ISSN 1991-2927
 

ACP № 4 (58) 2019

INFORMATION SECURITY METHOD BASED ON USER ACTIVITY MONITORING OF DISTRIBUTED COMPUTING ENVIRONMENT

Dmitrii Vasilevich Kozmovskii, Candidate of Science in Engineering; graduated from the Faculty of Automated Control Systems Mathematical Support at the A.S. Popov Naval Radioelectronics Institute; Lead Specialist at JSC ‘RPA ‘Impuls’; specializes in the field of development, pilot production and maintenance of special geographically distributed information management systems. e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it. .D. Kozmovskii,

Valerii Ilich Kuvatov, Doctor of Science in Engineering, Professor; Honored Worker of the Higher School of the Russian Federation; graduated from the Faculty of Automated Control Systems Mathematical Support at the A.S. Popov Naval Radioelectronics Institute; Professor of the St. Petersburg University of the Russian Interior Ministry; specializes in the field of mathematical modeling and information technologies of special-purpose computer-aided control systems; an author of articles and monographs on the subject. e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it. .V. Kuvatov,

Iurii Ivanovich Sineshchuk, Doctor of Science in Engineering, Professor; Honored Worker of the Higher School of the Russian Federation; graduated from the Faculty of Combat Information and Management Systems of the A.S. Popov Higher Naval Radioelectronics School; Professor of the St. Petersburg University of the Russian Interior Ministry; specializes in the field of analysis and information security, stability of complex systems. e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it. .I. Sineshchuk,

Tatiana Ivanovna Davydova, Candidate of Science in Engineering; graduated from the Radioengineering Faculty of Ulyanovsk State Technical University; Leading Engineer at FRPC JSC ‘RPA ‘Mars’; an author of articles and monograph in the field of reliability calculations and operating of radio engineering facilities. e-mail: This email address is being protected from spambots. You need JavaScript enabled to view it. .T. Davydova,

Information Security Method Based on User Activity Monitoring of Distributed Computing Environment 57_4.pdf

The article analyzes the security features of information resources of distributed telecommunication systems. Geographically distributed computing network is a set of network equipment and communication lines designed for data exchange between user workstations and functional subsystems. Given that more than 90% of the organization’s information is now in electronic form, the problem of ensuring the protection of information circulating in the computer network is becoming an extremely important task. In this regard, the organization of the network structure is associated with the necessary settings of security policies of network users. At the same time, the most real and numerous internal threats that most organizations have remain out of sight. The article describes the systems designed to protect the computer network from an internal intruder, using the control of network connections, accounting and analysis of network traffic. The principle of definition of actual types of activity of users which is based on the analysis of statistical parameters of sessions on various types of network activity, their comparison with profiles of users allowing to classify sessions of network exchange is formulated. Grounded steps and the classification algorithm network activities and separate instances of network sharing in the network activities.

Distributed computing environment, information security threats, network exchange session, user activity classification.


© FRPC JSC 'RPA 'Mars', 2009-2018 The web-site runs on Joomla!