Improvement of protection for WEB resources from attacks based on combined heuristic and statistical approach
It is demonstrated the description of an improvement of protection for WEB resources from attacks. The improvement is based on the combined using of both heuristic and statistical approaches. The protection utilizes a classification of the most common attacks, the probability of an attack and heuris...
Saved in:
| Date: | 2016 |
|---|---|
| Main Author: | Prysiazhnyi, D. P. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2016
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/100347 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Managing data center resources using heuristic search
by: Zharikov, E.V.
Published: (2018)
by: Zharikov, E.V.
Published: (2018)
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018)
by: Synitsyn, I.P., et al.
Published: (2018)
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2023)
by: Gorbatiuk, V.O., et al.
Published: (2023)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
Integrated security systems for protecting payment synchronization from MITM attacks
by: Shahmatov, I.O., et al.
Published: (2025)
by: Shahmatov, I.O., et al.
Published: (2025)
Modeling the Consolidated Information Resource for Communicative Interaction with Users of University Department Web Page
by: Kotylo, O. M., et al.
Published: (2013)
by: Kotylo, O. M., et al.
Published: (2013)
Neurosymbolic approach for attack detection in satellite communication systems
by: Mostovyi, O.S.
Published: (2024)
by: Mostovyi, O.S.
Published: (2024)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)
by: Дьогтєва, І. О., et al.
Published: (2021)
Challenges and opportunities in the programming environment SEMANTIC WEB
by: Andon, P.I., et al.
Published: (2015)
by: Andon, P.I., et al.
Published: (2015)
Web service for enterprise resource management systems
by: Tarasenko, A.D., et al.
Published: (2022)
by: Tarasenko, A.D., et al.
Published: (2022)
СТАНОВЛЕННЯ ТЕХНОЛОГІЇ WEB 3.0
by: Глибовец, Николай Николаевич, et al.
Published: (2010)
by: Глибовец, Николай Николаевич, et al.
Published: (2010)
Development of Meteorological forecasting web portal on multiprocessor platform
by: Beketov, O.G., et al.
Published: (2018)
by: Beketov, O.G., et al.
Published: (2018)
Problems of ontological analysis use for knowledge representation in Wiki-resources
by: Rogushina, J.V.
Published: (2019)
by: Rogushina, J.V.
Published: (2019)
Theoretical principles of use of ontologies for semantization of the Web resources
by: Rogushina, J.V.
Published: (2018)
by: Rogushina, J.V.
Published: (2018)
Mathematical algorithm for detecting XSS attacks on web applications
by: Kh. Khamdamov, et al.
Published: (2021)
by: Kh. Khamdamov, et al.
Published: (2021)
Descriptive logic using in Web-service problems
by: Zakharova, O.V.
Published: (2017)
by: Zakharova, O.V.
Published: (2017)
Потокові моделі мережі Інтернет за умов атак на відмову
by: Andon, P.I., et al.
Published: (2015)
by: Andon, P.I., et al.
Published: (2015)
Specification of the process of the semantic annotation the web services
by: Zakharova, O.V.
Published: (2018)
by: Zakharova, O.V.
Published: (2018)
Estimation Method for Compatibility of Normative Documents
by: Mezentsev, O. V.
Published: (2014)
by: Mezentsev, O. V.
Published: (2014)
Metaheuristic methods for optimizing the quality of service of composite web services
by: Moroz, H.B.
Published: (2025)
by: Moroz, H.B.
Published: (2025)
Defining and resolving Web-services discovery problems using description logics formalism
by: Zakharova, O.V.
Published: (2018)
by: Zakharova, O.V.
Published: (2018)
Game-theoretic approach to the network security problem
by: Ignatenko, O.P.
Published: (2018)
by: Ignatenko, O.P.
Published: (2018)
Statistical data analysis for budget planning in the provision of medical and social rehabilitation injured persons
by: Fedorenko, S.M., et al.
Published: (2015)
by: Fedorenko, S.M., et al.
Published: (2015)
Data processing in interactive training methods on the basis of web technologies
by: Morozova, O. I.
Published: (2019)
by: Morozova, O. I.
Published: (2019)
Semantic annotation of Web-services
by: Zakharova, O.V.
Published: (2017)
by: Zakharova, O.V.
Published: (2017)
Application of deep reinforced learning for long-term dynamic composition of WEB services
by: Moroz, H.B.
Published: (2025)
by: Moroz, H.B.
Published: (2025)
The technology of machine learning for a composite web service development
by: Grishanova, I.Yu., et al.
Published: (2025)
by: Grishanova, I.Yu., et al.
Published: (2025)
Context WEB-services matching as a means of search query. Ontological approaches
by: Zakharova, O.V.
Published: (2020)
by: Zakharova, O.V.
Published: (2020)
Unified process for adaptive Semantic Web service composition
by: Slabospitskaya, О.A.
Published: (2018)
by: Slabospitskaya, О.A.
Published: (2018)
Hybrid autotuning model with statistic modelling
by: Doroshenko, А.Yu., et al.
Published: (2018)
by: Doroshenko, А.Yu., et al.
Published: (2018)
Applying Description Logics with Concrete Domains to Solve the Problems of Semantic Web Services Discovery and Composition
by: Zakharova, O.V.
Published: (2023)
by: Zakharova, O.V.
Published: (2023)
Functionality and Statistics of the use of the scientific digital library of periodical publications of the NAS of Ukraine
by: Andon, P.I., et al.
Published: (2018)
by: Andon, P.I., et al.
Published: (2018)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Classification of means and methods of the Web semantic retrieval
by: Rogushina, J.V.
Published: (2018)
by: Rogushina, J.V.
Published: (2018)
Managing data center resources using heuristic search
by: E. V. Zharikov
Published: (2017)
by: E. V. Zharikov
Published: (2017)
Genetic algorithm for SDN protection against network attacks
by: S. I. Zabelin
Published: (2016)
by: S. I. Zabelin
Published: (2016)
Information protection by enhancing the effectiveness of counteracting cyber attacks
by: V. D. Havlovskyi
Published: (2019)
by: V. D. Havlovskyi
Published: (2019)
Analytical review on information retrieval methods and applications in the Semantic Web
by: Grishanova, I.J.
Published: (2018)
by: Grishanova, I.J.
Published: (2018)
Usage of AI-planning techniques to solve problems of Web-services composition
by: Zakharova, O.V.
Published: (2018)
by: Zakharova, O.V.
Published: (2018)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014)
by: Iaremchuk, Iu. E.
Published: (2014)
Similar Items
-
Managing data center resources using heuristic search
by: Zharikov, E.V.
Published: (2018) -
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018) -
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2023) -
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021) -
Integrated security systems for protecting payment synchronization from MITM attacks
by: Shahmatov, I.O., et al.
Published: (2025)