BUILDING INTRUSION DETECTION SYSTEMS BASED ON THE BASIS OF METHODS OF INTELLECTUAL ANALYSIS OF DATA
Article Sidebar
Open full text
Issue Vol. 8 No. 4 (2018)
-
THE SOURCES OF RADIATION IN THE SHORT-WAVE RANGE ON THE BASIS OF II-VI HETEROLAYERS
Mikhail Slyotov, Alexey Slyotov4-7
-
ANALYSIS OF THE SEPARATION METHODS OF OPTICAL SPECTRA FOR INDIVIDUAL COMPONENTS
Viktor Makhniy, Oksana Kinzerska, Illia Senko8-11
-
FEATURES OF THE MANAGEMENT OF DATA ENCRYPTION KEYS IN THE CLOUD STORAGE MS SQL AZURE
Olexander Beley12-15
-
MULTICRITERIA SELECTION OF THE OPTIMAL DESIGN OPTIONS OF TELECOMMUNICATION FACILITIES
Valeriy Bezruk, Daria Chebotareva, Yulia Skoryk16-19
-
DEVELOPMENT OF THE METHOD OF INDIRECT STEGANOGRAPHIC DATA HIDING IN THE CONTAINER IMAGE CONTOUR
Volodymyr Barannik, Oleg Shatun, Dmitriy Barannik, Veronika Kobtseva20-23
-
STEGANOGRAPHY METHODS USED IN ATTACKS ON INFORMATION AND COMMUNICATION SYSTEMS
Anna Romanova, Sergiy Toliupa24-27
-
BUILDING INTRUSION DETECTION SYSTEMS BASED ON THE BASIS OF METHODS OF INTELLECTUAL ANALYSIS OF DATA
Serhii Toliupa, Mykola Brailovskyi, Ivan Parkhomenko28-31
-
OVERVIEW OF APPLICATIONS OF WIRE MEDIUM IN RADIO ENGINEERING MEANS
Mykola Khobzei, Dmytro Vovchuk, Magdalena Michalska32-35
-
IMPROVEMENT OF FIDELITY OF MOVING OBJECTS CLASSIFICATION IN GUARD SIGNALING COMPLEXES WITH SEISMIC SENSORS
Bohdan Volochiy, Mykhailo Zmysnyi, Leonid Ozirkovskyy, Volodymyr Onyshchenko, Yuriy Salnyk36-39
-
DEVELOPMENT OF THE REMOTE-PILOTED VEHICLE ALGORITHMIC SUPPORT AND ON-BOARD NAVIGATION COMPLEX STRUCTURE
Mykola Mykyjchuk, Volodymyr Markiv40-43
-
METHOD OF SAFE LANDING THE EMERGENCY QUADROCOPTER
Bohdan Blagitko, Yuriy Mochulsky44-47
-
IMPROVEMENT OF METHODS OF MOTION COMPENSATION OF DYNAMIC OBJECTS MOVING IN VIDEO STREAM OF THE VIDEOCONFERENCING SYSTEM
Volodymyr Barannik, Mykola Dvorsky, Valeriy Barannik, Viktoria Himenko, Anton Sorokun48-51
-
INFORMATION SYSTEM FOR ASSESSING THE PROFESSIONAL ACTIVITIES COMPLEXITY – THEORETICAL AND PRACTICAL ASPECTS OF IMPLEMENTATION
Oleg Zaritskyi52-55
-
SUN TRANSITS IN GEO SATELLITE SYSTEMS IN THE ASPECT OF RADIO WAVES PROPAGATION
Jacek Łukasz Wilk-Jakubowski56-59
-
INFLUENCE OF MOBILE ROBOT CONTROL ALGORITHMS ON THE PROCESS OF AVOIDING OBSTACLES
Piotr Wójcicki, Paweł Powroźnik, Kamil Żyła, Stanisław Grzegórski60-63
-
MODIFICATIONS OF MAXIMUM POWER POINT TRACKING P&O METHOD FOR PHOTOVOLTAIC PANEL
Piotr Kozierski, Adam Owczarkowski, Marcin Lis, Dariusz Horla64-67
Archives
-
Vol. 10 No. 4
2020-12-20 16
-
Vol. 10 No. 3
2020-09-30 22
-
Vol. 10 No. 2
2020-06-30 16
-
Vol. 10 No. 1
2020-03-30 19
-
Vol. 9 No. 4
2019-12-16 20
-
Vol. 9 No. 3
2019-09-26 20
-
Vol. 9 No. 2
2019-06-21 16
-
Vol. 9 No. 1
2019-03-03 13
-
Vol. 8 No. 4
2018-12-16 16
-
Vol. 8 No. 3
2018-09-25 16
-
Vol. 8 No. 2
2018-05-30 18
-
Vol. 8 No. 1
2018-02-28 18
-
Vol. 7 No. 4
2017-12-21 23
-
Vol. 7 No. 3
2017-09-30 24
-
Vol. 7 No. 2
2017-06-30 27
-
Vol. 7 No. 1
2017-03-03 33
-
Vol. 6 No. 4
2016-12-22 16
-
Vol. 6 No. 3
2016-08-08 18
-
Vol. 6 No. 2
2016-05-10 16
-
Vol. 6 No. 1
2016-02-04 16
Main Article Content
DOI
Authors
Abstract
Nowadays, with the rapid development of network technologies and with global informatization of society problems come to the fore ensuring a high level of information system security. With the increase in the number of computer security incidents, intrusion detection systems (IDS) started to be developed rapidly.Nowadays the intrusion detection systems usually represent software or hardware-software solutions, that automate the event control process, occurring in an information system or network, as well as independently analyze these events in search of