
The problems of computer monitoring and analysis of environmental parameters implementation of automated business processes during the operation of the protection system. The analysis is based on the idea of IP as a model OSE / RM of POSIX, which allows the use of appropriate mechanisms to detect anomalies, to determine the phase of attack and evaluate it in terms of the application of the destructive effects of the business process.
Рассмотрены вопросы компьютерного мониторинга и анализа параметров среды реализации автоматизированных бизнес-процессов в период эксплуатации системы защиты. Анализ основывается на представлении ИС в виде модели OSE/RM группы POSIX, что позволяет использовать адекватные механизмы обнаружения аномалий, определить фазу атаки и оценить ее с точки зрения нанесения деструктивных воздействий бизнес-процессу.
СИСТЕМА ИНФОРМАЦИОННОЙ ЗАЩИТЫ, МЕТОД ОБНАРУЖЕНИЯ АНОМАЛИЙ, МОНИТОРИНГ БИЗНЕС-ПРОЦЕССОВ
СИСТЕМА ИНФОРМАЦИОННОЙ ЗАЩИТЫ, МЕТОД ОБНАРУЖЕНИЯ АНОМАЛИЙ, МОНИТОРИНГ БИЗНЕС-ПРОЦЕССОВ
| selected citations These citations are derived from selected sources. This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | 0 | |
| popularity This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network. | Average | |
| influence This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically). | Average | |
| impulse This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network. | Average |
