Information Technology Systems Vulnerabilities Detecting based on Network’s Traffic Analysis

This paper proposes traffic analysis procedure that is very effective and sometimes single countermeasure on counteracting of network attacks and information leakage channels (hidden control channels). Traffic analysis envisages certain measures to control the security of the Russian Federation info...

Full description

Bibliographic Details
Main Authors: Dmitry Anatolevich Melnikov, Vladislav Romanovich Petrov, Aleksey Nikolaevich Radko, Denis Sergeevich Buryy, Sergey Alexandrovich Khrustalev
Format: Article
Language:English
Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 2013-12-01
Series:Безопасность информационных технологий
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/306