<!DOCTYPE article
PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20190208//EN"
       "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.4" xml:lang="en">
 <front>
  <journal-meta>
   <journal-id journal-id-type="publisher-id">Scientific and analytical journal «Vestnik Saint-Petersburg university of State fire service of EMERCOM of Russia»</journal-id>
   <journal-title-group>
    <journal-title xml:lang="en">Scientific and analytical journal «Vestnik Saint-Petersburg university of State fire service of EMERCOM of Russia»</journal-title>
    <trans-title-group xml:lang="ru">
     <trans-title>Научно-аналитический журнал &quot;Вестник Санкт-Петербургского университета ГПС МЧС России&quot;</trans-title>
    </trans-title-group>
   </journal-title-group>
   <issn publication-format="online">2218-130X</issn>
  </journal-meta>
  <article-meta>
   <article-id pub-id-type="publisher-id">68369</article-id>
   <article-categories>
    <subj-group subj-group-type="toc-heading" xml:lang="ru">
     <subject>МАТЕМАТИЧЕСКОЕ МОДЕЛИРОВАНИЕ, КОМПЬЮТЕРНЫЕ ТЕХНОЛОГИИ В ТЕОРИИ УПРАВЛЕНИЯ СЛОЖНЫМИ ПРОЦЕССАМИ</subject>
    </subj-group>
    <subj-group subj-group-type="toc-heading" xml:lang="en">
     <subject>MATHEMATIC MODELING, COMPUTER TECHNOLOGIES IN THE THEORY OF COMPLEX PROCESSES MANAGEMENT</subject>
    </subj-group>
    <subj-group>
     <subject>МАТЕМАТИЧЕСКОЕ МОДЕЛИРОВАНИЕ, КОМПЬЮТЕРНЫЕ ТЕХНОЛОГИИ В ТЕОРИИ УПРАВЛЕНИЯ СЛОЖНЫМИ ПРОЦЕССАМИ</subject>
    </subj-group>
   </article-categories>
   <title-group>
    <article-title xml:lang="en">ADVANCED METHODS OF ANALYSIS OF INFORMATION FLOWS IN THE SPHERE OF SECURITY OF THE AUTOMATED SYSTEMS OF EMERCOM OF RUSSIA (INFORMATION-ANALYTICAL REVIEW - PART 2)</article-title>
    <trans-title-group xml:lang="ru">
     <trans-title>ПЕРСПЕКТИВНЫЕ МЕТОДЫ АНАЛИЗА ИНФОРМАЦИОННЫХ ПОТОКОВ В СФЕРЕ БЕЗОПАСНОСТИ АВТОМАТИЗИРОВАННЫХ СИСТЕМ МЧС РОССИИ (ИНФОРМАЦИОННО-АНАЛИТИЧЕСКИЙ ОБЗОР - ЧАСТЬ 2)</trans-title>
    </trans-title-group>
   </title-group>
   <contrib-group content-type="authors">
    <contrib contrib-type="author">
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Артамонов</surname>
       <given-names>А С</given-names>
      </name>
      <name xml:lang="en">
       <surname>Artamonov</surname>
       <given-names>A S</given-names>
      </name>
     </name-alternatives>
     <xref ref-type="aff" rid="aff-1"/>
    </contrib>
    <contrib contrib-type="author">
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Иванов</surname>
       <given-names>А Ю</given-names>
      </name>
      <name xml:lang="en">
       <surname>Ivanov</surname>
       <given-names>A Yu</given-names>
      </name>
     </name-alternatives>
     <xref ref-type="aff" rid="aff-2"/>
    </contrib>
   </contrib-group>
   <aff-alternatives id="aff-1">
    <aff>
     <institution xml:lang="ru">ООО «Биоклимат», г. Новосибирск</institution>
     <country>ru</country>
    </aff>
    <aff>
     <institution xml:lang="en">Bioclimate Company Ltd, Novosibirsk</institution>
     <country>ru</country>
    </aff>
   </aff-alternatives>
   <aff-alternatives id="aff-2">
    <aff>
     <institution xml:lang="ru">Санкт-Петербургский университет ГПС МЧС России</institution>
     <country>ru</country>
    </aff>
    <aff>
     <institution xml:lang="en">Saint-Petersburg university of State fire service of EMERCOM of Russia</institution>
     <country>ru</country>
    </aff>
   </aff-alternatives>
   <pub-date publication-format="print" date-type="pub" iso-8601-date="2017-03-25T14:01:20+03:00">
    <day>25</day>
    <month>03</month>
    <year>2017</year>
   </pub-date>
   <pub-date publication-format="electronic" date-type="pub" iso-8601-date="2017-03-25T14:01:20+03:00">
    <day>25</day>
    <month>03</month>
    <year>2017</year>
   </pub-date>
   <volume>2017</volume>
   <issue>1</issue>
   <fpage>74</fpage>
   <lpage>83</lpage>
   <history>
