{"title":"利用集成安全系统检测和分析远程桌面协议中的恶意活动","authors":"Nikita M. Danchenko, G. A. Mazurenko","doi":"10.1109/EICONRUS.2018.8317024","DOIUrl":null,"url":null,"abstract":"This article is devoted to the effectiveness of security systems using integrated security systems. Every year computer system and software improve in geometric progression. Unfortunately, malicious traffic and vulnerabilities in the systems also do not cease to grow. At the first hand, we created a system that is able to understand malicious traffic, analyze and protect critical information when using remote access protocols like RDP, VNC. At the second hand, our system can predict and prevent potential intruder.","PeriodicalId":6562,"journal":{"name":"2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)","volume":"27 1","pages":"40-41"},"PeriodicalIF":0.0000,"publicationDate":"2018-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Detecting and analysis malicious activity on remote desktop protocols using integrated security system\",\"authors\":\"Nikita M. Danchenko, G. A. Mazurenko\",\"doi\":\"10.1109/EICONRUS.2018.8317024\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article is devoted to the effectiveness of security systems using integrated security systems. Every year computer system and software improve in geometric progression. Unfortunately, malicious traffic and vulnerabilities in the systems also do not cease to grow. At the first hand, we created a system that is able to understand malicious traffic, analyze and protect critical information when using remote access protocols like RDP, VNC. At the second hand, our system can predict and prevent potential intruder.\",\"PeriodicalId\":6562,\"journal\":{\"name\":\"2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)\",\"volume\":\"27 1\",\"pages\":\"40-41\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/EICONRUS.2018.8317024\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/EICONRUS.2018.8317024","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Detecting and analysis malicious activity on remote desktop protocols using integrated security system
This article is devoted to the effectiveness of security systems using integrated security systems. Every year computer system and software improve in geometric progression. Unfortunately, malicious traffic and vulnerabilities in the systems also do not cease to grow. At the first hand, we created a system that is able to understand malicious traffic, analyze and protect critical information when using remote access protocols like RDP, VNC. At the second hand, our system can predict and prevent potential intruder.