Russian Journal of Resources, Conservation and Recycling
Russian Journal of Resources, Conservation and Recycling
           

2022, Vol. 9, No. 4. - go to content...

Permanent address of this page - https://resources.today/en/14itor422.html

Метаданные этой статьи так же доступны на русском языке

DOI: 10.15862/14ITOR422 (https://doi.org/10.15862/14ITOR422)

Full article in PDF format (file size: 800 KB)


For citation:

Rudzeyt O.U., Dobrzhinskii U.V., Zhigulskiy V.E. Evaluation of passive network testing techniques in enterprise information systems. Russian journal of resources, conservation and recycling. 2022; 9(4). Available at: https://resources.today/PDF/14ITOR422.pdf (in Russian). DOI: 10.15862/14ITOR422


Evaluation of passive network testing techniques in enterprise information systems

Rudzeyt Oleg Urievich
Far Eastern Federal University, Vladivostok, Russia
Department of Information Security
E-mail: rudzeyt18@mail.ru

Dobrzhinskii Uriy Vyacheslavovich
Far Eastern Federal University, Vladivostok, Russia
Department of Information Security
E-mail: dobrzhinskii.yv@dvfu.ru

Zhigulskiy Vladislav Evgenievich
ITMO University, Saint-Petersburg, Russia
E-mail: upachko@gmail.com

Abstract. At the moment, the use of server devices, web applications, routers, switches, etc. has become widespread in modern information systems. These technologies have quite important advantages in the form of ease of use, a simple and convenient interface, even if their work is carried out through the use of the command line, the possibility of remote work via the Internet, as well as technologies for fast deployment. Quite often, modern technologies also have a large number of problems related to information security, because the development, testing and establishment of data transmission protocols between devices, the formation of the enterprise network architecture is very often carried out in a short time, and the company’s resources become available via the Internet for users of both the company and customers, and for intruders. Vulnerabilities of varying degrees allow third parties to steal corporate information, carry out unauthorized data changes, disrupt the availability of enterprise applications, and cause Denial-of-Service problems. Currently, the problem of ensuring the security of infocommunication technologies is very relevant, so, according to, more than 60 % of all detected vulnerabilities relate to applications that use access to an external network. And more than 70 % of companies have critical risks of exploiting vulnerabilities in case of intrusion from the external perimeter of the network. One of the widespread methods of ensuring the security of network devices is the detection of vulnerabilities in order to eliminate them later. In this paper, modern methods and techniques of passive vulnerability detection in network systems are considered and their capabilities are analyzed.

Keywords: system; vulnerability; protocol; data; evaluation; attacker; network

Download article in PDF format

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.

ISSN 2500-0659 (Online)

Dear readers! Comments on articles are accepted in Russian and English.
Comments are moderated and appear on the site after verification by the editor.
Comments not related to the subject of the article are not published.

Добавить комментарий