RESEARCH OF METHODS OF FORECASTING ATTACKS

ON INFORMATION SYSTEMS

Natalia A. Golovacheva

Senior Lecturer, Department of Information Security,

Volgograd State University

This email address is being protected from spambots. You need JavaScript enabled to view it.

Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation

Nikita E. Andreichenko

Student, Department of Information Security,

Volgograd State University

This email address is being protected from spambots. You need JavaScript enabled to view it.

Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation

Abstract. The article analyzes the methods of forecasting attacks on information systems.

Within the framework of experimental studies, the best method for predicting attacks on information

systems has been identified. At the present stage of society’s development, the problems of

information security come to the fore in most areas of the company’s activities. This is due to a

significant number of informatization projects currently being implemented. Most of them are

aimed at building a unified information space in order to optimize the processing of large volumes

of various kinds of information, including ensuring its reliable storage and prompt access for

participants of information exchange. Priority tasks in this direction are: identification, analysis

and classification of existing mechanisms for the implementation of threats to information security;

assessment of possible damage; identification of basic measures to counter threats; elimination

of vulnerabilities; development of security criteria and protection mechanisms. One of the means

of solving these problems is the detection of computer attacks. Malicious impacts on information

systems can be presented in the form of network attacks. A network attack is an intentional

action by third parties aimed at establishing control over a local or remote computer or computer

system. As a result of attacks, attackers can disrupt the network, change account rights, receive

users’ personal data and implement other goals. Network attacks by the nature of the impact on

the network can be divided into active and passive. The active ones affect the network, which

may cause the network to malfunction, or modification of its settings. This type of exposure

leaves traces in the network, which is why it is immediately calculated that it will be detected. A

passive attack is carried out without affecting the network. But her work violates network

security. It is much more difficult to detect it than the active one due to the lack of direct

intervention. Basically, the purpose of the attack is unauthorized access to protected information,

distorting it or intercepting it. In the first case, the data is changed, in the second, access is

performed without interfering with the data structure.

Key words: information system, vulnerability of the information system, attack on the

information system, information security threats, network attacks, interval forecasting.


Creative Commons License

This work is licensed under a 
Creative Commons Attribution 4.0 International License.
Attachments:
Download this file (2_Golovacheva_Andrejchenko.pmd.pdf) 2_Golovacheva_Andrejchenko.pmd.pdf
URL: https://ti.jvolsu.com/index.php/en/component/attachments/download/846
126 DownloadsUpdate this file (2_Golovacheva_Andrejchenko.pmd.pdf)