mandatory step, which is carried out to confirm the correctness, feasibility and feasibility of the developed solutions, including architecture, method of maintaining system integrity.
In order to conduct a study on the effectiveness of the use of self-organized distributed systems, anomalies in computer systems were identified in relation to the evaluation criteria. Determining the specifics of the application of the system also affects the choice of criteria for evaluating effectiveness.
The method of determining the effectiveness of the proposed solutions for the developed self-organized distributed system for detecting anomalies in computer systems has been developed. Software has been developed to ensure the functioning of a self-organized distributed anomaly detection system in computer systems to confirm the feasibility of the proposed solutions.
Experimental studies with the developed implementation of a self-organized distributed system for detecting anomalies in computer systems according to the obtained coefficients confirmed the effectiveness of the proposed solutions and the developed distributed system for its operation in the computer network.
The paper examines the provision of fault tolerance, survivability and protection of IT information on the impact of malicious software and computer attacks. Each method is presented separately by its steps. The states of hardware and software on which the implemented methods are impelled in the corresponding systems are investigated. The common states are singled out and on the basis of them and together with the steps of the methods the synthesis of the method of ensuring fault tolerance, survivability and protection of IT information is carried out. It combines three developed methods. This method is represented by four generalized steps. All representations of the models are made by graphs with weight vertices, which specify either the states or steps of the methods. This representation made it possible to connect common vertices.Some methods of ensuring resilience, survivability and protection of IT information under the influence of malicious software were compared with one integrated method. Experimental studies confirm the effectiveness of both the proposed solution to ensure fault tolerance, survivability and protection of IT information and the effectiveness of the method, which combines the provision of fault tolerance, survivability and protection of IT information.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.