Opportunities and prospects of using Open-Source intrusion detection technologies in the spheres of small and medium business of Ukraine

DOI: 10.31673/2409-7292.2021.011925

Authors

  • Н. Л. Веселков, (Veselkov N. L.) State University of Telecommunications, Kyiv
  • В. В. Марченко, (Marchenko V. V.) State University of Telecommunications, Kyiv

DOI:

https://doi.org/10.31673/2409-7292.2021.011925

Abstract

The use of intrusion detection methods, such as IDS and Honeypot, to protect the network infrastructures of small and medium-sized businesses in Ukraine is considered.

Keywords: IDS, Honeypot, cyber attack, invasion, business protection, cyber threat, information security.

References
1. Як бізнесу захистити себе від кібератак [Електронний ресурс] – Режим доступу: https://home.kpmg/ua/uk/home/media/press-releases/2020/12/yak-biznesu-zakhystyty-sebe-vid-kiberatak.html.
2. Suricata Documentation [Електронний ресурс] – Режим доступу: https://suricata.readthedocs.io/en/suricata-6.0.0/install.html.
3. Lhotsky B. Instant OSSEC Host-based Intrusion Detection System / Brad Lhotsky., 2013. – 62 с.
4. Cowrie SSH/Telnet Honeypot [Електронний ресурс] – Режим доступу: https://github.com/cowrie/cowrie.
5. Nathalie Weiler. Honeypots for Distributed Denial of Service Attacks // Computer Engineering and Networks Laboratory (TIK), Swiss Federal Institute of Technology ETH Z ¨urich, Switzerland 2002.

Published

2021-06-02

Issue

Section

Articles