In this paper the problem of information security in the network is considered. Organizational and technical measures to protect information should ensure the effective and timely detection and blocking of threats to information security, the implementation of which may lead to unacceptable negative consequences. The most common threat is network traffic, the movement of data flows between different web resources. The methods of detecting unauthorized traffic to select the best were analyzed. A mathematical model for detecting unauthorized traffic and detection software have been developed.The results of experimental studies of the developed software were presented, which showed the possibility of its use for detecting unauthorized traffic.
Skip Nav Destination
Article navigation
9 December 2020
THE VII INTERNATIONAL YOUNG RESEARCHERS’ CONFERENCE – PHYSICS, TECHNOLOGY, INNOVATIONS (PTI-2020)
18–22 May 2020
Ekaterinburg, Russia
Research Article|
December 09 2020
Development of software for detecting unauthorized traffic
Yulia Gushchina;
Yulia Gushchina
a)
Department of Information Security, Priority Technologies Institute, Volgograd State University
, 100, Prosp. Universitetsky, Volgograd, 400062, Russia
a)Corresponding author: yulia.mig@mail.ru
Search for other works by this author on:
Aleksej Babenko;
Aleksej Babenko
b)
Department of Information Security, Priority Technologies Institute, Volgograd State University
, 100, Prosp. Universitetsky, Volgograd, 400062, Russia
Search for other works by this author on:
Yulia Bakhracheva
Yulia Bakhracheva
c)
Department of Information Security, Priority Technologies Institute, Volgograd State University
, 100, Prosp. Universitetsky, Volgograd, 400062, Russia
Search for other works by this author on:
AIP Conf. Proc. 2313, 070025 (2020)
Citation
Yulia Gushchina, Aleksej Babenko, Yulia Bakhracheva; Development of software for detecting unauthorized traffic. AIP Conf. Proc. 9 December 2020; 2313 (1): 070025. https://doi.org/10.1063/5.0033036
Download citation file:
Sign in
Don't already have an account? Register
Sign In
You could not be signed in. Please check your credentials and make sure you have an active account and try again.
Pay-Per-View Access
$40.00
Citing articles via
Design of a 100 MW solar power plant on wetland in Bangladesh
Apu Kowsar, Sumon Chandra Debnath, et al.
Inkjet- and flextrail-printing of silicon polymer-based inks for local passivating contacts
Zohreh Kiaee, Andreas Lösel, et al.
The implementation of reflective assessment using Gibbs’ reflective cycle in assessing students’ writing skill
Lala Nurlatifah, Pupung Purnawarman, et al.