Development Intrusion Prevention System by Using Parallel Programming and Fault Tolerance Technology
One of the first threats that prompted the creation of intrusion prevention systems is considered to be the "Morris worm", which hit computers in late 1988. Intrusion prevention systems evolved, and eventually became a full-fledged system incorporating special proactive methods to prevent...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2018-03-01
|
Series: | Безопасность информационных технологий |
Subjects: | |
Online Access: | https://bit.mephi.ru/index.php/bit/article/view/1094 |
_version_ | 1797724639551553536 |
---|---|
author | Mikhail B. Abrosimov Iehab A. Kamil |
author_facet | Mikhail B. Abrosimov Iehab A. Kamil |
author_sort | Mikhail B. Abrosimov |
collection | DOAJ |
description | One of the first threats that prompted the creation of intrusion prevention systems is considered to be the "Morris worm", which hit computers in late 1988. Intrusion prevention systems evolved, and eventually became a full-fledged system incorporating special proactive methods to prevent attacks, designed to protect against various kinds of threats. Among the proactive intrusion prevention systems are the following: a behavioral process analyzer for analyzing the behavior of processes running in the system, eliminating the possibility of infection on the computer, locking the ports, blocking the DoS attacks.
In article the developed system of prevention of invasions is described. It is more effective to develop and use the systems of prevention of invasions as separate means of protection which will serve as the intermediary between the protected and opened networks. It is more expedient to organize prevention of the attacks at the level of concrete knot, by control of all system calls. Special attention in article is paid to use of technologies of parallel programming in the developed system. The main advantages of system of fault tolerance and the used algorithms for realization of technology of prevention of invasions are described. |
first_indexed | 2024-03-12T10:19:56Z |
format | Article |
id | doaj.art-b5007e99e4d64820b049d170d7bebae7 |
institution | Directory Open Access Journal |
issn | 2074-7128 2074-7136 |
language | English |
last_indexed | 2024-03-12T10:19:56Z |
publishDate | 2018-03-01 |
publisher | Joint Stock Company "Experimental Scientific and Production Association SPELS |
record_format | Article |
series | Безопасность информационных технологий |
spelling | doaj.art-b5007e99e4d64820b049d170d7bebae72023-09-02T10:13:22ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362018-03-01251657310.26583/bit.2018.1.061084Development Intrusion Prevention System by Using Parallel Programming and Fault Tolerance TechnologyMikhail B. Abrosimov0Iehab A. Kamil1Saratov state University named after N. G. ChernyshevskogoSaratov state University named after N. G. ChernyshevskogoOne of the first threats that prompted the creation of intrusion prevention systems is considered to be the "Morris worm", which hit computers in late 1988. Intrusion prevention systems evolved, and eventually became a full-fledged system incorporating special proactive methods to prevent attacks, designed to protect against various kinds of threats. Among the proactive intrusion prevention systems are the following: a behavioral process analyzer for analyzing the behavior of processes running in the system, eliminating the possibility of infection on the computer, locking the ports, blocking the DoS attacks. In article the developed system of prevention of invasions is described. It is more effective to develop and use the systems of prevention of invasions as separate means of protection which will serve as the intermediary between the protected and opened networks. It is more expedient to organize prevention of the attacks at the level of concrete knot, by control of all system calls. Special attention in article is paid to use of technologies of parallel programming in the developed system. The main advantages of system of fault tolerance and the used algorithms for realization of technology of prevention of invasions are described.https://bit.mephi.ru/index.php/bit/article/view/1094the intrusion prevention system, secure communication, fault tolerance, parallel programming, viruses, virtualization, malicious traffic. |
spellingShingle | Mikhail B. Abrosimov Iehab A. Kamil Development Intrusion Prevention System by Using Parallel Programming and Fault Tolerance Technology Безопасность информационных технологий the intrusion prevention system, secure communication, fault tolerance, parallel programming, viruses, virtualization, malicious traffic. |
title | Development Intrusion Prevention System by Using Parallel Programming and Fault Tolerance Technology |
title_full | Development Intrusion Prevention System by Using Parallel Programming and Fault Tolerance Technology |
title_fullStr | Development Intrusion Prevention System by Using Parallel Programming and Fault Tolerance Technology |
title_full_unstemmed | Development Intrusion Prevention System by Using Parallel Programming and Fault Tolerance Technology |
title_short | Development Intrusion Prevention System by Using Parallel Programming and Fault Tolerance Technology |
title_sort | development intrusion prevention system by using parallel programming and fault tolerance technology |
topic | the intrusion prevention system, secure communication, fault tolerance, parallel programming, viruses, virtualization, malicious traffic. |
url | https://bit.mephi.ru/index.php/bit/article/view/1094 |
work_keys_str_mv | AT mikhailbabrosimov developmentintrusionpreventionsystembyusingparallelprogrammingandfaulttolerancetechnology AT iehabakamil developmentintrusionpreventionsystembyusingparallelprogrammingandfaulttolerancetechnology |