@article{VNGU_2008_8_1_a2,
author = {M. N. Dmitriev and O. D. Sokolova},
title = {Using {Hypernets} for {Modeling} {Attacks} to the {Distributed} {Computer} {Systems}},
journal = {Sibirskij \v{z}urnal \v{c}istoj i prikladnoj matematiki},
pages = {26--37},
year = {2008},
volume = {8},
number = {1},
language = {ru},
url = {http://geodesic.mathdoc.fr/item/VNGU_2008_8_1_a2/}
}
TY - JOUR AU - M. N. Dmitriev AU - O. D. Sokolova TI - Using Hypernets for Modeling Attacks to the Distributed Computer Systems JO - Sibirskij žurnal čistoj i prikladnoj matematiki PY - 2008 SP - 26 EP - 37 VL - 8 IS - 1 UR - http://geodesic.mathdoc.fr/item/VNGU_2008_8_1_a2/ LA - ru ID - VNGU_2008_8_1_a2 ER -
M. N. Dmitriev; O. D. Sokolova. Using Hypernets for Modeling Attacks to the Distributed Computer Systems. Sibirskij žurnal čistoj i prikladnoj matematiki, Tome 8 (2008) no. 1, pp. 26-37. http://geodesic.mathdoc.fr/item/VNGU_2008_8_1_a2/
[1] Medvedovskii I. D., Semyanov P. V., Leonov D. G., Ataka na Internet, Izd-vo DMK, M., 2000
[2] Vasenin V. A., Galatenko A. V., Korneev V. V. i dr., “Matematicheskoe i programmnoe obespechenie aktivnogo audita bolshikh raspredelennykh sistem”, Matematika i bezopasnost informatsionnykh tekhnologii, MTsNMO, M., 2005
[3] Serdyuk V., Vy atakovany — zaschischaites!, Bezopasnost, 2003, no. 9 http://www.bytemag.ru
[4] Lukatskii A., Obnaruzhenie atak, BKhV-Peterburg, SPb., 2001
[5] Kort S. S., Metody vyyavleniya narushenii bezopasnosti, http://www.kiev-security.org.ua/box/12/113.shtml
[6] Popkov V. K., Matematicheskie modeli svyaznosti, Izd-vo IVMiMG SO RAN, Novosibirsk, 2006
[7] Klassifikatsiya setevykh atak, http://webdocs.ru/content-364.html
[8] Tu Dzh., Gonsales R., Printsipy raspoznavaniya obrazov, Mir, M., 1978 | MR
[9] Kotenko I. V., “Mnogoagentnye modeli protivoborstva zloumyshlennikov i sistemy zaschity v seti Internet”, Matematika i bezopasnost informatsionnykh tekhnologii, MTsNMO, M., 2005
[10] Detoisien E., “External Attacks”, LinuxFocus, 2003, no. 282, March http://linuxfocus.org
[11] Hansman S., Hunt R., “A Taxonomy of Network and Computer Attacks”, Computers and Security, 24:1 (2005), 31–43 | DOI
[12] Mircovic J., Martin J., Reiher P., “A Taxonomy of DDos Attacks and DDos Defense Mechanisms”, Computer Communication Review, 34:2 (2004), 39–53 | DOI