Models and realization of intrusion detection in enterprise corporate information system with intellectual approuch
The methodic of intrusion detection in corporate information systems (CIS) on three levels are done. Models of autonomic and net intrusion detection systems (IDS) including some components are presented. IDS on the base of Snort is worked out and used. During its investigation some tasks were execut...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | Russian |
| Published: |
Educational institution «Belarusian State University of Informatics and Radioelectronics»
2019-06-01
|
| Series: | Doklady Belorusskogo gosudarstvennogo universiteta informatiki i radioèlektroniki |
| Subjects: | |
| Online Access: | https://doklady.bsuir.by/jour/article/view/937 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849243493223890944 |
|---|---|
| author | U. A. Vishniakou M. G. Mosdurany Shiras |
| author_facet | U. A. Vishniakou M. G. Mosdurany Shiras |
| author_sort | U. A. Vishniakou |
| collection | DOAJ |
| description | The methodic of intrusion detection in corporate information systems (CIS) on three levels are done. Models of autonomic and net intrusion detection systems (IDS) including some components are presented. IDS on the base of Snort is worked out and used. During its investigation some tasks were executed: creating the virtual computer net for CIS, analyzing its possible vulnerability; attuning and preparing IDS for CIS with intellectual approach (knowledge in rules view); checking of IDS activity during simulation various attacks and their detection. |
| format | Article |
| id | doaj-art-dae45789d5ef412fb7dfbbf5e26506f2 |
| institution | Kabale University |
| issn | 1729-7648 |
| language | Russian |
| publishDate | 2019-06-01 |
| publisher | Educational institution «Belarusian State University of Informatics and Radioelectronics» |
| record_format | Article |
| series | Doklady Belorusskogo gosudarstvennogo universiteta informatiki i radioèlektroniki |
| spelling | doaj-art-dae45789d5ef412fb7dfbbf5e26506f22025-08-20T03:59:27ZrusEducational institution «Belarusian State University of Informatics and Radioelectronics»Doklady Belorusskogo gosudarstvennogo universiteta informatiki i radioèlektroniki1729-76482019-06-01087984936Models and realization of intrusion detection in enterprise corporate information system with intellectual approuchU. A. Vishniakou0M. G. Mosdurany Shiras1Belarussian state university of informatics and radioelectronicsBelarussian state university of informatics and radioelectronicsThe methodic of intrusion detection in corporate information systems (CIS) on three levels are done. Models of autonomic and net intrusion detection systems (IDS) including some components are presented. IDS on the base of Snort is worked out and used. During its investigation some tasks were executed: creating the virtual computer net for CIS, analyzing its possible vulnerability; attuning and preparing IDS for CIS with intellectual approach (knowledge in rules view); checking of IDS activity during simulation various attacks and their detection.https://doklady.bsuir.by/jour/article/view/937intrusion detection systemmethodicmodelrulecorporate management system |
| spellingShingle | U. A. Vishniakou M. G. Mosdurany Shiras Models and realization of intrusion detection in enterprise corporate information system with intellectual approuch Doklady Belorusskogo gosudarstvennogo universiteta informatiki i radioèlektroniki intrusion detection system methodic model rule corporate management system |
| title | Models and realization of intrusion detection in enterprise corporate information system with intellectual approuch |
| title_full | Models and realization of intrusion detection in enterprise corporate information system with intellectual approuch |
| title_fullStr | Models and realization of intrusion detection in enterprise corporate information system with intellectual approuch |
| title_full_unstemmed | Models and realization of intrusion detection in enterprise corporate information system with intellectual approuch |
| title_short | Models and realization of intrusion detection in enterprise corporate information system with intellectual approuch |
| title_sort | models and realization of intrusion detection in enterprise corporate information system with intellectual approuch |
| topic | intrusion detection system methodic model rule corporate management system |
| url | https://doklady.bsuir.by/jour/article/view/937 |
| work_keys_str_mv | AT uavishniakou modelsandrealizationofintrusiondetectioninenterprisecorporateinformationsystemwithintellectualapprouch AT mgmosduranyshiras modelsandrealizationofintrusiondetectioninenterprisecorporateinformationsystemwithintellectualapprouch |