Показать сокращенную информацию

dc.contributor.authorAvkurova, Zhadyra
dc.contributor.authorGnatyuk, Sergiy
dc.contributor.authorAbduraimova, Bayan
dc.contributor.authorMakulov, Kaiyrbek
dc.date.accessioned2026-03-25T09:31:53Z
dc.date.available2026-03-25T09:31:53Z
dc.date.issued2024
dc.identifier.issn2074-9090
dc.identifier.otherDOI: 10.5815/ijcnis.2024.04.10
dc.identifier.urihttp://repository.enu.kz/handle/enu/30638
dc.description.abstractThe number of new cybersecurity threats and opportunities is increasing over time, as well as the amount of information that is generated, processed, stored and transmitted using ICTs. Particularly sensitive are the objects of critical infrastructure of the state, which include the mining industry, transport, telecommunications, the banking system, etc. From these positions, the development of systems for detecting attacks and identifying intruders (including the critical infrastructure of the state) is an important and relevant scientific task, which determined the tasks of this article. The paper identifies the main factors influencing the choice of the most effective method for calculating the importance coefficients to increase the objectivity and simplicity of expert assessment of security events in cyberspace. Also, a methodology for conducting an experimental study was developed, in which the goals and objectives of the experiment, input and output parameters, the hypothesis and research criteria, the sufficiency of experimental objects and the sequence of necessary actions were determined. The conducted experimental study confirmed the adequacy of the models proposed in the work, as well as the ability of the method and system created on their basis to detect targeted attacks and identify intruders in cyberspace at an early stage, which is not included in the functionality of modern intrusion detection and prevention systems.ru
dc.language.isoenru
dc.publisherComputer Network and Information Securityru
dc.relation.ispartofseries4, 144-153;
dc.subjectTargeted Attacksru
dc.subjectCybersecurityru
dc.subjectDetectionru
dc.subjectInformation Infrastructureru
dc.subjectFuzzy Logicru
dc.subjectAPTru
dc.subjectModellingru
dc.titleTargeted Attacks Detection and Security Intruders Identification in the Cyber Spaceru
dc.typeArticleru


Файлы в этом документе

Thumbnail

Данный элемент включен в следующие коллекции

Показать сокращенную информацию