signs of security problems. A modern approach to building intrusion detection systems is full of flaws and vulnerabilities, which allows, unfortunately, harmful influences successfully overcome information security systems. The application of methods for analyzing data makes it possible identification of previously unknown, non-trivial, practically useful and accessible interpretations of knowledge necessary for making decisions in various spheres of human activity. The combination of these methods along with an integrated decision support system makes it possible to build an effective system for detecting and counteracting attacks, which is confirmed by the results of imitation modeling.
Keywords:
References
Bankovic Z., Stepanovich D., Bojanic S., Nieto-Taladris O.: Improving network security using genetic algorithm approach, Computers and Electrical Engineering, 33(5-6)/2007, 438–451.
Barsegyan A. A., Kupriyanov M. S., Stepanenko V. V., Kholod I. I.: Technologies of data analysis: Data Mining, Visual Mining, Text Mining, OLAP, SPb. BHV, Petersburg 2007.
Bhattacharyya D. K., Kalita J. K.: Network Anomaly Detection. A Machine Learning Perspective, CRC Press, 2014.
Brailovskyi M. M., Pogrebna T. V., Ptakhok O. V.: Essential requirements for the construction and safety of next-generation networks. Telecommunication and Information Technologies 2/2014, 41–49.
Brailovskyi N. N., Ivanchenko E. V., Khoroshko V. A.: Diagnostics of information space protection systems" Information protection. Special issue 2014, 59–67.
Ghahramani Z.: An Introduction to hidden Markov models and Bayesian networks. International Journal of Pattern Recognition and Artificial Intelligence 15/2001, 9–42.
Koboseva A. A., Machalin I. O., Khoroshko V. O.: Analysis of the security of information systems. DUIKT, Kiev 2010.
Pavlov I. M., Toliupa S. V., Nishchenko V. I.: Analysis of Taxonomy of Attack Detection Systems in the Context of the Current Level of Information Systems Development. Modern Protection of Information 4/2014, 44–52.
Tajbakhsh A., Rahmati M., Mirzaei A.: Intrusion detection using fuzzy association rules. Applied Soft Computing 9(2)/2009, 462–469.
Tereikovskiy I., Toliupa S., Parkhomenko I., Tereikovska L.: Markov Model of Normal Conduct Template of Computer Systems Network Objects. 14th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering TCSET-2018.
Toliupa S. V, Borisov I. V.: Methodology of evaluation of the complex system of information security at the object of information activity. Scientific and Technical Journal "Modern Information Protection" 2/2013, 43–49.
Toliupa S. V, Parkhomenko І. І., Konovalenko А. D.: Analysis of vulnerabilities of local wireless networks and ways to protect them from possible attacks. Journal of the Engineering Academy of Ukraine 3/2017, 72–76.
Toliupa S. V., Parkhomenko І. І.: Multilevel hierarchical models of information security systems. Proceedings of the II International scientific and practical conference Trends in the development of corvergent networks: decision of the post: NGN, 4G, 5G. Kyiv 2016, 111–114.
Valdes A., Skinner K.: Adaptive model-based monitoring for cyber attack detection. Proc. of the Recent Advances in Intrusion Detection, Toulouse, France, 2000, 80–92.
Valdes A., Skinner K.: Adaptive model-based monitoring for cyber attack detection. Proc. of the Recent Advances in Intrusion Detection. Toulouse 2000, 80–92.
Yang H., Xie F., Lu Y.: Clustering and classification based anomaly detection. Fuzzy Systems and Knowledge Discovery 4223/2006, 1082–1091.
Article Details
Abstract views: 358
License

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
