Dmitry S. Silnov, A. O. Prokofiev, G. Berezovskaya, V. A. Perevozchikov, S. S. Troitskiy, I. U. Shumakov
{"title":"A method of detecting a malicious actions using HTTP and FTP protocols","authors":"Dmitry S. Silnov, A. O. Prokofiev, G. Berezovskaya, V. A. Perevozchikov, S. S. Troitskiy, I. U. Shumakov","doi":"10.1109/INTELLISYS.2017.8324264","DOIUrl":null,"url":null,"abstract":"This article is devoted to methods of improving the security systems efficiency using Honeypot technology. Basic principles of creating the protection system using this technology are observed. Also, the methods of web services organization which use affected software to efficiently detect intrusions are proposed. And several ways of the file storages effective organization are also proposed. Options of collecting statistical information about malicious actions and assessment of the effect on the proposed approaches are given.","PeriodicalId":131825,"journal":{"name":"2017 Intelligent Systems Conference (IntelliSys)","volume":"956 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Intelligent Systems Conference (IntelliSys)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INTELLISYS.2017.8324264","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
This article is devoted to methods of improving the security systems efficiency using Honeypot technology. Basic principles of creating the protection system using this technology are observed. Also, the methods of web services organization which use affected software to efficiently detect intrusions are proposed. And several ways of the file storages effective organization are also proposed. Options of collecting statistical information about malicious actions and assessment of the effect on the proposed approaches are given.