Method and model of intellectual threats detection for information and communication transport environment
DOI:
https://doi.org/10.18372/2225-5036.21.8306Keywords:
information security, intellectual threats detection, discrete procedures, fuzzy sets, transportAbstract
The work contains research results aimed at further development of methods and models for information and communication environment transport sector intellectual threat detection and information security improvement in the emerging unified information-communication environment, creating a single integrated state information system, implementation of new and upgrading existing information systems in transport and increase the number of destabilizing effects on the availability, confidentiality and integrity of information. A method of predictive threat detection based on discrete procedures using the apparatus of logic functions and fuzzy sets, which allow to increase the efficiency of threats detection, create effective analysis, hardware and software solutions.References
The role of IT in logistics / David J. Closs, Jim Davidson, Richard L. Dawe, Templeton S. J., Levitt K. A. // The Official Magazine of The Logistics Institute, 2007, Vol. 27. № 6.
Transport Logistics. Shared solution to common challenges/ ODSE, 2002. - 53 p.
Transportation & Logistics 2030. Volume 4: Securing the supply. pp. 254-286.
Корниенко А.А. Средства защиты информации на железнодорожном транспорте. [учеб. пос.] / А.А. Корниенко, М.А. Еремеев, С.Е. Ададуров - М.: Маршрут. – 2006, 256 с.
Лахно В.А. Обеспечение защищенности автоматизированных информационных систем транспортных предприятий при интенсификации перевозок. Монография. / В.А. Лахно, А.С. Петров. – Луганск: изд-во ВНУ им. В. Даля, 2010. – 280 с.
MITRE Research Program. [Электронный ресурс]: Режим доступу: http://www.mitre.org
The Web Hacking Incidents Database 2008: Annual Report. [Электронный ресурс]: Режим доступу: http://www.breach.com/confirmation/2008 WHID.html
Mirkovic J. Internet Denial of Service: Attack and Defense Mechanisms. / Mirkovic J., Dietrich S., Dittrich D., Reiher P. – Prentice Hall PTR, 2004. 400 p.
Unsupervised adaptive filtering. V. 1, 2. Edited by S. Haykin. – New York: John Willey & Sons, Inc, 2000. – 1206 p.
Uptime Protection Solution. Nexusguard. Survey of Network – Based Defense Mechanisms Countering the DoS and DDoS Problems. April 2014.
Давиденко А.М. Аналіз дій загроз у автоматизованих системах обробки інформації / Давиденко А.М., Головань С.М., Щербак Л.М. // Моделювання та інформаційні технології Зб. наук. Пр. ІПМЕ НАН України. – 2006. – Вип. № 36 - С. 3-8.
Лахно В.А. Компьютерное моделирование DoS атаки на серверы компьютерных систем. / Лахно В.А., Петров А.С. // Сучасна спеціальна техніка. Науково-практичний журнал №2(25), – 2011. – С. 81-89.
Лахно В.А. Експериментальні дослідження зміни продуктивності корпоративних інформаційних систем підприємств в умовах реалізації комп’ютерних атак / В.А. Лахно, А.С. Петров // Інформаційна безпека. – Луганськ. – 2011. – №1(5). – С. 181-189.
Петров А.С. Вероятностные модели конфликтных потоков данных в системах защиты информации корпоративных сетей / В.А. Лахно, А.С. Петров, А.С. Ленков // Збірник наукових праць Військового інституту Київського національного університету імені Тараса Шевченка. – К. – 2009. – № 22. – С. 99-107.
Корченко А.Г. Построение систем защиты информации на нечетких множествах. Теория и практические решения / А.Г. Корченко – К. : «МК-Пресс», 2006. – 320с.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal "Ukrainian Scientific Journal of Information Security" adheres to the principles of open science and provides free, free and permanent access to all published materials. The goal of the policy is to increase the visibility, citation and impact of the results of scientific research in the field of information security. The journal works according to the principles of Open Access and does not charge a fee for access to published articles.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal “Ukrainian Scientific Journal of Information Security”:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.