In the article, the authors propose an approach that allows assessing the relevance of using indicators of compromise for a particular industry. The current problems associated with the redundancy of indicators of compromise and the low level of trust in their sources are highlighted. An approach is proposed that allows quantifying the relationship between indicators and the source, as well as scoring sources.
Keywords: compromise indicator, feed of the compromise indicator, rating of feeds
In this paper we present the method of detecting of low-rate DDoS-attacks on the http-services. A low-rate attack model in the form of a chronological series of events with an additive superposition of attack and normal traffic is used. The task of developing a method of detection of low-rate attacks is formulated as allocation of homogeneous groups (patterns) of the time series, based on pattern recognition models, and the subsequent construction of prediction model for each separate group.
Keywords: intrusion detection; low-rate attacks; denial of service, artificial neural network; networks security, pattern recognition
When teaching students the basics of automatic control in the food, chemical and petrochemical industries have difficulty with the lack of opportunities for experiments on real objects. This article discusses the possibility of using software modeling complex ChemCAD to study the process of rectification to simulate real object to its mathematical model, to conduct research of static and dynamic regimes, to study the characteristics of various systems of regulation processes.
Keywords: rectification, ChemCAD, simulation, simulator, automation.
Keywords: