Improvement of protection for WEB resources from attacks based on combined heuristic and statistical approach
It is demonstrated the description of an improvement of protection for WEB resources from attacks. The improvement is based on the combined using of both heuristic and statistical approaches. The protection utilizes a classification of the most common attacks, the probability of an attack and heuris...
Saved in:
| Date: | 2016 |
|---|---|
| Main Author: | Prysiazhnyi, D. P. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2016
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/100347 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
Managing data center resources using heuristic search
by: Zharikov, E.V.
Published: (2018)
by: Zharikov, E.V.
Published: (2018)
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018)
by: Synitsyn, I.P., et al.
Published: (2018)
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2023)
by: Gorbatiuk, V.O., et al.
Published: (2023)
Modeling the Consolidated Information Resource for Communicative Interaction with Users of University Department Web Page
by: Kotylo, O. M., et al.
Published: (2013)
by: Kotylo, O. M., et al.
Published: (2013)
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)
by: Шиян, А. А., et al.
Published: (2021)
Neurosymbolic approach for attack detection in satellite communication systems
by: Mostovyi, O.S.
Published: (2024)
by: Mostovyi, O.S.
Published: (2024)
Modeling the recovery of the effective activity of the information security incident response team in conditions of increasing intensity of cyber-attacks
by: Дьогтєва, І. О., et al.
Published: (2021)
by: Дьогтєва, І. О., et al.
Published: (2021)
Problems of ontological analysis use for knowledge representation in Wiki-resources
by: Rogushina, J.V.
Published: (2019)
by: Rogushina, J.V.
Published: (2019)
Web service for enterprise resource management systems
by: Tarasenko, A.D., et al.
Published: (2022)
by: Tarasenko, A.D., et al.
Published: (2022)
Estimation Method for Compatibility of Normative Documents
by: Mezentsev, O. V.
Published: (2014)
by: Mezentsev, O. V.
Published: (2014)
Theoretical principles of use of ontologies for semantization of the Web resources
by: Rogushina, J.V.
Published: (2018)
by: Rogushina, J.V.
Published: (2018)
Challenges and opportunities in the programming environment SEMANTIC WEB
by: Andon, P.I., et al.
Published: (2015)
by: Andon, P.I., et al.
Published: (2015)
Game-theoretic approach to the network security problem
by: Ignatenko, O.P.
Published: (2018)
by: Ignatenko, O.P.
Published: (2018)
СТАНОВЛЕННЯ ТЕХНОЛОГІЇ WEB 3.0
by: Глибовец, Николай Николаевич, et al.
Published: (2010)
by: Глибовец, Николай Николаевич, et al.
Published: (2010)
Specification of the process of the semantic annotation the web services
by: Zakharova, O.V.
Published: (2018)
by: Zakharova, O.V.
Published: (2018)
Context WEB-services matching as a means of search query. Ontological approaches
by: Zakharova, O.V.
Published: (2020)
by: Zakharova, O.V.
Published: (2020)
Metaheuristic methods for optimizing the quality of service of composite web services
by: Moroz, H.B.
Published: (2025)
by: Moroz, H.B.
Published: (2025)
Descriptive logic using in Web-service problems
by: Zakharova, O.V.
Published: (2017)
by: Zakharova, O.V.
Published: (2017)
Defining and resolving Web-services discovery problems using description logics formalism
by: Zakharova, O.V.
Published: (2018)
by: Zakharova, O.V.
Published: (2018)
Mathematical algorithm for detecting XSS attacks on web applications
by: Kh. Khamdamov, et al.
Published: (2021)
by: Kh. Khamdamov, et al.
Published: (2021)
Statistical data analysis for budget planning in the provision of medical and social rehabilitation injured persons
by: Fedorenko, S.M., et al.
Published: (2015)
by: Fedorenko, S.M., et al.
Published: (2015)
Потокові моделі мережі Інтернет за умов атак на відмову
by: Andon, P.I., et al.
