Working out an active system-trap
News of the Kabardin-Balkar scientific center of RAS, no. 2 (2012), pp. 62-69.

Voir la notice de l'article provenant de la source Math-Net.Ru

In this work the program system of active search and the analysis of the harmful software (active system-trap) is offered. It differs from existing systems by the developed algorithms of relevant search of the harmful software in the Internet. The offered system bases on a hypothesis about connectivity of Web-pages with close subjects (in this case - harmful pages) and possibilities of search of set of such pages by the analysis of communications in some their small subset. Besides, for relevance increase check of pages and the downloaded software with use of foreign systems of check is used. The developed system provides high relevance of search. In particular, as a result of experiments about 80 % of the samples received by given system, have been identified as harmful.
Keywords: systems of program protection, analysis of the harmful software.
Mots-clés : information protection
@article{IZKAB_2012_2_a5,
     author = {L. K. Babenko and E. P. Tumoyan and K. V. Tsyganok},
     title = {Working out an active system-trap},
     journal = {News of the Kabardin-Balkar scientific center of RAS},
     pages = {62--69},
     publisher = {mathdoc},
     number = {2},
     year = {2012},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/IZKAB_2012_2_a5/}
}
TY  - JOUR
AU  - L. K. Babenko
AU  - E. P. Tumoyan
AU  - K. V. Tsyganok
TI  - Working out an active system-trap
JO  - News of the Kabardin-Balkar scientific center of RAS
PY  - 2012
SP  - 62
EP  - 69
IS  - 2
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/IZKAB_2012_2_a5/
LA  - ru
ID  - IZKAB_2012_2_a5
ER  - 
%0 Journal Article
%A L. K. Babenko
%A E. P. Tumoyan
%A K. V. Tsyganok
%T Working out an active system-trap
%J News of the Kabardin-Balkar scientific center of RAS
%D 2012
%P 62-69
%N 2
%I mathdoc
%U http://geodesic.mathdoc.fr/item/IZKAB_2012_2_a5/
%G ru
%F IZKAB_2012_2_a5
L. K. Babenko; E. P. Tumoyan; K. V. Tsyganok. Working out an active system-trap. News of the Kabardin-Balkar scientific center of RAS, no. 2 (2012), pp. 62-69. http://geodesic.mathdoc.fr/item/IZKAB_2012_2_a5/

[1] L. Spitzner, Honeypots: Tracking Hackers, New-York, Addison-Wesley, 2002, 429 pp.

[2] N. Provos, T. Holz, Virtual Honeypots: From Botnet Tracking to Intrusion Detection, New-York, Addison-Wesley, 2007, 440 pp.

[3] Yi-Min Wang, D. Beck, Xuxian Jiang, R. Roussev, C. Verbowski, Shuo Chen, S. King, “Automated Web Patrol with Strider HoneyMonkeys”, Proceedings of the 2006 Network and Distributed System Security Symposium, 2006, 35–49

[4] Jiyang Chen, O. R. Zaiane, An Unsupervised Approach to Cluster Web Search Results based on Word Sense Communities (Rezhim dostupa: svobodnyi, [Elektronnyi resurs]) http://webdocs.cs.ualberta.ca/~zaiane/postscript/WI08.pdf

[5] S. Carpineto, S. Osin'ski, G. Romano, D. Weiss, A Survey of Web Clustering Engines (Rezhim dostupa: svobodnyi, [Elektronnyi resurs]) http://search.fub.it/claudio/pdf/CSUR09.pdf

[6] R. S. Shelke, D. S. Thakore, Cluster Based Web Search Using Support Vector Machine (Rezhim dostupa: svobodnyi, [Elektronnyi resurs]) http://www.cscjournals.org/csc/manuscript/Journals/IJE/volume5/Issue1/IJE 242.pdf

[7] E. P. Tumoyan, A. L. Rechkov, “Metody analiza vredonosnogo programmnogo obespecheniya”, Aktualnye aspekty zaschity informatsii v Yuzhnom federalnom universitete, eds. Pod red. O.B. Makarevicha, Izd-vo TTI YuFU, Taganrog, 2011, 94–101 (Monografiya)