Using Hypernets for Modeling Attacks to the Distributed Computer Systems
Sibirskij žurnal čistoj i prikladnoj matematiki, Tome 8 (2008) no. 1, pp. 26-37 Cet article a éte moissonné depuis la source Math-Net.Ru

Voir la notice de l'article

Methods of detection of typical attacks to the distributed computing systems are considered in this paper. The review of mechanisms of realization of the basic kinds of the removed attacks both to reports TCP/IP, and on a network infrastructure is resulted. As mathematical model of distribution of attack “the false agent” is used object a “hypernetwork”.
@article{VNGU_2008_8_1_a2,
     author = {M. N. Dmitriev and O. D. Sokolova},
     title = {Using {Hypernets} for {Modeling} {Attacks} to the {Distributed} {Computer} {Systems}},
     journal = {Sibirskij \v{z}urnal \v{c}istoj i prikladnoj matematiki},
     pages = {26--37},
     year = {2008},
     volume = {8},
     number = {1},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/VNGU_2008_8_1_a2/}
}
TY  - JOUR
AU  - M. N. Dmitriev
AU  - O. D. Sokolova
TI  - Using Hypernets for Modeling Attacks to the Distributed Computer Systems
JO  - Sibirskij žurnal čistoj i prikladnoj matematiki
PY  - 2008
SP  - 26
EP  - 37
VL  - 8
IS  - 1
UR  - http://geodesic.mathdoc.fr/item/VNGU_2008_8_1_a2/
LA  - ru
ID  - VNGU_2008_8_1_a2
ER  - 
%0 Journal Article
%A M. N. Dmitriev
%A O. D. Sokolova
%T Using Hypernets for Modeling Attacks to the Distributed Computer Systems
%J Sibirskij žurnal čistoj i prikladnoj matematiki
%D 2008
%P 26-37
%V 8
%N 1
%U http://geodesic.mathdoc.fr/item/VNGU_2008_8_1_a2/
%G ru
%F VNGU_2008_8_1_a2
M. N. Dmitriev; O. D. Sokolova. Using Hypernets for Modeling Attacks to the Distributed Computer Systems. Sibirskij žurnal čistoj i prikladnoj matematiki, Tome 8 (2008) no. 1, pp. 26-37. http://geodesic.mathdoc.fr/item/VNGU_2008_8_1_a2/

[1] Medvedovskii I. D., Semyanov P. V., Leonov D. G., Ataka na Internet, Izd-vo DMK, M., 2000

[2] Vasenin V. A., Galatenko A. V., Korneev V. V. i dr., “Matematicheskoe i programmnoe obespechenie aktivnogo audita bolshikh raspredelennykh sistem”, Matematika i bezopasnost informatsionnykh tekhnologii, MTsNMO, M., 2005

[3] Serdyuk V., Vy atakovany — zaschischaites!, Bezopasnost, 2003, no. 9 http://www.bytemag.ru

[4] Lukatskii A., Obnaruzhenie atak, BKhV-Peterburg, SPb., 2001

[5] Kort S. S., Metody vyyavleniya narushenii bezopasnosti, http://www.kiev-security.org.ua/box/12/113.shtml

[6] Popkov V. K., Matematicheskie modeli svyaznosti, Izd-vo IVMiMG SO RAN, Novosibirsk, 2006

[7] Klassifikatsiya setevykh atak, http://webdocs.ru/content-364.html

[8] Tu Dzh., Gonsales R., Printsipy raspoznavaniya obrazov, Mir, M., 1978 | MR

[9] Kotenko I. V., “Mnogoagentnye modeli protivoborstva zloumyshlennikov i sistemy zaschity v seti Internet”, Matematika i bezopasnost informatsionnykh tekhnologii, MTsNMO, M., 2005

[10] Detoisien E., “External Attacks”, LinuxFocus, 2003, no. 282, March http://linuxfocus.org

[11] Hansman S., Hunt R., “A Taxonomy of Network and Computer Attacks”, Computers and Security, 24:1 (2005), 31–43 | DOI

[12] Mircovic J., Martin J., Reiher P., “A Taxonomy of DDos Attacks and DDos Defense Mechanisms”, Computer Communication Review, 34:2 (2004), 39–53 | DOI