Architecture of an integrated java application for log analysis to detect computer attacks in information systems by responding to various security anomalies

Objective. When integrating the ELK stack into an information system, it is necessary to have a duplicate Java application in a closed circuit for hidden anomaly processing. It is necessary to develop the architecture of a Java application for hidden integration with the information system.Method. T...

Full description

Saved in:
Bibliographic Details
Main Authors: P. I. Sharikov, A. V. Krasov, A. V. Mayorovv
Format: Article
Language:Russian
Published: Dagestan State Technical University 2025-04-01
Series:Вестник Дагестанского государственного технического университета: Технические науки
Subjects:
Online Access:https://vestnik.dgtu.ru/jour/article/view/1709
Tags: Add Tag
No Tags, Be the first to tag this record!