Abstract

A substantial increase in financial losses accruing because of computer and network attacks on RuNet objects indicate that existing methods of protection are not sufficiently effective. Analysis of information security incidents shows that criminals in order to achieve the objectives apply dissimilar and multidirectional cyberattacks. Existing solutions are not fully able to counteract the harmful effects, including due to the inability to identify several such impacts held simultaneously. Developed algorithmic model makes based on the modeling and assessment of the damage from these threats, generate rules for systems counter cyber attacks, as well as identify conditions that enable timely modify these rules and reconfigure your network topology.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call