The imitation modelling of anomalies in computer nets
Zapiski Nauchnykh Seminarov POMI, Investigations in topology. Part 12, Tome 352 (2008), pp. 120-129 Cet article a éte moissonné depuis la source Math-Net.Ru

Voir la notice du chapitre de livre

The network condition may be described by a set of configuration parameters. Introduced method consists in marking some parameters in order to detect the on-going attack traffic. The results of the modelling are given. Bibl. – 8 titles.
@article{ZNSL_2008_352_a4,
     author = {K. N. Mishin},
     title = {The imitation modelling of anomalies in computer nets},
     journal = {Zapiski Nauchnykh Seminarov POMI},
     pages = {120--129},
     year = {2008},
     volume = {352},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/ZNSL_2008_352_a4/}
}
TY  - JOUR
AU  - K. N. Mishin
TI  - The imitation modelling of anomalies in computer nets
JO  - Zapiski Nauchnykh Seminarov POMI
PY  - 2008
SP  - 120
EP  - 129
VL  - 352
UR  - http://geodesic.mathdoc.fr/item/ZNSL_2008_352_a4/
LA  - ru
ID  - ZNSL_2008_352_a4
ER  - 
%0 Journal Article
%A K. N. Mishin
%T The imitation modelling of anomalies in computer nets
%J Zapiski Nauchnykh Seminarov POMI
%D 2008
%P 120-129
%V 352
%U http://geodesic.mathdoc.fr/item/ZNSL_2008_352_a4/
%G ru
%F ZNSL_2008_352_a4
K. N. Mishin. The imitation modelling of anomalies in computer nets. Zapiski Nauchnykh Seminarov POMI, Investigations in topology. Part 12, Tome 352 (2008), pp. 120-129. http://geodesic.mathdoc.fr/item/ZNSL_2008_352_a4/

[1] V. G. Olifer, N. A. Olifer, Kompyuternye seti. Printsipy, tekhnologii, protokoly, Piter, SPb, 2001, 356 pp.

[2] I. V. Kotenko, M. V. Stepashkin, V. S. Bogdanov, “Arkhitektury i modeli komponentov aktivnogo analiza zaschischennosti na osnove imitatsii deistvii zloumyshlennikov”, Problemy informatsionnoi bezopasnosti. Kompyuternye sistemy, 2005, 65

[3] V. I. Vorobev, E. P. Rumyantseva, R. R. Fatkieva, “Otsenka effektivnosti investitsii v informatsionuyu bezopasnost obrazovatelnykh tekhnologii”, Trudy RGPU, SPb, 2007, 47

[4] G. G. Malinetskii, A. B. Potapov, A. V. Podlazov, Nelineinaya dinamika. Podkhody, rezultaty, nadezhdy, URSS, 2006, 279 pp.

[5] G. G. Malinetskii, A. B. Potapov, Nelineinaya dinamika i khaos (Osnovnye ponyatiya), URSS, 2006, 275 pp.

[6] J. Mirkovic, J. Martin, P. Reither, A Taxonomy of Ddos Attacks and Ddos Defence Mechanisms, Technical Report 020018, Computer Science Department, University of California, Los Angeles, 8 pp.

[7] M. Boda, A. Veres, The Chaotic Nature of TCP Congestion Control. Traffic Analysis and Network Performance Laboratory, Budapest 2001, 7 pp.

[8] W. Ditto, T. Mukanata, “Principles and Applications fo Chaotic Systems”, Comm. of the ACM (1995, November), 12–24