2020
DOI: 10.11610/isij.4715
|View full text |Cite
|
Sign up to set email alerts
|

Signature-based Intrusion Detection Hardware-Software Complex

Abstract: Nowadays hackers are able to find many software vulnerabilities, which can be exploited for malicious purposes such as to destroy the operating system, to steal users' private data, to demand a ransom not to affect the data and retain their validity. The majority of attacks use an Internet connection; therefore, the efforts should be directed to the way in which data packets are transmitted. The hardware-software complex, which is the main subject of the presented research, serves as a firewall for the devices… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…The principle of construction of RC of EF of a digital scheme consists in calculating hardware costs of all kinds, namely LUTs, flip-flops, memory blocks, etc., and reducing them to a single unit of measurement according to formula (1). The TC of EF is calculated according to theoretical information on the delay of signal propagation in the component parts of the circuits, taking into account their interconnections.…”
Section: Creating Estimation Functionsmentioning
confidence: 99%
See 1 more Smart Citation
“…The principle of construction of RC of EF of a digital scheme consists in calculating hardware costs of all kinds, namely LUTs, flip-flops, memory blocks, etc., and reducing them to a single unit of measurement according to formula (1). The TC of EF is calculated according to theoretical information on the delay of signal propagation in the component parts of the circuits, taking into account their interconnections.…”
Section: Creating Estimation Functionsmentioning
confidence: 99%
“…In contrast to traditional fields of application of information systems, attacks on critical infrastructure facilities, which include energy companies, can lead to catastrophic consequences. Therefore, methods of detecting malicious activity, based on the use of signatures that ensure mathematically strict recognition, do not lose their relevance in the creation of cybersecurity systems, such as network intrusion detection systems (NIDS), antiviruses, anti-worm systems and spam filters [1,2].…”
Section: Introductionmentioning
confidence: 99%
“…Changes in the socio-cultural space under these conditions both determine the quality and lifestyle of residents, the image of the city, and affect the psychophysiological health of consumers of advertising. Thus, scientists are faced with the problem of understanding the processes of totalization of the presence of advertising in the modern urban [19]; Maksym Karpovets made a philosophical understanding of the city as a specific, complex and ambiguous phenomenon of culture and as a world of human existence [9]; Volodymyr Stetsenko revealed the content and forms of integration of information and advertising objects into the urban space [14]; Anna Chmil analyzed the current state of society, the characteristic feature of which is the loss of a sense of reality, the implementation of the principle of simulation and hyperreality of codes that begin to control people [17]. The researches of the Russian philosopher Galina Gornova devoted to the problems of urban identity are meaningful [8].…”
mentioning
confidence: 99%