Methods of detecting illegal access to corporate network

Main Article Content

Светлана Климентьевна Варлатая
Егор Александрович Калужин
Алексей Константинович Гросман

Abstract

This article describes the attack on obtaining illegal access. The possible ways of its realization. A technique based on the detection of abnormal behavior of the attacker. The mathematical way to compare user actions, as well as a way to create and update the database operations.

Article Details

Section
COMPUTER SECURITY