A new approach for the botnet detection based on multi-agent system is proposed. For increasing of the efficiency of botnet detection the multi-agent system was involved that allowed to make botnet detection via agents' communication within corporate network. A new technique with the usage of fuzzy and neural-fuzzy systems that makes the conclusion about botnet presence degree in computer systems is developed. The analysis of the botnets' actions demonstrations in the situation of the intentionally computer system reconnection is performed. It takes into account the botnet demonstrations in the several computer systems which are available in the network.
In the article the urgency of the problem of granting access to services of distributed cloud system is disclosed, in particular, the peer distributed cloud system is characterized. The process of interaction of the main components is provided to access the domain name web resource. It is researched that the distribution of resources between nodes of a peer distributed cloud system with the subsequent provision of services on request is implemented using the Kademlia protocol on a local network or Internet and contains processes for publishing the resource at the initial stage of its owner, replication and directly providing access to resources. Application of modern technologies of adaptive information security systems does not allow full control over the information flows of the cloud computing environment, since they function at the upper levels of the hierarchy. Therefore, to create effective mechanisms for protecting software in a cloud computing environment, it is necessary to develop new threat models and to create methods for displaying computer attacks that allow operatively to identify hidden and potentially dangerous processes of information interaction. Rules of access form the basis of security policy and include restrictions on the mechanisms of initialization processes access. Under the developed operations model, the formalized description of hidden threats is reduced to the emergence of context-dependent transitions in the multigraph transactions. The method of granting access to the services of the distributed cloud system is substantiated. It is determined that the Distributed Hash Table (DHT) infrastructure is used to find a replication node that has a replica of the requested resource or part of it. The study identified the stages of identification of the node's validation. The process of adding a new node, validating authenticity, publishing a resource, and accessing a resource is described in the form of a step-by-step sequence of actions within the framework of the method of granting access to services of a distributed cloud system by graphical description of information flows, interaction of processes of information and objects processing.
В статті проведено аналіз статистик Державного центру кіберзахисту Державної служби спеціального зв’язку та захисту інформації України по кількісному та якісному складу атак, та звітів IBM по збиткам, що вони завдали. Проаналізовано системи контролю та аналізу трафіку, визначено загальну направленість таких засобів на виявлення атак на мережу. Визначено типи атак, що зазвичай проводяться з ЗКМ та дано опис їх дій. Представлено архітектуру загальнодоступних комп’ютерних мереж (ЗКМ), визначено її складові, місце зловмисника та системи захисту. Показано, що типове місце зловмисника за межами мережі не відповідає дійсності саме для ЗКМ. Запропоновано структуру ЗКМ, яка дозволяє захищати мережу як від зовнішніх так і від внутрішніх зловмисників.
This article was analyzed the threats to computer data in computer systems and classified these threats by their attributes. The relationships between threat classes, attributes, and related security methods and tools have defined the mathematical model of the computer threat classification problem. Based on the model analysis was concluded that the computer threats classification problem belongs to difficult formalized problems and requires for its solution methods of intellectual analysis, one of which is the subsystem of logical inference implemented in this article.
Розглянуто актуальне завдання вибору математичної моделі стеганографічної системи для приховування інформації в рамках інфраструктури мережевого спілкування інтернет-учасників в медіа-просторі. Запропонована модель орієнтована на розробку і оцінку ефективності стеганоалгоритмів для приховування інформації великого об'єму в цифрових зображеннях та реалізації функції роботи з форматами JPEG і BMP. Передбачено, що робочі алгоритми стеганографічної системи ана лізують і змінюють структуру сегментів файлів.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2025 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.