Research of Methods of Forecasting Attacks on Information Systems

N. Golovacheva, Nikita Andreichenko
{"title":"Research of Methods of Forecasting Attacks on Information Systems","authors":"N. Golovacheva, Nikita Andreichenko","doi":"10.15688/nbit.jvolsu.2022.3.2","DOIUrl":null,"url":null,"abstract":"The article analyzes the methods of forecasting attacks on information systems. Within the framework of experimental studies, the best method for predicting attacks on information systems has been identified. At the present stage of society’s development, the problems of information security come to the fore in most areas of the company’s activities. This is due to a significant number of informatization projects currently being implemented. Most of them are aimed at building a unified information space in order to optimize the processing of large volumes of various kinds of information, including ensuring its reliable storage and prompt access for participants of information exchange. Priority tasks in this direction are: identification, analysis and classification of existing mechanisms for the implementation of threats to information security; assessment of possible damage; identification of basic measures to counter threats; elimination of vulnerabilities; development of security criteria and protection mechanisms. One of the means of solving these problems is the detection of computer attacks. Malicious impacts on information systems can be presented in the form of network attacks. A network attack is an intentional action by third parties aimed at establishing control over a local or remote computer or computer system. As a result of attacks, attackers can disrupt the network, change account rights, receive users’ personal data and implement other goals. Network attacks by the nature of the impact on the network can be divided into active and passive. The active ones affect the network, which may cause the network to malfunction, or modification of its settings. This type of exposure leaves traces in the network, which is why it is immediately calculated that it will be detected. A passive attack is carried out without affecting the network. But her work violates network security. It is much more difficult to detect it than the active one due to the lack of direct intervention. Basically, the purpose of the attack is unauthorized access to protected information, distorting it or intercepting it. In the first case, the data is changed, in the second, access is performed without interfering with the data structure.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"NBI Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.15688/nbit.jvolsu.2022.3.2","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The article analyzes the methods of forecasting attacks on information systems. Within the framework of experimental studies, the best method for predicting attacks on information systems has been identified. At the present stage of society’s development, the problems of information security come to the fore in most areas of the company’s activities. This is due to a significant number of informatization projects currently being implemented. Most of them are aimed at building a unified information space in order to optimize the processing of large volumes of various kinds of information, including ensuring its reliable storage and prompt access for participants of information exchange. Priority tasks in this direction are: identification, analysis and classification of existing mechanisms for the implementation of threats to information security; assessment of possible damage; identification of basic measures to counter threats; elimination of vulnerabilities; development of security criteria and protection mechanisms. One of the means of solving these problems is the detection of computer attacks. Malicious impacts on information systems can be presented in the form of network attacks. A network attack is an intentional action by third parties aimed at establishing control over a local or remote computer or computer system. As a result of attacks, attackers can disrupt the network, change account rights, receive users’ personal data and implement other goals. Network attacks by the nature of the impact on the network can be divided into active and passive. The active ones affect the network, which may cause the network to malfunction, or modification of its settings. This type of exposure leaves traces in the network, which is why it is immediately calculated that it will be detected. A passive attack is carried out without affecting the network. But her work violates network security. It is much more difficult to detect it than the active one due to the lack of direct intervention. Basically, the purpose of the attack is unauthorized access to protected information, distorting it or intercepting it. In the first case, the data is changed, in the second, access is performed without interfering with the data structure.
信息系统攻击预测方法研究
文章分析了信息系统攻击预测的方法。在实验研究的框架内,已经确定了预测信息系统攻击的最佳方法。在社会发展的现阶段,信息安全问题在公司活动的大部分领域都是突出的。这是由于目前正在实施大量信息化项目。它们大多旨在建立统一的信息空间,以优化处理大量各类信息,包括保证信息的可靠存储和信息交换参与者的及时访问。在这个方向上的优先任务是:识别、分析和分类现有机制,以实现对信息安全的威胁;可能损害的评估;确定应对威胁的基本措施;消除脆弱性;制定安全标准和保护机制。解决这些问题的方法之一是检测计算机攻击。对信息系统的恶意影响可以表现为网络攻击。网络攻击是由第三方故意采取的行动,目的是建立对本地或远程计算机或计算机系统的控制。通过攻击,攻击者可以破坏网络、更改帐户权限、获取用户的个人数据等。网络攻击按其对网络影响的性质可分为主动攻击和被动攻击。活动节点影响网络,可能导致网络故障或修改网络设置。这种类型的暴露会在网络中留下痕迹,这就是为什么它会立即被检测到的原因。被动攻击是在不影响网络的情况下进行的攻击。但她的工作违反了网络安全。由于缺乏直接干预,发现它比发现主动的要困难得多。基本上,攻击的目的是未经授权访问受保护的信息,扭曲或拦截它。在第一种情况下,数据被更改,在第二种情况下,在不干扰数据结构的情况下执行访问。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信