ВИЯВЛЕННЯ КІБЕРАТАК В ІНФОРМАЦІЙНИХ МЕРЕЖАХ (Ukrainian)

Item request has been placed! ×
Item request cannot be made. ×
loading   Processing Request
  • Additional Information
    • Alternate Title:
      CYBER ATTACKS DETECTION IN INFORMATION NETWORKS. (English)
    • Abstract:
      Cyber security is becoming increasingly important in ensuring the national security of various countries. Cyber attacks and cyber influences are increasingly becoming one of the main actions to achieve the goal of control over various objects (person, organization, region, state, etc.) in the modern world. Thus, a new phenomenon in international politics has emerged in the world - the ability to achieve their own political goals, economic and spiritual subordination of the peoples of other states without the use of military force. Therefore, cyber attacks and cyber influences are developing quite actively in the world. Therefore, for the effective operation of modern information and telecommunication networks and means of their protection, as well as for the reliable detection and prediction of cyber attacks and unauthorized actions, it is necessary to develop new approaches and methods of cyber security. The purpose of the article is to detect cyber attacks in information networks. The problem of detecting a cyber-attack A (t) against the background of white Gaussian noise V (t) under the condition of continuous observation time is considered. The theoretical substantiation of the averaged forecasting object (AOP) is given. A consistent analysis of UOP in the general case revealed that it is not a sufficient statistic in the problem of sequential detection of cyber attacks. From the above it follows that one of the main issues in the synthesis of optimal sequential and inconsistent detector of cyber attacks with random moments of occurrence is to find algorithms for the formation of UOP. As a result of the conducted researches the technique of detection of NSD with the unknown moment of occurrence in discrete time of supervision is offered. [ABSTRACT FROM AUTHOR]
    • Abstract:
      Copyright of Informatics & Mathematical Methods in Simulation / Informatika ta Matematičnì Metodi v Modelûvannì is the property of Odessa Polytechnic University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)