ALGORITHM FOR CONSTRUCTING AND CONFIGURING PARAMETERS OF A MODEL FOR SEARCHING FOR TRACES OF ATTACKS IN AN INFORMATION SYSTEM

Authors

  • Obidjon Bekmirzayev Tashkent State University of Economics

Abstract

In the information system, it is not possible to constantly monitor the activity of users, that is, monitoring in real time mode is inconvenient. Therefore, it is important to form the actions of users in the system on the basis of parameters based on their role, and to create rules for searching for attack traces in the future detection of attacks, and to configure models and parameters for searching and detecting attack traces based on these rules.

References

Nuralievich, B. O., & Boltaevich, M. B. (2021, November). Method of Detection and Elimination of Tracks of Attacks in the Information System. In 2021 International Conference on Information Science and Communications Technologies (ICISCT) (pp. 1-2). IEEE.

Nuralievich, B. O., Boltaevich, M. B., & Ugli, B. U. B. (2022, September). The Procedure for Forming a List of Sources of Attack in the Information System. In 2022 International Conference on Information Science and Communications Technologies (ICISCT) (pp. 1-4). IEEE.

Bekmirzaev O., Shirinov B. An Algorithm for Viewing Node State Events Under Attack for Information Systems // AIP Conference Proceedings., 2024, 3147(1), 050003. DOI: 10.1063/5.0210404

Bekmirzaev O., Samarov H. A Method of Evaluating the Effectiveness of Information System Protection // AIP Conference Proceedings., 2024, 3147(1), 050004. DOI: 10.1063/5.0210405

Muminov, B., & Bekmirzaev, O. (2022). Classification and analysis of network attacks in the category of “denial of service” information system. central asian journal of education and computer sciences (CAJECS), 1(1), 7-15

Downloads

Published

2024-09-11

How to Cite

Bekmirzayev, O. (2024). ALGORITHM FOR CONSTRUCTING AND CONFIGURING PARAMETERS OF A MODEL FOR SEARCHING FOR TRACES OF ATTACKS IN AN INFORMATION SYSTEM. DTAI – 2024, 1(DTAI), 171–174. Retrieved from https://dtai.tsue.uz/index.php/DTAI2024/article/view/xwsd52w62