01520nas a2200193 4500000000100000000000100001008004100002260000900043653001800052653001800070653001800088653001500106100001900121700002100140245006600161300001200227490000700239520108000246 2020 d c202010aCybersecurity10aSQL injection10avulnerability10aweb attack1 aInna Stetsenko1 aMaksym Demydenko00aSignature-based Intrusion Detection Hardware-Software Complex a221-2310 v473 a
Nowadays hackers are able to find many software vulnerabilities, which can be exploited for malicious purposes such as to destroy the operating system, to steal users’ private data, to demand a ransom not to affect the data and retain their validity. The majority of attacks use an Internet connection; therefore, the efforts should be directed to the way in which data packets are transmitted. The hardware-software complex, which is the main subject of the presented research, serves as a firewall for the devices on one subnetwork with access to the Internet, simultaneously analysing and filtering both downstream and upstream traffic at packet level, resolving scumware and securing the perimeter of each device in the subnet. The concept and the architecture of the developed hardware-software complex are described. The implemented complex will not allow malicious traffic to pass through, providing protection of all endpoint devices in a subnetwork. The experimental results of malware detected are presented, and the security related metrics are evaluated.