ALGORITHM FOR CONSTRUCTING AND CONFIGURING PARAMETERS OF A MODEL FOR SEARCHING FOR TRACES OF ATTACKS IN AN INFORMATION SYSTEM
Abstract
In the information system, it is not possible to constantly monitor the activity of users, that is, monitoring in real time mode is inconvenient. Therefore, it is important to form the actions of users in the system on the basis of parameters based on their role, and to create rules for searching for attack traces in the future detection of attacks, and to configure models and parameters for searching and detecting attack traces based on these rules.
References
Nuralievich, B. O., & Boltaevich, M. B. (2021, November). Method of Detection and Elimination of Tracks of Attacks in the Information System. In 2021 International Conference on Information Science and Communications Technologies (ICISCT) (pp. 1-2). IEEE.
Nuralievich, B. O., Boltaevich, M. B., & Ugli, B. U. B. (2022, September). The Procedure for Forming a List of Sources of Attack in the Information System. In 2022 International Conference on Information Science and Communications Technologies (ICISCT) (pp. 1-4). IEEE.
Bekmirzaev O., Shirinov B. An Algorithm for Viewing Node State Events Under Attack for Information Systems // AIP Conference Proceedings., 2024, 3147(1), 050003. DOI: 10.1063/5.0210404
Bekmirzaev O., Samarov H. A Method of Evaluating the Effectiveness of Information System Protection // AIP Conference Proceedings., 2024, 3147(1), 050004. DOI: 10.1063/5.0210405
Muminov, B., & Bekmirzaev, O. (2022). Classification and analysis of network attacks in the category of “denial of service” information system. central asian journal of education and computer sciences (CAJECS), 1(1), 7-15