Models, methods and information technologies of protection of corporate systems of transport based on intellectual identification of threats
DOI:
https://doi.org/10.7494/dmms.2015.9.2.117Keywords:
protection of information systemsAbstract
In article results of researches on development of methods and models of intellectual recognition of threats to information systems of transport. The article to contain results of the researches, allowing to raise level of protection of the automated and intellectual information systems of the transportation enterprises (AISTE) in the conditions of an intensification of transportations. The article to contain mathematical models and results of an estimation information systems having Internet connection through various communication channels. The article also considers the issues of research and protection of the AISTE under the condition of several conflict data request threads.References
Ahmad D., Dubrovskiy A., Flinn Х. Defense from the hackers of corporate networks, DMK, Moscow 2005.
A. Avizienis, J.-C. Laprie, B. Randell, C. Landwehr, Basic concepts and taxonomy of dependable and secure computing, IEEE Trans.Dependable and Secure Computing, USA 2004.
K. Trivedi, D. Kim, A. Roy, Dependability and Security Models. Department of Electrical and Computer Engineering Duke University Durham, NC, USA 2001.
Transportation & Logistics 2030. Securing the supply, Germany 2014.
V. Lahno, A. Petrov. Ensuring security of automated information systems, transportation companies with the intensification of traffic, Ukraine 2011.
Worldwide Security and Vulnerability Management 2004-2014, National Computer Center Publications, Manchester 2014.
D. Harel, Visual Formalism for Complex Systems, USA 1987, p. 231-274.
F. Lau, S. Rubin, M. Smith, L. Trajkovic, Distributed denial of service attacks, USA 2000, p. 304.
V. Lahno, A. Petrov, Modelling of discrete recognition and information vulnerability search procedures, TEKA, Poland 2010, p. 137-144.
V. Lahno, A. Petrov, Experimental studies of productivity change in corporate information systems for companies in terms of computer attacks. Information security, Ukraine 2011.
V. Lahno, A. Petrov, Marketing and logistics problems in the management of organization. Task The Research of the conflict Request Threads in the Data Protection Systems, Bielsko-Biala 2011.
V. Lahno, A. Petrov, Management and production engineering. Modeling information security system of transport enterprises, Bielsko-Biala 2012.
Y. Xiang, W. Zhou, M. Chowdhury, A Survey of Active and Passive Defence Mechanisms against DDoS Attacks. TR, Australia 2004.
J. Mirkovic, S. Dietrich, D. Dittrich, P. Reiher, Internet Denial of Service: Attack and Defense Mechanisms, Prentice Hall PTR, UK 2004.
C. Chapman, S. Ward, Project Risk Management: processes, techniques and insights, USA 2003.
M. Atighetchi, P. Pal, F. Webber, Adaptive Cyberdefense for Survival and Intrusion Tolerance, Internet Computing, USA 2004.
S.-D. Chi, J.S. Park, K.-C. Jung, J.-S Lee, Network Security Modeling and Cyber At-tack Simulation Methodology, LNCS, USA 2001.
Chirillo J. Hack Attacks Testing - How to Conduct Your Own Security Audit, Wiley, USA 2003.
V. Mehta, C. Bartzis, H. Zhu, E.M. Clarke, J.M. Wing, Ranking Attack Graphs, Proceedings of Recent Advances in Intrusion Detection, Hamburg, Germany, 2006.
M. Smirniy, V. Lahno, A. Petrov, The research of the conflict request threads in the data protection systems. VNU, Ukraine 2009.
Shun-Chieh Lin, Shian-Shyong Tseng, Constructing detection knowledge for DDoS intrusion tolerance. Expert Systems with Applications, USA 2004.
S. Templeton, K. Levit, A Requires/Provides Model for Computer Attacks. USA 2000.
Downloads
Published
How to Cite
Issue
Section
License
Remeber to prepeare, sign and scan copyright statement
The content of the journal is freely available according to the Creative Commons License Attribution 4.0 International (CC BY 4.0)
Accepted 2015-10-26
Published 2016-03-21