Безопасность информационных технологий (Dec 2013)
Information Technology Systems Vulnerabilities Detecting based on Network’s Traffic Analysis
Abstract
This paper proposes traffic analysis procedure that is very effective and sometimes single countermeasure on counteracting of network attacks and information leakage channels (hidden control channels). Traffic analysis envisages certain measures to control the security of the Russian Federation information technology infrastructure and, most importantly, to establish the reasons of the occurred and predictable computer incidents.