2023
DOI: 10.3390/app13031831
|View full text |Cite
|
Sign up to set email alerts
|

Features of the Practical Implementation of the Method for Managing Observations of the State of Monitored Objects in Intrusion Detection Systems

Abstract: This article discusses the possibility of generalizing the existing methods of optimization of observations to the problems of resource management of intrusion detection systems. The aim of this work is to study the applied aspects of the application of the surveillance optimization method, which increases the efficiency of using the resources of intrusion detection systems. The set goal of the work was achieved through the following tasks: (1) on the basis of experimental data, the development of a dynamic mo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 24 publications
0
1
0
Order By: Relevance
“…Denial of service attacks affect the availability of information resources. A denial of service is considered successful if the data resource becomes unavailable as a result [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15]. The success of the attack and the impact on the target resources differ in that the impact damages the victim, for example, if an online store is attacked.…”
Section: Introductionmentioning
confidence: 99%
“…Denial of service attacks affect the availability of information resources. A denial of service is considered successful if the data resource becomes unavailable as a result [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15]. The success of the attack and the impact on the target resources differ in that the impact damages the victim, for example, if an online store is attacked.…”
Section: Introductionmentioning
confidence: 99%