2021
DOI: 10.15587/1729-4061.2021.225646
|View full text |Cite
|
Sign up to set email alerts
|

Devising a method of protection against zero-day attacks based on an analytical model of changing the state of the network sandbox

Abstract: This paper reports a method of protection against zero-day attacks using SandBox technology based on the developed analytical model with a probabilistic ranking of information system states. The model takes into consideration the conditions of a priori uncertainty regarding the parameters of the destructive flow on the system, accounting for the typical procedures of the network SandBox. The proposed model of information system states makes it possible to analyze and track all possible states, as well as asses… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(1 citation statement)
references
References 20 publications
0
0
0
Order By: Relevance
“…This approach enables real-time monitoring of computer networks, ensuring their continuous security, stability, and availability to meet users' demands [8]. The current state of information society requires the highest level of protection for information resources and critical data, placing significant demands on software and hardware within systems that provide reliable and high-quality IT services [9]. IoT management implementation has been categorized into four trends, distinguished by the management mechanism or standard employed: SNMP, TMN, WBEM, and PBM.…”
Section: Introductionmentioning
confidence: 99%
“…This approach enables real-time monitoring of computer networks, ensuring their continuous security, stability, and availability to meet users' demands [8]. The current state of information society requires the highest level of protection for information resources and critical data, placing significant demands on software and hardware within systems that provide reliable and high-quality IT services [9]. IoT management implementation has been categorized into four trends, distinguished by the management mechanism or standard employed: SNMP, TMN, WBEM, and PBM.…”
Section: Introductionmentioning
confidence: 99%