    <date date-type="received" iso-8601-date="2017-03-12T14:01:20+03:00">
     <day>12</day>
     <month>03</month>
     <year>2017</year>
    </date>
    <date date-type="accepted" iso-8601-date="2017-03-20T14:01:20+03:00">
     <day>20</day>
     <month>03</month>
     <year>2017</year>
    </date>
   </history>
   <self-uri xlink:href="https://journals.igps.ru/en/nauka/article/68369/view">https://journals.igps.ru/en/nauka/article/68369/view</self-uri>
   <abstract xml:lang="ru">
    <p>Обоснована целесообразность использования новых подходов к обеспечению информационной безопасности автоматизированных систем МЧС России. Исследованы возможности применения перспективных методов обработки данных о деструктивных информационных воздействиях на указанные системы и противодействии им.</p>
   </abstract>
   <trans-abstract xml:lang="en">
    <p>In the article the expedience of the use of new approaches to information security of the automated systems of EMERCOM of Russia. Researched the possibilities of application of the promising methods for processing data about destructive information influences on these systems and counteract them.</p>
   </trans-abstract>
   <kwd-group xml:lang="ru">
    <kwd>системный подход</kwd>
    <kwd>аналитика больших данных</kwd>
    <kwd>поведенческий анализ</kwd>
    <kwd>экспертный анализ сетевой активности</kwd>
    <kwd>когнитивная аналитика</kwd>
   </kwd-group>
   <kwd-group xml:lang="en">
    <kwd>systemic approach</kwd>
    <kwd>big data analytics</kwd>
    <kwd>behavioral analysis</kwd>
    <kwd>expert analysis of the network activity</kwd>
    <kwd>cognitive intelligence</kwd>
   </kwd-group>
  </article-meta>
 </front>
 <body>
  <p></p>
 </body>
 <back>
  <ref-list>
   <ref id="B1">
    <label>1.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Афонин Е. Поведенческий анализ помогает выявлять ИБ-инциденты // CNews Издание о высоких технологиях. URL: www.cnews.ru/articles/2016-01-26_hpe_kak_povedencheskij_analiz_pomogaet_vyyavlyat_ibintsidenty (дата обращения: 13.01.2017).</mixed-citation>
     <mixed-citation xml:lang="en">Afonin E. Povedencheskiy analiz pomogaet vyyavlyat' IB-incidenty // CNews Izdanie o vysokih tehnologiyah. URL: www.cnews.ru/articles/2016-01-26_hpe_kak_povedencheskij_analiz_pomogaet_vyyavlyat_ibintsidenty (data obrascheniya: 13.01.2017).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B2">
    <label>2.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Восканян М. Злоумышленники - рядом // Intelligent Enterprise. 2005. № 131.</mixed-citation>
     <mixed-citation xml:lang="en">Voskanyan M. Zloumyshlenniki - ryadom // Intelligent Enterprise. 2005. № 131.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B3">
    <label>3.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Natarajan Meghanathan, Sumanth Reddy Allam and Loretta A. Moore. Tools and techniques for network forensics // International Journal of Network Security &amp; Its Applications (IJNSA). 2009. Vol. 1. No. 1. April.</mixed-citation>
     <mixed-citation xml:lang="en">Natarajan Meghanathan, Sumanth Reddy Allam and Loretta A. Moore. Tools and techniques for network forensics // International Journal of Network Security &amp; Its Applications (IJNSA). 2009. Vol. 1. No. 1. April.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B4">
    <label>4.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Jay Bretzman. What Are the Best Network Forensics and Data Capture Tools? SecurityIntelligence. 2014. August 20. URL: https://securityintelligence.com/ what-are-the-best-network-forensics-and-data-capture-tools/ (дата обращения: 13.01.2017).</mixed-citation>
     <mixed-citation xml:lang="en">Jay Bretzman. What Are the Best Network Forensics and Data Capture Tools? SecurityIntelligence. 2014. August 20. URL: https://securityintelligence.com/ what-are-the-best-network-forensics-and-data-capture-tools/ (data obrascheniya: 13.01.2017).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B5">
