Zobrazeno 1 - 6
of 6
pro vyhledávání: '"Maksym Tawalbeh"'
Publikováno v:
Кібербезпека: освіта, наука, техніка, Vol 3, Iss 11, Pp 183-194 (2021)
Виявлення аномалій є важливим завданням у багатьох сферах людського життя. Для виявлення аномалій використовується множина статистичн
Externí odkaz:
https://doaj.org/article/319c8f6c05e145028e82465a3dd801ac
Publikováno v:
Кібербезпека: освіта, наука, техніка, Vol 3, Iss 7, Pp 17-30 (2020)
У даній роботі розглянута проблема балансування навантаження в системах виявлення вторгнень. Проведено аналіз існуючих проблем баланс
Externí odkaz:
https://doaj.org/article/f118e1db43dc43d29ead84174d21948b
Publikováno v:
Cybersecurity: Education, Science, Technique. 11:183-194
Anomaly detection is an important task in many areas of human life. Many statistical methods are used to detect anomalies. In this paper, statistical methods of data analysis, such as survival analysis, time series analysis (fractal), classification
Publikováno v:
Cybersecurity: Education, Science, Technique. 3:17-30
The problem of load balancing in intrusion detection systems is considered in this paper. The analysis of existing problems of load balancing and modern methods of their solution are carried out. Types of intrusion detection systems and their descrip
Autor:
Tamara Radivilova, Dmytro Ageyev, Kirichenko Lyudmyla, Maksym Tawalbeh, Andrii Ilkov, Oleksandr Lemeshko
Publikováno v:
2020 IEEE International Conference on Problems of Infocommunications. Science and Technology (PIC S&T).
Information security is an important challenge due to the increasing number of attacks and intrusions. In this paper, approaches and systems for monitoring traffic and events, intrusion detection systems, deep packet inspection tools, and network pac
Autor:
Tamara Radivilova, Dmytro Ageyev, Maksym Tawalbeh, Lyudmyla Kirichenko, Vitalii Bulakh, Petro Zinchenko
Publikováno v:
2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT).
In this paper, we consider the problem of intrusion detection in computer networks by the realizations of network traffic. To solve this problem, time series analysis methods, fractal methods, and data mining are used. The verification of anomaly det