changguang Wang ◽  
Fangwei Wang ◽  
Yangkai Zhang ◽  
Jianfeng Ma

Sign in / Sign up

Export Citation Format

Share Document