Skip to main content

Advertisement

Log in

Development of automated system for identifying abnormal network activity and detecting threats

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

The features of a system for identifying abnormal network activity are considered. Algorithmic and software systems for identifying abnormal network activity and detecting threats are developed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
€32.70 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (France)

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Peleshenko, V.S., Development of a mathematical model of information exchange in the local area network for the realization of assets and the method of network security information, Cand. Sci. (Eng.) Dissertation, Stavropol, 2007.

    Google Scholar 

  2. Zavgorodnii, V.I., Kompleksnaya zashchita informatsii v komp’yuternykh sistemakh (Comprehensive Protection of Information in Computer Systems), Moscow: Logos, 2001.

    Google Scholar 

  3. Soshnikov, I.O., Frolov, U.A., Plyukhina, I.A., and Peleshenko, V.S., Threats to information security in computer networks and troubleshooting, Vopr. Nauki, no. 4, (11), 2014, pp. 20–26.

    Google Scholar 

  4. Shan'gin, V.F., Zashchita informatsii v komp’yuternykh sistemakh i setyakh (Protection of Information in Computer Systems and Networks), Moscow: DMK Press, 2012.

    Google Scholar 

  5. Yarochkin, V.I., Informatsionnaya bezopasnost’: Uchebnik dlya studentov vuzov (Information Security: Textbook for University Students), Moscow: Academic Project; Gaudeamus, 2004, 2nd ed.

    Google Scholar 

  6. Belov, E.B., Los’, V.P., Meshcheryakov, R.V., and Shelupanov, A.A., Osnovy informatsionnoi bezopasnosti (Fundamentals of Information Security), Moscow: Goryachaya liniya, 2006.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. P. Los’.

Additional information

Original Russian Text © V.V. Nikonov, V.P. Los’, G.V. Ross, 2016, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nikonov, V.V., Los’, V.P. & Ross, G.V. Development of automated system for identifying abnormal network activity and detecting threats. Aut. Control Comp. Sci. 50, 693–702 (2016). https://doi.org/10.3103/S0146411616080150

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411616080150

Keywords

Navigation