Modern information security最新文献

筛选
英文 中文
Choosing an appropriate architecture to protect the information system from multi-level DDOS attacks 选择合适的体系结构,保护信息系统免受多级DDOS攻击
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2021.013540
V. V. Borodan, D. Guy
{"title":"Choosing an appropriate architecture to protect the information system from multi-level DDOS attacks","authors":"V. V. Borodan, D. Guy","doi":"10.31673/2409-7292.2021.013540","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.013540","url":null,"abstract":"The paper examines multi-level DDoS attacks, which are a type of denial of service (DoS) attack, which aims to ban network services by failing target servers or consuming their resources, so that these servers can no longer provide services to legitimate users. DDoS attacks are divided into several classes, which include: Telnet brute force attack, SYN flood attack, ICMP flood attack, Smurf attack, Ping flood, HTTP Get Flooding request attack and HTTP Post. It is concluded that in order to create an effective information security architecture and, at the same time, effective measures to combat DDoS attacks, it is important to understand the different methods of DDoS. The architecture of information system protection against multilevel DDoS-attacks based on SDN and analysis of network traffic correlation is presented. Recommendations for protecting the information system from multi-level DDoS-attacks have been developed. It is noted that in addition to technical measures, organizations also need to implement procedural measures at the level of protection, detection and response.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133012794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Formal mathematical models for providing information security 提供信息安全的形式化数学模型
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2019.015963
O. Laptyev, V. Stepanenko, Yu. O. Tykhonov
{"title":"Formal mathematical models for providing information security","authors":"O. Laptyev, V. Stepanenko, Yu. O. Tykhonov","doi":"10.31673/2409-7292.2019.015963","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.015963","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"AES-17 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114119187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information security and the human factor 信息安全与人为因素
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2020.044145
Y. Maslova, I. Kushnir
{"title":"Information security and the human factor","authors":"Y. Maslova, I. Kushnir","doi":"10.31673/2409-7292.2020.044145","DOIUrl":"https://doi.org/10.31673/2409-7292.2020.044145","url":null,"abstract":"The article considers the problems that may arise during the implementation and operation of information security systems without proper assessment of risks and possible shortcomings of direct technical solutions. Certain aspects of implementation, the most common problems and risks that may be due to the human factor.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114201689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threat analysis of web-applications based on REST architecture 基于REST架构的web应用威胁分析
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2022.012733
K. Prus
{"title":"Threat analysis of web-applications based on REST architecture","authors":"K. Prus","doi":"10.31673/2409-7292.2022.012733","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.012733","url":null,"abstract":"The paper analyzes the problem of cybersecurity of Web-applications, defines the purpose and objectives for securing Web-applications. The analysis of vulnerabilities of Web-applications is carried out. Based on the research conducted in the work, recommendations for the use of methods for protecting Web-applications have been developed.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"205 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116392642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software Development to Protect Information from Unauthorized Access 保护信息免遭未经授权访问的软件开发
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2019.048287
Yu. M. Shcheblanin, O. Kurchenko, N. A. Goncharenko
{"title":"Software Development to Protect Information from Unauthorized Access","authors":"Yu. M. Shcheblanin, O. Kurchenko, N. A. Goncharenko","doi":"10.31673/2409-7292.2019.048287","DOIUrl":"https://doi.org/10.31673/2409-7292.2019.048287","url":null,"abstract":"","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"292 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116518207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The method of calculating the protection of information from the interaction of users in social networks 计算社交网络中用户交互信息保护的方法
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2021.010613
V. Savchenko, V. Akhramovych, T. Dzyuba, S. Laptіev, M. V. Matvienko
