Identyfikatory
Warianty tytułu
Języki publikacji
Abstrakty
In the article, results of the research on the development of methods and models of intellectual recognition of threats to information systems of transport. The article contains results of the research that allows us to raise the level of protection of the automated and intellectual information systems of the transportation enterprises (AISTE) in the conditions of the intensification of transportation. The article contains mathematical models and results of estimation information systems having Internet connection through various communication channels. The article also considers the issues of research and protection of the AISTE under the condition of several conflict-data-request threads.
Rocznik
Tom
Strony
117--136
Opis fizyczny
Bibliogr. 22 poz., wykr.
Twórcy
autor
- AGH University of Science and Technology, Krakow
autor
- European University, Kyiv, Ukraine
autor
- The National Aviation University, Kyiv, Ukraine
Bibliografia
- 1. Ahmad, D., Dubrovskiy, A., Flinn, X., 2005. Defense from the hackers of corporate networks. DMK Press, Moscow.
- 2. Atighetchi, M., Pal, P., Webber, F., Schantz, R., Jones, Ch., Loyall, J., 2004, Adaptive Cyberdefense for Survival and Intrusion Tolerance, IEEE Internet Computing, 8(6), pp. 25–33.
- 3. Avivzienis, A., Laprie, J.-C., Randell, B., Landwehr, C., 2004. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 1(1), pp. 11–33.
- 4. Chapman, C., Ward, S., 2003. Project risk management: processes, techniques and insights, Wiley.
- 5. Chi, S.-D., Park, J.S. , Jung, K.-C., Lee, J.-S., 2001. Network Security Modeling and Cyber Attack Simulation Methodology. In: Proceedings of 6th Australasian conference (Lecture Notes in Computer Science, vol. 2119), Springer, pp. 320–333.
- 6. Chirillo, J., 2003. Hack Attacks Testing – How to Conduct Your Own Security Audit. Wiley.
- 7. Harel, D., 1987. Visual Formalism for Complex Systems. Science of Computer Programming, 8(3), pp. 231–274.
- 8. Kolodgy, C.J., 2014. Worldwide Security and Vulnerability Management 2004–2014. National Computer Center Publications, Manchester.
- 9. Lakhno, V., Petrov, A., 2011a. Modelling of discrete recognition and information vulnerability search procedures. Teka Komisji Motoryzacji i Energetyki Rolnictwa, 11A, pp. 129–136,
- 10. Lakhno, V. Petrov, A., 2011b. Ensuring security of automated information systems, transportation companies with the intensification of traffic. Skhidnoukrayins’kyy natsonal’nyy universytet imeni Volodymyra Dalya (The Volodymyr Dahl East Ukrainian National University), Lugansk.
- 11. Lakhno, V., Petrov, A., 2011c. Experimental studies of productivity change in corporate information systems for companies in terms of computer attacks. Information security. Visnik, Skhidnoukrayins’kyy natsonal’nyy universytet imeni Volodymyra Dalya, 5, pp. 181–189.
- 12. Lakhno, V., Petrov, A., 2011d. Task the Research of the Conflict Request Threads in the Data Protection Systems. In: Howaniec, H., Waszkielewicz, W., (eds), Marketing and logistics problems in the management of organization. Wydawnictwo Akademii Techniczno-Humanistycznej, Bielsko-Biała, pp. 230–251.
- 13. Lakhno, V., Petrov, A., 2012. Modeling information security system of transport enterprises. In: Dudek, M., Howaniec, H., Waszkielewicz, W., (eds), Management and production engineering. Wydawnictwo Naukowe Akademii Techniczno-Humanistycznej, Bielsko-Biała, pp. 221–248.
- 14. Lau, F., Rubin, S., Smith, M., Trajkovic, L., 2000. Distributed denial of service attacks. In: Proceedings of 2000 IEEE International Conference on Systems, Man, and Cybernetics, pp. 2275–2280.
- 15. Lin, Sh.-Ch., Tseng, Sh.-Sh., 2004. Constructing detection knowledge for DDoS intrusion tolerance. Expert Systems with Applications, 27(3), pp. 379–390.
- 16. Mehta, V., Bartzis, C., Zhu, H., Clarke, E.M., Wing, J.M., 2006. Ranking Attack Graphs. In: Proceedings of 9th International Symposium on Recent Advances in Intrusion Detection, RAID, Hamburg, Germany, Hamburg, 20–22 September, Springer, Berlin–Heidelberg, pp. 127–144.
- 17. Mirkovic, J., Dietrich, S., Dittrich, D., Reiher, P., 2004. Internet Denial of Service: Attack and Defense Mechanisms. Prentice Hall PTR.
- 18. PricewaterhouseCoopers (PwC), 2014, Transportation & Logistics 2030. Vol. 4: Securing the supply. Available at: www.pwc.com/tl2030.
- 19. Smirniy, M., Lakhno, V., Petrov, A., 2009. The research of the conflict request threads in the data protection systems. Visnik Skhidnoukrayins’kyy natsonal’nyy universytet imeni Volodymyra Dalya, 2(20), p. 23–30.
- 20. Templeton, S., Levit, K., 2000. A Requires/Provides Model for Computer Attacks. In: Proceedings of the workshop on New security paradigms (NSPW ’00). ACM, New York, NY, USA, pp. 31–38.
- 21. Trivedi, K.S., Kim, D.S., Roy, A., Medhi, D., 2009. Dependability and security models In: Proceedings of 7th International Workshop on Design of Reliable Communication Networks, pp. 11–20.
- 22. Xiang, Y., Zhou, W., Chowdhury, M., 2004. A Survey of Active and Passive Defense Mechanisms against DDoS Attacks. Technical Report, TR C04/02, School of Information Technology, Deakin University, Australia.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-82ffa47a-2ef7-4d62-b393-cc90aacad980