Безопасность информационных технологий (Dec 2013)

Information Technology Systems Vulnerabilities Detecting based on Network’s Traffic Analysis

  • Dmitry Anatolevich Melnikov,
  • Vladislav Romanovich Petrov,
  • Aleksey Nikolaevich Radko,
  • Denis Sergeevich Buryy,
  • Sergey Alexandrovich Khrustalev

Journal volume & issue
Vol. 20, no. 4
pp. 83 – 87

Abstract

Read online

This paper proposes traffic analysis procedure that is very effective and sometimes single countermeasure on counteracting of network attacks and information leakage channels (hidden control channels). Traffic analysis envisages certain measures to control the security of the Russian Federation information technology infrastructure and, most importantly, to establish the reasons of the occurred and predictable computer incidents.

Keywords