Zobrazeno 1 - 10
of 10
pro vyhledávání: '"Andrian Piskozub"'
Publikováno v:
Data, Vol 9, Iss 10, p 119 (2024)
Recent cyber security solutions for wireless networks during internet open access have become critically important for personal data security. The newest WPA3 network security protocol has been used to maximize this protection; however, attackers can
Externí odkaz:
https://doaj.org/article/ec6ff68cab55425ca407082bc2ffd25f
Publikováno v:
Кібербезпека: освіта, наука, техніка, Vol 2, Iss 10, Pp 88-97 (2020)
У цій статті проаналізовано використання програмних приманок як активу захисту інформації. Проведено ретельне дослідження типів прима
Externí odkaz:
https://doaj.org/article/bd3dc528ec69444dad447e98517d2089
Publikováno v:
2021 11th IEEE International Conference on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications (IDAACS).
Publikováno v:
Cybersecurity: Education, Science, Technique. 2:88-97
This article analyses the usage of software baits as an information security asset. They provided close research about honeypot types, their advantages and disadvantages, possible security breaches, configuration and overall system effectiveness. Oft
Autor:
Andrian Piskozub, Roman Banakh
Publikováno v:
IDAACS-SWS
the paper provides an insight into the complex of events for probable location of attacker right after he/she has committed an attack on Wi-Fi network. The new approach of additional attackers' devices identification is offered in a way of usage of W
Publikováno v:
International Journal of Computing. :113-118
This article is dedicated to the use of firewalling method and intrusion detection method, which can be applied both separately and together to computer systems and networks, to expedience of the use of that or other method, tools, that perform these
Autor:
Andrian Piskozub
Publikováno v:
International Journal of Computing. :95-104
The aim of this paper is to understand reasons why denial of service (DoS) attacks are happening; to find ways how to avoid these attacks or lessen their influence; to work out strategy of detecting and preventing these attacks.
Publikováno v:
2016 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET).
In this paper, we describe penetration testing, as a methodology for information security. Pentesting is used for proactive defence and information systems protection. Special operational systems on UNIX core, developed scripts, utilities and applica
Publikováno v:
2016 13th International Conference on Modern Problems of Radio Engineering, Telecommunications and Computer Science (TCSET).
In this paper the concept of external appliance as component of honeypot in wireless network is suggested as based on particular computing instance. Also paper suggests approach to implementation of complex Intrusion Detection System (IDS) - Router -
Autor:
Andrian Piskozub, Victor Pyvovarov, Pavlo Khromchak, Roman Tymoshyk, Nazar Tymoshyk, Andrij Novak
Publikováno v:
2009 IEEE International Workshop on Intelligent Data Acquisition and Advanced Computing Systems: Technology and Applications.
In this article there have been given results of researches and realization of honeypot introspection analysis mechanism, which provides the exposure- and blocking-resistant monitoring of malefactor's activity on Linux operating system. Difficulties