{"title":"计算机攻击检测方法和系统分析及响应条件的概率表示","authors":"Yevgeny V. Alpeev, A. Stadnik, I. Korolev","doi":"10.1109/REEPE49198.2020.9059126","DOIUrl":null,"url":null,"abstract":"Currently, the trend of detection, identification, elimination of cyber-attacks is due to development and usage of informational technologies. For detecting and identifying computer attacks relevant Intrusion Detection Systems (hereinafter - IDS) are applied. Modern IDS typically are founded operate to detect one of two classes of intrusion detection. The first class of attacks is detected by methods, in which existing attacks developing according to a certain scenario of attack, are described. The second class of methods of anomalies detection attacks is detected by methods anomaly detection - deviation from normal behavior of a protectable system and processes in it. Therefore, on that basis development of comprehensive method of detecting computer attacks (impacts) to detect the attacks of first and second classes for a certain time interval is considered in order to increase probability of detecting are attack to a computer system under protection.","PeriodicalId":142369,"journal":{"name":"2020 International Youth Conference on Radio Electronics, Electrical and Power Engineering (REEPE)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Analysis of Methods and Systems of Computer Attacks Detection and Probabilistic Representation of Conditions to Respond\",\"authors\":\"Yevgeny V. Alpeev, A. Stadnik, I. Korolev\",\"doi\":\"10.1109/REEPE49198.2020.9059126\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Currently, the trend of detection, identification, elimination of cyber-attacks is due to development and usage of informational technologies. For detecting and identifying computer attacks relevant Intrusion Detection Systems (hereinafter - IDS) are applied. Modern IDS typically are founded operate to detect one of two classes of intrusion detection. The first class of attacks is detected by methods, in which existing attacks developing according to a certain scenario of attack, are described. The second class of methods of anomalies detection attacks is detected by methods anomaly detection - deviation from normal behavior of a protectable system and processes in it. Therefore, on that basis development of comprehensive method of detecting computer attacks (impacts) to detect the attacks of first and second classes for a certain time interval is considered in order to increase probability of detecting are attack to a computer system under protection.\",\"PeriodicalId\":142369,\"journal\":{\"name\":\"2020 International Youth Conference on Radio Electronics, Electrical and Power Engineering (REEPE)\",\"volume\":\"12 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 International Youth Conference on Radio Electronics, Electrical and Power Engineering (REEPE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/REEPE49198.2020.9059126\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Youth Conference on Radio Electronics, Electrical and Power Engineering (REEPE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/REEPE49198.2020.9059126","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Analysis of Methods and Systems of Computer Attacks Detection and Probabilistic Representation of Conditions to Respond
Currently, the trend of detection, identification, elimination of cyber-attacks is due to development and usage of informational technologies. For detecting and identifying computer attacks relevant Intrusion Detection Systems (hereinafter - IDS) are applied. Modern IDS typically are founded operate to detect one of two classes of intrusion detection. The first class of attacks is detected by methods, in which existing attacks developing according to a certain scenario of attack, are described. The second class of methods of anomalies detection attacks is detected by methods anomaly detection - deviation from normal behavior of a protectable system and processes in it. Therefore, on that basis development of comprehensive method of detecting computer attacks (impacts) to detect the attacks of first and second classes for a certain time interval is considered in order to increase probability of detecting are attack to a computer system under protection.