{"title":"The method of calculating the protection of information from the interaction of users in social networks","authors":"V. Savchenko, V. Akhramovych, T. Dzyuba, S. Laptіev, M. V. Matvienko","doi":"10.31673/2409-7292.2021.010613","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.010613","url":null,"abstract":"The elements of user interaction in social networks are considered: it is shown that the method of analysis of user interactions is based on assumptions when the magnitude of the influence depends on the centrality of users in the social network; the greater the consonance, the higher the nature of the influence, the interaction is a nonlinear function; it is indicated that interaction is a process that has a time interval, the linear model of protection of the information protection system from user interaction is considered; the obtained equations of protection are the equation of a harmonic oscillator with damping amplitude, the iteration of oscillations of the protection system in the pre-resonant, resonant and post-resonant zones is shown.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114660908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Technology to protect the E-mail of the corporate information system from spam 保护企业信息系统的电子邮件免受垃圾邮件侵害的技术
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2021.020304
M. V. Volkov, O. D. Shapovalenko
{"title":"Technology to protect the E-mail of the corporate information system from spam","authors":"M. V. Volkov, O. D. Shapovalenko","doi":"10.31673/2409-7292.2021.020304","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.020304","url":null,"abstract":"A study of the impact of spam messages and modern threats to the process of e-mail exchange of corporate information system. The role of spam and its impact in corporate information systems is studied. The peculiarities of counteraction directions and technologies of providing protection of e-mail against spam are investigated. Based on the research conducted in the work, recommendations for improving the secure e-mail exchange of the corporate information system have been developed.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114789005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security problems and countermeasures against attacks in NFC NFC中存在的安全问题及攻击对策
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2023.010005
R. V. Khvorostyanyy
{"title":"Security problems and countermeasures against attacks in NFC","authors":"R. V. Khvorostyanyy","doi":"10.31673/2409-7292.2023.010005","DOIUrl":"https://doi.org/10.31673/2409-7292.2023.010005","url":null,"abstract":"Near Field Communication (NFC) technology is widely used due to its ease of use. However, NFC is vulnerable to security attacks such as man-in-the-middle; denial of service (DOS), etc. These attacks lead to the leakage of important user data, which can affect any organization that uses NFC applications and technologies. This article discusses NFC vulnerabilities and different types of NFC attacks. The article also discusses possible solutions that could protect NFC from these security threats.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115027257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of the degree of security of Web applications based on the analysis of their structure and information content 在分析Web应用程序的结构和信息内容的基础上,研究Web应用程序的安全程度
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2022.033947
O. Y. Anypchenko
{"title":"Study of the degree of security of Web applications based on the analysis of their structure and information content","authors":"O. Y. Anypchenko","doi":"10.31673/2409-7292.2022.033947","DOIUrl":"https://doi.org/10.31673/2409-7292.2022.033947","url":null,"abstract":"The article examines the security issues of Web applications depending on their morphological structure and structure. It is shown that Web applications are one of the most vulnerable systems today. The more critical and sensitive data the software stores, the more important it becomes to control its security. The definition of user information content in the WWW, which exists, was analyzed, and it was found that it is highly specialized and mutually contradictory. A new conceptual definition of user information content is proposed - as information content that was created by website users who are not representatives of its owner organization and placed on the WWW as part of a creative, communicative, promotional or other process without prior professional editing.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131799069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensuring cyber protection of a computer network object of information activity 确保计算机网络信息活动对象的网络保护
Modern information security Pub Date : 1900-01-01 DOI: 10.31673/2409-7292.2021.046469
A. Kotenko, M. Yasko
{"title":"Ensuring cyber protection of a computer network object of information activity","authors":"A. Kotenko, M. Yasko","doi":"10.31673/2409-7292.2021.046469","DOIUrl":"https://doi.org/10.31673/2409-7292.2021.046469","url":null,"abstract":"Ways to obtain unauthorized information on computer networks and threats to cyber security in them are described. It is shown that in order to ensure reliable protection of information in computer systems, in addition to ensuring the security of information in the network, it is necessary to ensure the security of the physical environment of the computer network. It is recommended to use the recommendations of the X.805 standard to ensure the security of information on the computer network.","PeriodicalId":107068,"journal":{"name":"Modern information security","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134260253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信