Перегляд за Автор "Gavrilenko, Svitlana"
Зараз показуємо 1 - 3 з 3
Результатів на сторінці
Налаштування сортування
Документ Development of identification templates of anomal computer systems status based on control charts(Харківський національний університет Повітряних Сил ім. Івана Кожедуба, 2019) Gavrilenko, SvitlanaThe purpose of the article is to propose a method for identifying the state of the computer system based on EWMA control charts and СUSUM charts. The software for construction of templates for fixing abnormal state of a computer system on the basis of traffic analysis was developed. The testing was conducted in the conditions of longterm and short-term DOS-attack, which showed the system efficiency. It was found that the system's operation returns to the limit of both maps in the conditions of a short-term attack. The analysis of the obtained results showed that developed express methods based on control charts increased the reliability of making decision on the state of computer system to 10%.Документ Identification of anomalies in the behavior of a computer system using fuzzy cluster analysis(ФОП Тарасенко В. П., 2019) Hornostal, Oleksii; Gavrilenko, SvitlanaДокумент Software security overview(Національний університет "Полтавська політехніка ім. Юрія Кондратюка", 2019) Rashidinia, Anoushirvan; Gavrilenko, Svitlana; Pochebut, M.; Sytnikova, O.The article analyzes the main threats and problems of software protection. Methods for protecting information, their advantages and disadvantages are considered, and the possibility of using existing tools to protect software is studied. The possibility of improving and using a number of software protection methods against active fraud attacks was brought. Type of attacks exists and why protection is necessary was specified. Furthermore, we discussed several states of the art protection techniques which can be used in software to protect against analysis and tampering attacks. Analyzed such methods: Client-Server Solutions, Code Encryption, Code Diversity, Code Obfuscation, White-Box Cryptography, Tamper Resistant Software, Software Guards, Oblivious Hashing. Although we considered all these possible techniques separately, it is possible to combine these techniques into one solution.