In the article the expedience of the use of new approaches to information security of the automated systems of EMERCOM of Russia. Researched the possibilities of application of the promising methods for processing data about destructive information influences on these systems and counteract them.
systemic approach, big data analytics, behavioral analysis, expert analysis of the network activity, cognitive intelligence
1. Afonin E. Povedencheskiy analiz pomogaet vyyavlyat' IB-incidenty // CNews Izdanie o vysokih tehnologiyah. URL: www.cnews.ru/articles/2016-01-26_hpe_kak_povedencheskij_analiz_pomogaet_vyyavlyat_ibintsidenty (data obrascheniya: 13.01.2017).
2. Voskanyan M. Zloumyshlenniki - ryadom // Intelligent Enterprise. 2005. № 131.
3. Natarajan Meghanathan, Sumanth Reddy Allam and Loretta A. Moore. Tools and techniques for network forensics // International Journal of Network Security & Its Applications (IJNSA). 2009. Vol. 1. No. 1. April.
4. Jay Bretzman. What Are the Best Network Forensics and Data Capture Tools? SecurityIntelligence. 2014. August 20. URL: https://securityintelligence.com/ what-are-the-best-network-forensics-and-data-capture-tools/ (data obrascheniya: 13.01.2017).
5. Sam Curry, Engin Kirda, Eddie Schwartz, William H. Stewart, Amit Yoran. Big data fuels intelligence-driven security. RSA Security Brief, January. 2013. URL: https:// www.emc.com/collateral/industry-overview/big-data-fuels-intelligence-driven-security-io.pdf. (data obrascheniya: 13.01.2017).
6. Adopting intelligence driven security. RSA Whitepaper. URL: https://www.emc.com/collateral/white-papers/h13235-wp-adopting-intelligence-driven-security.pdf. (data obrascheniya: 13.01.2017).
7. Roadmap to intelligence-driven information security // Security for business innovation council report RSA, The Security Division of EMC. URL: https://msisac. cisecurity.org/whitepaper/documents/5.pdf. (data obrascheniya: 13.01.2017).
8. Big data: The next frontier for innovation, competition, and productivity // McKinsey Glabal Institute. 2011. May. URL: www.mckinsey.com/mgi/piblications/ (data obrascheniya: 13.01.2017).
9. Marc van Zadelhoff. Cognitive Security=Security That Understands, Reasons And Learns. Forbes BrandVoice. 2016. May 10. URL: http://www.forbes.com/sites/ibm/ 2016/05/10/cognitive-security-security-that-understands-reasons-and-learns/#1fbcc9b314ab (data obrascheniya: 13.01.2017).
10. Gabriel Dusil. Cognitive Security - Positioning Network Behavior Analysis in the Security Ecosystem. 2012. June 30. URL: https://dusil.com/tag/cognitive-security/ (data obrascheniya: 13.01.2017).