Abstract
The features of a system for identifying abnormal network activity are considered. Algorithmic and software systems for identifying abnormal network activity and detecting threats are developed.
Similar content being viewed by others
References
Peleshenko, V.S., Development of a mathematical model of information exchange in the local area network for the realization of assets and the method of network security information, Cand. Sci. (Eng.) Dissertation, Stavropol, 2007.
Zavgorodnii, V.I., Kompleksnaya zashchita informatsii v komp’yuternykh sistemakh (Comprehensive Protection of Information in Computer Systems), Moscow: Logos, 2001.
Soshnikov, I.O., Frolov, U.A., Plyukhina, I.A., and Peleshenko, V.S., Threats to information security in computer networks and troubleshooting, Vopr. Nauki, no. 4, (11), 2014, pp. 20–26.
Shan'gin, V.F., Zashchita informatsii v komp’yuternykh sistemakh i setyakh (Protection of Information in Computer Systems and Networks), Moscow: DMK Press, 2012.
Yarochkin, V.I., Informatsionnaya bezopasnost’: Uchebnik dlya studentov vuzov (Information Security: Textbook for University Students), Moscow: Academic Project; Gaudeamus, 2004, 2nd ed.
Belov, E.B., Los’, V.P., Meshcheryakov, R.V., and Shelupanov, A.A., Osnovy informatsionnoi bezopasnosti (Fundamentals of Information Security), Moscow: Goryachaya liniya, 2006.
Author information
Authors and Affiliations
Corresponding author
Additional information
Original Russian Text © V.V. Nikonov, V.P. Los’, G.V. Ross, 2016, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy.
About this article
Cite this article
Nikonov, V.V., Los’, V.P. & Ross, G.V. Development of automated system for identifying abnormal network activity and detecting threats. Aut. Control Comp. Sci. 50, 693–702 (2016). https://doi.org/10.3103/S0146411616080150
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411616080150