Development Intrusion Prevention System by Using Parallel Programming and Fault Tolerance Technology

One of the first threats that prompted the creation of intrusion prevention systems is considered to be the "Morris worm", which hit computers in late 1988.  Intrusion prevention systems evolved, and eventually became a full-fledged system incorporating special proactive methods to prevent...

Full description

Bibliographic Details
Main Authors: Mikhail B. Abrosimov, Iehab A. Kamil
Format: Article
Language:English
Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 2018-03-01
Series:Безопасность информационных технологий
Subjects:
Online Access:https://bit.mephi.ru/index.php/bit/article/view/1094
_version_ 1797724639551553536
author Mikhail B. Abrosimov
Iehab A. Kamil
author_facet Mikhail B. Abrosimov
Iehab A. Kamil
author_sort Mikhail B. Abrosimov
collection DOAJ
description One of the first threats that prompted the creation of intrusion prevention systems is considered to be the "Morris worm", which hit computers in late 1988.  Intrusion prevention systems evolved, and eventually became a full-fledged system incorporating special proactive methods to prevent attacks, designed to protect against various kinds of threats.  Among the proactive intrusion prevention systems are the following: a behavioral process analyzer for analyzing the behavior of processes running in the system, eliminating the possibility of infection on the computer, locking the ports, blocking the DoS attacks. In article the developed system of prevention of invasions is described. It is more effective to develop and use the systems of prevention of invasions as separate means of protection which will serve as the intermediary between the protected and opened networks. It is more expedient to organize prevention of the attacks at the level of concrete knot, by control of all system calls. Special attention in article is paid to use of technologies of parallel programming in the developed system. The main advantages of system of fault tolerance and the used algorithms for realization of technology of prevention of invasions are described.
first_indexed 2024-03-12T10:19:56Z
format Article
id doaj.art-b5007e99e4d64820b049d170d7bebae7
institution Directory Open Access Journal
issn 2074-7128
2074-7136
language English
last_indexed 2024-03-12T10:19:56Z
publishDate 2018-03-01
publisher Joint Stock Company "Experimental Scientific and Production Association SPELS
record_format Article
series Безопасность информационных технологий
spelling doaj.art-b5007e99e4d64820b049d170d7bebae72023-09-02T10:13:22ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362018-03-01251657310.26583/bit.2018.1.061084Development Intrusion Prevention System by Using Parallel Programming and Fault Tolerance TechnologyMikhail B. Abrosimov0Iehab A. Kamil1Saratov state University named after N. G. ChernyshevskogoSaratov state University named after N. G. ChernyshevskogoOne of the first threats that prompted the creation of intrusion prevention systems is considered to be the "Morris worm", which hit computers in late 1988.  Intrusion prevention systems evolved, and eventually became a full-fledged system incorporating special proactive methods to prevent attacks, designed to protect against various kinds of threats.  Among the proactive intrusion prevention systems are the following: a behavioral process analyzer for analyzing the behavior of processes running in the system, eliminating the possibility of infection on the computer, locking the ports, blocking the DoS attacks. In article the developed system of prevention of invasions is described. It is more effective to develop and use the systems of prevention of invasions as separate means of protection which will serve as the intermediary between the protected and opened networks. It is more expedient to organize prevention of the attacks at the level of concrete knot, by control of all system calls. Special attention in article is paid to use of technologies of parallel programming in the developed system. The main advantages of system of fault tolerance and the used algorithms for realization of technology of prevention of invasions are described.https://bit.mephi.ru/index.php/bit/article/view/1094the intrusion prevention system, secure communication, fault tolerance, parallel programming, viruses, virtualization, malicious traffic.
spellingShingle Mikhail B. Abrosimov
Iehab A. Kamil
Development Intrusion Prevention System by Using Parallel Programming and Fault Tolerance Technology
Безопасность информационных технологий
the intrusion prevention system, secure communication, fault tolerance, parallel programming, viruses, virtualization, malicious traffic.
title Development Intrusion Prevention System by Using Parallel Programming and Fault Tolerance Technology
title_full Development Intrusion Prevention System by Using Parallel Programming and Fault Tolerance Technology
title_fullStr Development Intrusion Prevention System by Using Parallel Programming and Fault Tolerance Technology
title_full_unstemmed Development Intrusion Prevention System by Using Parallel Programming and Fault Tolerance Technology
title_short Development Intrusion Prevention System by Using Parallel Programming and Fault Tolerance Technology
title_sort development intrusion prevention system by using parallel programming and fault tolerance technology
topic the intrusion prevention system, secure communication, fault tolerance, parallel programming, viruses, virtualization, malicious traffic.
url https://bit.mephi.ru/index.php/bit/article/view/1094
work_keys_str_mv AT mikhailbabrosimov developmentintrusionpreventionsystembyusingparallelprogrammingandfaulttolerancetechnology
AT iehabakamil developmentintrusionpreventionsystembyusingparallelprogrammingandfaulttolerancetechnology