Published: (2015)
by: Andon, P.I., et al.
Published: (2015)
Hybrid autotuning model with statistic modelling
by: Doroshenko, А.Yu., et al.
Published: (2018)
by: Doroshenko, А.Yu., et al.
Published: (2018)
Adaptive ensemble decision integration for indicator of resource security: methodology and statistical validation of stability
by: Ilyina, O.P., et al.
Published: (2026)
by: Ilyina, O.P., et al.
Published: (2026)
Application of deep reinforced learning for long-term dynamic composition of WEB services
by: Moroz, H.B.
Published: (2025)
by: Moroz, H.B.
Published: (2025)
Data processing in interactive training methods on the basis of web technologies
by: Morozova, O. I.
Published: (2019)
by: Morozova, O. I.
Published: (2019)
Functionality and Statistics of the use of the scientific digital library of periodical publications of the NAS of Ukraine
by: Andon, P.I., et al.
Published: (2018)
by: Andon, P.I., et al.
Published: (2018)
Unified process for adaptive Semantic Web service composition
by: Slabospitskaya, О.A.
Published: (2018)
by: Slabospitskaya, О.A.
Published: (2018)
The technology of machine learning for a composite web service development
by: Grishanova, I.Yu., et al.
Published: (2025)
by: Grishanova, I.Yu., et al.
Published: (2025)
GLOBAL STATISTICS OF BOLIDES IN THE TERRESTRIAL ATMOSPHERE
by: Chernogor, L. F., et al.
Published: (2017)
by: Chernogor, L. F., et al.
Published: (2017)
Statistical Analysis Dataset Based on Taguchi Design and Regression Modeling
by: Kolesnyk, Vitalii, et al.
Published: (2026)
by: Kolesnyk, Vitalii, et al.
Published: (2026)
Research a Statistical Security of Digital Signature Methods Based on Recurrent Sequences
by: Iaremchuk, Iu. E.
Published: (2014)
by: Iaremchuk, Iu. E.
Published: (2014)
A combination of traditional methods and a metric approach to assessing the risks from cyber attacks to global routing.
by: Zubok, V. Yu.
Published: (2019)
by: Zubok, V. Yu.
Published: (2019)
Classification of means and methods of the Web semantic retrieval
by: Rogushina, J.V.
Published: (2018)
by: Rogushina, J.V.
Published: (2018)
Usage of AI-planning techniques to solve problems of Web-services composition
by: Zakharova, O.V.
Published: (2018)
by: Zakharova, O.V.
Published: (2018)
Applying Description Logics with Concrete Domains to Solve the Problems of Semantic Web Services Discovery and Composition
by: Zakharova, O.V.
Published: (2023)
by: Zakharova, O.V.
Published: (2023)
Application of small language models for semantic analysis of Web interface accessibility
by: Kuzikov, B.O., et al.
Published: (2025)
by: Kuzikov, B.O., et al.
Published: (2025)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Means for Quality Implementation and Assurance of Context-Aware Semantic Web Service Composition
by: Andon, P.I., et al.
Published: (2022)
by: Andon, P.I., et al.
Published: (2022)
Reference model for Semantic Web adaptive composite service
by: Slabospitskaya, О.A.
Published: (2018)
by: Slabospitskaya, О.A.
Published: (2018)
Similar Items
-
Managing data center resources using heuristic search
by: Zharikov, E.V.
Published: (2018) -
Complex approach for state critical information infrastructure cyber defence system constructing
by: Synitsyn, I.P., et al.
Published: (2018) -
Method of detection of http attacks on a smart home using the algebraic matching method
by: Gorbatiuk, V.O., et al.
Published: (2023) -
Modeling the Consolidated Information Resource for Communicative Interaction with Users of University Department Web Page
by: Kotylo, O. M., et al.
Published: (2013) -
A model of control for counteracting against information attacks in cyberspace
by: Шиян, А. А., et al.
Published: (2021)