Dmitry S. Silnov, A. O. Prokofiev, G. Berezovskaya, V. A. Perevozchikov, S. S. Troitskiy, I. U. Shumakov
{"title":"一种使用HTTP和FTP协议检测恶意操作的方法","authors":"Dmitry S. Silnov, A. O. Prokofiev, G. Berezovskaya, V. A. Perevozchikov, S. S. Troitskiy, I. U. Shumakov","doi":"10.1109/INTELLISYS.2017.8324264","DOIUrl":null,"url":null,"abstract":"This article is devoted to methods of improving the security systems efficiency using Honeypot technology. Basic principles of creating the protection system using this technology are observed. Also, the methods of web services organization which use affected software to efficiently detect intrusions are proposed. And several ways of the file storages effective organization are also proposed. Options of collecting statistical information about malicious actions and assessment of the effect on the proposed approaches are given.","PeriodicalId":131825,"journal":{"name":"2017 Intelligent Systems Conference (IntelliSys)","volume":"956 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A method of detecting a malicious actions using HTTP and FTP protocols\",\"authors\":\"Dmitry S. Silnov, A. O. Prokofiev, G. Berezovskaya, V. A. Perevozchikov, S. S. Troitskiy, I. U. Shumakov\",\"doi\":\"10.1109/INTELLISYS.2017.8324264\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article is devoted to methods of improving the security systems efficiency using Honeypot technology. Basic principles of creating the protection system using this technology are observed. Also, the methods of web services organization which use affected software to efficiently detect intrusions are proposed. And several ways of the file storages effective organization are also proposed. Options of collecting statistical information about malicious actions and assessment of the effect on the proposed approaches are given.\",\"PeriodicalId\":131825,\"journal\":{\"name\":\"2017 Intelligent Systems Conference (IntelliSys)\",\"volume\":\"956 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 Intelligent Systems Conference (IntelliSys)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/INTELLISYS.2017.8324264\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 Intelligent Systems Conference (IntelliSys)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INTELLISYS.2017.8324264","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A method of detecting a malicious actions using HTTP and FTP protocols
This article is devoted to methods of improving the security systems efficiency using Honeypot technology. Basic principles of creating the protection system using this technology are observed. Also, the methods of web services organization which use affected software to efficiently detect intrusions are proposed. And several ways of the file storages effective organization are also proposed. Options of collecting statistical information about malicious actions and assessment of the effect on the proposed approaches are given.