Model for Identifying Cyber Threats to Internet Information Resources


Cite item

Full Text

Open Access Open Access
Restricted Access Access granted
Restricted Access Subscription Access

Abstract

In this paper, we discuss the construction of a model for protecting information resources based on new approaches to active search, unified investigation, and response to cyber threats. The process of identifying cyber threats is based on search prediction methods interconnected with the cyclic nature of the behavioral activity of users of network resources.

About the authors

I. V. Luskatov

Mozhaisky Military Space Academy

Author for correspondence.
Email: mrfa@rambler.ru
Russian Federation, St. Petersburg, 197198

S. V. Pilkevich

Mozhaisky Military Space Academy

Author for correspondence.
Email: ambers@list.ru
Russian Federation, St. Petersburg, 197198

Supplementary files

Supplementary Files
Action
1. JATS XML

Copyright (c) 2019 Allerton Press, Inc.