Methods of detecting illegal access to corporate network
Main Article Content
Abstract
This article describes the attack on obtaining illegal access. The possible ways of its realization. A technique based on the detection of abnormal behavior of the attacker. The mathematical way to compare user actions, as well as a way to create and update the database operations.
Article Details
Section
COMPUTER SECURITY