Monitoring IP addresses of attackers to the information system
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F60460709%3A41110%2F13%3A66781" target="_blank" >RIV/60460709:41110/13:66781 - isvavai.cz</a>
Výsledek na webu
—
DOI - Digital Object Identifier
—
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Monitoring IP addresses of attackers to the information system
Popis výsledku v původním jazyce
First, it is characterized the current situation in the field of Information Systems (IS). In addition to authorized users there is a considerable number of illegal invaders who try to exploit known bugs of IS to penetrate foreign IS. It is discussed model based on systems theory, which describes some of the protection mechanisms hampering the attacker's penetration into IS. Information system and data stored on it are so protected. Some results of the model are visualized for clarity. In an introduction of the paper is characterized ability to detect attacks on IP addresses and next an equipment used to monitor attacks. The next section describes specific monitoring system for direct monitoring IP addresses of attackers. Monitoring is carried out attacks in two modes. The first mode is characterized by the protection of information systems operated on a specific computer with a firewall. The second mode is characterized that the computer is complemented by so called honeypot software.
Název v anglickém jazyce
Monitoring IP addresses of attackers to the information system
Popis výsledku anglicky
First, it is characterized the current situation in the field of Information Systems (IS). In addition to authorized users there is a considerable number of illegal invaders who try to exploit known bugs of IS to penetrate foreign IS. It is discussed model based on systems theory, which describes some of the protection mechanisms hampering the attacker's penetration into IS. Information system and data stored on it are so protected. Some results of the model are visualized for clarity. In an introduction of the paper is characterized ability to detect attacks on IP addresses and next an equipment used to monitor attacks. The next section describes specific monitoring system for direct monitoring IP addresses of attackers. Monitoring is carried out attacks in two modes. The first mode is characterized by the protection of information systems operated on a specific computer with a firewall. The second mode is characterized that the computer is complemented by so called honeypot software.
Klasifikace
Druh
D - Stať ve sborníku
CEP obor
JC - Počítačový hardware a software
OECD FORD obor
—
Návaznosti výsledku
Projekt
—
Návaznosti
S - Specificky vyzkum na vysokych skolach
Ostatní
Rok uplatnění
2013
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název statě ve sborníku
Agrarian Perspectives - Proceedings of the 22th Scientific Conference: Development trends in agribussiness
ISBN
978-80-213-2419-0
ISSN
—
e-ISSN
—
Počet stran výsledku
5
Strana od-do
136-140
Název nakladatele
CULS Prague, Faculty of Economics and Management
Místo vydání
Prague, CR
Místo konání akce
Czech University of Life Sciences Prague, CR
Datum konání akce
17. 9. 2013
Typ akce podle státní příslušnosti
WRD - Celosvětová akce
Kód UT WoS článku
000338040300012