REPOSITORY.ENU

Targeted Attacks Detection and Security Intruders Identification in the Cyber Space

Показать сокращенную информацию

dc.contributor.author Avkurova, Zhadyra
dc.contributor.author Gnatyuk, Sergiy
dc.contributor.author Abduraimova, Bayan
dc.contributor.author Makulov, Kaiyrbek
dc.date.accessioned 2025-12-23T05:02:07Z
dc.date.available 2025-12-23T05:02:07Z
dc.date.issued 2024
dc.identifier.citation Zhadyra Avkurova, Sergiy Gnatyuk, Bayan Abduraimova, Kaiyrbek Makulov, "Targeted Attacks Detection and Security Intruders Identification in the Cyber Space", International Journal of Computer Network and Information Security(IJCNIS), Vol.16, No.4, pp.144-153, 2024. DOI:10.5815/ijcnis.2024.04.10 ru
dc.identifier.issn 20749090
dc.identifier.other DOI: 10.5815/ijcnis.2024.04.10
dc.identifier.uri http://repository.enu.kz/handle/enu/29010
dc.description.abstract The number of new cybersecurity threats and opportunities is increasing over time, as well as the amount of information that is generated, processed, stored and transmitted using ICTs. Particularly sensitive are the objects of critical infrastructure of the state, which include the mining industry, transport, telecommunications, the banking system, etc. From these positions, the development of systems for detecting attacks and identifying intruders (including the critical infrastructure of the state) is an important and relevant scientific task, which determined the tasks of this article. The paper identifies the main factors influencing the choice of the most effective method for calculating the importance coefficients to increase the objectivity and simplicity of expert assessment of security events in cyberspace. Also, a methodology for conducting an experimental study was developed, in which the goals and objectives of the experiment, input and output parameters, the hypothesis and research criteria, the sufficiency of experimental objects and the sequence of necessary actions were determined. The conducted experimental study confirmed the adequacy of the models proposed in the work, as well as the ability of the method and system created on their basis to detect targeted attacks and identify intruders in cyberspace at an early stage, which is not included in the functionality of modern intrusion detection and prevention systems. ru
dc.language.iso en ru
dc.publisher International Journal of Computer Network and Information Security (IJCNIS) ru
dc.relation.ispartofseries 4, 144-153;
dc.subject Targeted Attacks ru
dc.subject Cybersecurity ru
dc.subject Detection ru
dc.subject Information Infrastructure ru
dc.subject Fuzzy Logic ru
dc.subject APT ru
dc.subject Modelling ru
dc.title Targeted Attacks Detection and Security Intruders Identification in the Cyber Space ru
dc.type Article ru


Файлы в этом документе

Данный элемент включен в следующие коллекции

Показать сокращенную информацию

Поиск в DSpace


Расширенный поиск

Просмотр

Моя учетная запись