Translate this page:
Please select your language to translate the article


You can just close the window to don't translate
Library
Your profile

Back to contents

Software systems and computational methods
Reference:

Ponachugin A.V., Odintsov I.V. Control system for Spotting Out Online Users’ Unauthorized Activity

Abstract: The article is devoted to the main types of users’ unauthorized activity and analysis of existing approaches to the data security on the Internet, their design and technical implementation features. The authors of the article examine the control system designated not only to monitor but also to prevent malicious activity in corporate computer network. The authors also demonstrate the construction of the security system as one of the main organization departments and the system maintenance after it has been implemented. The authors provide the list of the main information leakage channels. After that, the authors unfold the problem step by step from the methods used by intruders to get unauthorized access to the corporate computer network to the actions the data protection system must perform. The authors describe the full chain of actions to be completed by the security system. The results of the research allow to compare the existing methods and services protecting the computer network from unauthorized access both outside and inside the enterprise. The authors also develop the recurrence scheme for creating the security system, outline the scope of functions to be performed and analyze the security of the services used.


Keywords:

neuronet, system vulnerability, intruder, security, computer networks, Cisco, Internet, computer system, unauthorized access, confidential information


This article can be downloaded freely in PDF format for reading. Download article


References
1. Tashkov P. Zashchita komp'yutera na 100%: sboi, oshibki i virusy. Izd-vo Piter, 2010. 288 s.
2. Shan'gin V.F. Informatsionnaya bezopasnost' komp'yuternykh sistem i setey: uchebnoe posobie. M.: ID «FORUM»; INFRA-M, 2008. 416 s.
3. Yasnitskiy L.N. Vvedenie v iskusstvennyy intellekt: Uchebnoe posobie dlya stud. vyssh. ucheb. zavedeniy / L.N. Yasnitskiy. M.: Izdatel'skiy tsentr «Akademiya», 2010. 176 s.
4. Yashchenko V.V. Vvedenie v kriptografiyu / V.V. Yashchenko. M.: 2014. 705 c.
5. Stepanov V.G. Informatsionnaya bezopasnost': Uchebno-metodicheskie materialy. M.:MIEMP, 2005. 19 s.
6. Romanets Yu.V., Timofeev P.A. Zashchita informatsii v komp'yuternykh setyakh / Pod red. V.F. Shan'gina. 2-e izd., pererab. i do. M.: Radio i svyaz', 2001. 376 s.
7. Mendelevskiy I.D. Ataka cherez Internet / NPO «Mir i sem'ya-95», 1997. 202 s.
8. Migalova K.S., Ponachugin A.V. Problema bezopasnosti elektronnykh platezhey. V sbornike: Perspektivy razvitiya nauki Mezhdunarodnaya nauchno-prakticheskaya konferentsiya. Otv. red.: Sukiasyan Asatur Al'bertovich. Ufa, 2015. S. 134-137.
9. Paroshin A.A. Informatsionnaya bezopasnost': standartizirovannye terminy i ponyatiya. Vladivostok: Izd-vo Dal'nevost. Un-ta, 2010. 216 s.
10. Zaytsev A.P., Golubyatnikov I.V. Programmno-apparatnye sredstva obespecheniya informatsionnoy bezopasnosti: Uchebnoe posobie. Izdanie 2-e. M.: Mashinostroenie-1, 2006-260 s.
11. Devid V. Chepmen, ml., Endi Foks. Brandmauery Cisco Secure PIX: Nauchno-populyarnoe izdanie/ Izdatel'skiy dom "Vil'yams", 2003. 384 s.
12. Elizarov A.I. Metodika postroeniya sistem raspoznavaniya avtomobil'nogo nomera / A.I. Elizarov. – Izvestiya Tomskogo politekhnicheskogo universiteta, 2010. 118–121 s.
13. Gladkikh A.A., Dement'ev V.E. Bazovye printsipy informatsionnoy bezopasnosti vychislitel'nykh sistem: uchebnoe posobie dlya studentov. Ul'yanovsk: UlGTU, 2009. 168 s.
14. Burakov, M.V. Neyronnye seti i neyrokontrollery: uch. posobie / M.V. Burakov. SPb: GUAP, 2013. 284 s.
15. Brassar Zh. Sovremennaya kriptologiya / Zh. Brassar. M.:, 2013. 570 c.
16. Bolotova Yu.A., Spitsyn V.G., Fomin A.E. Primenenie modeli ierarkhicheskoy vremennoy pamyati v raspoznavaniya izobrazheniy // Izvestiya Tomskogo politekhnicheskogo universiteta. 2011. T. 318. ¹ 5. S. 60–63.
17. Aleksanov A.K., Demchev I.A. Bezopasnost' kartochnogo biznesa: biznes-entsiklopediya / TsIPSiR; M., 2012. 277 s.