    <label>5.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Sam Curry, Engin Kirda, Eddie Schwartz, William H. Stewart, Amit Yoran. Big data fuels intelligence-driven security. RSA Security Brief, January. 2013. URL: https:// www.emc.com/collateral/industry-overview/big-data-fuels-intelligence-driven-security-io.pdf. (дата обращения: 13.01.2017).</mixed-citation>
     <mixed-citation xml:lang="en">Sam Curry, Engin Kirda, Eddie Schwartz, William H. Stewart, Amit Yoran. Big data fuels intelligence-driven security. RSA Security Brief, January. 2013. URL: https:// www.emc.com/collateral/industry-overview/big-data-fuels-intelligence-driven-security-io.pdf. (data obrascheniya: 13.01.2017).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B6">
    <label>6.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Adopting intelligence driven security. RSA Whitepaper. URL: https://www.emc.com/collateral/white-papers/h13235-wp-adopting-intelligence-driven-security.pdf. (дата обращения: 13.01.2017).</mixed-citation>
     <mixed-citation xml:lang="en">Adopting intelligence driven security. RSA Whitepaper. URL: https://www.emc.com/collateral/white-papers/h13235-wp-adopting-intelligence-driven-security.pdf. (data obrascheniya: 13.01.2017).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B7">
    <label>7.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Roadmap to intelligence-driven information security // Security for business innovation council report RSA, The Security Division of EMC. URL: https://msisac. cisecurity.org/whitepaper/documents/5.pdf. (дата обращения: 13.01.2017).</mixed-citation>
     <mixed-citation xml:lang="en">Roadmap to intelligence-driven information security // Security for business innovation council report RSA, The Security Division of EMC. URL: https://msisac. cisecurity.org/whitepaper/documents/5.pdf. (data obrascheniya: 13.01.2017).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B8">
    <label>8.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Big data: The next frontier for innovation, competition, and productivity // McKinsey Glabal Institute. 2011. May. URL: www.mckinsey.com/mgi/piblications/ (дата обращения: 13.01.2017).</mixed-citation>
     <mixed-citation xml:lang="en">Big data: The next frontier for innovation, competition, and productivity // McKinsey Glabal Institute. 2011. May. URL: www.mckinsey.com/mgi/piblications/ (data obrascheniya: 13.01.2017).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B9">
    <label>9.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Marc van Zadelhoff. Cognitive Security=Security That Understands, Reasons And Learns. Forbes BrandVoice. 2016. May 10. URL: http://www.forbes.com/sites/ibm/ 2016/05/10/cognitive-security-security-that-understands-reasons-and-learns/#1fbcc9b314ab (дата обращения: 13.01.2017).</mixed-citation>
     <mixed-citation xml:lang="en">Marc van Zadelhoff. Cognitive Security=Security That Understands, Reasons And Learns. Forbes BrandVoice. 2016. May 10. URL: http://www.forbes.com/sites/ibm/ 2016/05/10/cognitive-security-security-that-understands-reasons-and-learns/#1fbcc9b314ab (data obrascheniya: 13.01.2017).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B10">
    <label>10.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Gabriel Dusil. Cognitive Security - Positioning Network Behavior Analysis in the Security Ecosystem. 2012. June 30. URL: https://dusil.com/tag/cognitive-security/ (дата обращения: 13.01.2017).</mixed-citation>
     <mixed-citation xml:lang="en">Gabriel Dusil. Cognitive Security - Positioning Network Behavior Analysis in the Security Ecosystem. 2012. June 30. URL: https://dusil.com/tag/cognitive-security/ (data obrascheniya: 13.01.2017).</mixed-citation>
    </citation-alternatives>
   </ref>
  </ref-list>
 </back>
</article>
