• A
  • A
  • A
  • ABC
  • ABC
  • ABC
  • А
  • А
  • А
  • А
  • А
Regular version of the site

Article

Identification of the preparation of cyber-attack

T-Comm: Telecommunications and transport. 2018. Vol. 12. No. 6. P. 69-76.

The complexity of counteracting cyber-attacks is due primarily to their high technology. Therefore, only the use of intelligent means and systems of counteraction can be a real protection against malicious intrusion. It can be considered that the life cycle of a cyber-attack consists of its preparation by an attacker and its implementation by an attacker. Given the complexity and variety of information and communication technology operations, protocols, of particular interest is the practical task of determining the identifying features or digital traces of the initiators of a cyberattack-terminal endings (gadgets, devices) and their owners with personal individual user features at the stage of preparation or design of a cyber-attack. In this regard, the formal formulation of the scientific problem of developing new approaches to the synthesis of models and methods of collection, processing and structuring of information necessary for the implementation of the technology of identification of physical devices and their users based on the analysis of traces left by them in the information space is relevant. The article offers a formal statement of the scientific problem and new approaches to the synthesis of models and methods of collection, processing and structuring of information necessary for the implementation of the technology of identification of physical devices and their users based on the analysis of traces left by them in the information space.