Abstract

The globalization of information exchange and the widespread introduction of information technologies in all spheres of society's life created the problem of protecting information processed in information systems from challenges and threats in the cybernetic space. The presence of important information in the functioning of the systems and critical national infrastructures objects enables its usage by the negatively-minded elements and groupings for the implementation of unlawful actions in the cyberspace by violating the integrity, availability, and confidentiality of information, and inflicting damage on information resources and information systems. In this case, the possibility of using information technologies in the cybernetic space in the interests of carrying out military-political and power confrontation, terrorism, and hacking cyber attacks are of particular concern. Today, intrusion detection and attack systems are usually software or hardware-software solutions that automate the process of monitoring events occurring in the information system or network, and independently analyze these events in search of security issues signs. An analysis of modern approaches to the development of such systems shows that it is the signature analysis of network traffic provides effective results in the development of protection modules of cyber systems. In addition, for the reliable protection of information systems, it is not only necessary to develop separate mechanisms of protection, but also to implement a systematic approach that includes a set of interrelated measures. The purpose of the article is to develop a system for recognizing cyber threats based on signature analysis, which would reduce the time of an attack detection of a cyber defense system while the number and complexity of cyber attacks are increasing

Highlights

  • One of the main problems, which under the condition of globalization information exchange and wide implementation of information technologies in all spheres of society’s life support came up in all states of the world, is the problem of protecting information processed in information systems from challenges and threats in the cybernetic space

  • Cyber attack phases can be described in the following way: ports testing; identification of program and machine tools; banner gathering; exploits usage; disorganization of network functioning with help of attacks for a customer service refusal; managing through backdoors; Trojans set searching; web proxies searching, presence signs removing and so on

  • The current state of the systems for detecting cyber attacks on information systems is full of weaknesses and vulnerabilities, which, allow harmful influences to successfully destroy information security systems

Read more

Summary

SIGNATURE AND STATISTICAL ANALYZERS IN THE CYBER ATTACK DETECTION SYSTEM

The globalization of information exchange and the widespread introduction of information technologies in all spheres of society's life created the problem of protecting information processed in information systems from challenges and threats in the cybernetic space. The presence of important information in the functioning of the systems and critical national infrastructures objects enables its usage by the negatively-minded elements and groupings for the implementation of unlawful actions in the cyberspace by violating the integrity, availability, and confidentiality of information, and inflicting damage on information resources and information systems. In this case, the possibility of using information technologies in the cybernetic space in the interests of carrying out military-political and power confrontation, terrorism, and hacking cyber attacks are of particular concern.

Introduction
Conclusion
СИГНАТУРНІ ТА СТАТИСТИЧНІ АНАЛІЗАТОРИ В СИСТЕМІ ВИЯВЛЕННЯ КІБЕРАТАК
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call