Availability government web resources monitoring system

Authors

  • Oleksii Misnik State institution “Institute of special communication and information protection of National technical university of Ukraine “Kyiv polytechnic institute”, Kyiv,, Ukraine
  • Mykhailo Antonishyn National сyber сentre of the State service of special communication and information protection of Ukraine, Kyiv,, Ukraine

DOI:

https://doi.org/10.20535/2411-1031.2016.4.1.96018

Keywords:

Information, availability, web resource, software, monitoring, monitoring system, Nagios.

Abstract

The constant increase in the role of information technology leads to the denial of the traditional paper workflow for electronic. With the increase used of electronic documents increases and interest for this electronic  documents from various people and many hacker groups, also the intelligence services of other countries. The most destructive influence befalls government web-resources. To prevent such exposure is provided primarily inviolability of their integrity and availability. To control the accessibility government web resources used monitoring systems. However, there are no guidelines for the selection of software systems and, consequently, the isolation of their best and worst. Therefore, constant monitoring the availability of government web resources offered to carry through the development of monitoring systems based solution Nagios. This is due to the ability to store settings in configuration files, a simple file format, ease of configuration using any recording tools, and lots of plugins to extend functionality. The process of finding domain names government web resources using automated scripting language Bash. This system is aimed at solving such problems as the definition of early attacks “denial of service” display technical problems on servers which operate a Web resource; mapping software problems working web resource. This will be possible to ensure continuous monitoring of the availability of government web resources and quick information about the beginning of an attack on them or their technical malfunction.

Author Biographies

Oleksii Misnik, State institution “Institute of special communication and information protection of National technical university of Ukraine “Kyiv polytechnic institute”, Kyiv,

postgraduate student

Mykhailo Antonishyn, National сyber сentre of the State service of special communication and information protection of Ukraine, Kyiv,

engineer

References

DoS-attack. [Online]. Available: https://ru.wikipedia.org/wiki/DoS-атака. Accessed on: Febr. 3, 2016.

O.S. Vysochina, S.I. Shmatkov, and A.M. Salman, “Analysis of telecommunications networks monitoring systems”, Radio Electronics, Computer Science, Control, no. 2 (23), pp. 139-142, 2010. doi: 10.15588/1607-3274-2010-2-24.

Y.M. Ivchenko, V.H. Ivchenko, and O.M. Hondar, “The monitoring system of corporative informational net”, Bulletin of Dnipropetrovsk National University of Railway Transport named after Academician V. Lazaryan, iss. 36, pp. 171-174, 2011.

“DDoS 100 GigaBit - report from the front lines of the witness”. [Online]. Available: http://blogerator.ru/page/ddos-v-100-gbits-reportazh-s-liniifronta-ot-ocevidca. Accessed on: Jan. 10, 2016.

V. Kordyak, V. Dronyuk, A. Fedevych, “Information technology monitoring and traffic analysis in computer networks”, Bulletin of Lviv Polytechnic National University. Series ”Computer Sciences and Information Technologies”, no. 826, pp. 35-42, 2015.

Zabbix. [Online]. Available: www.zabbix.org. Accessed on: Dec. 15, 2015.

Nagios is the industry standard in IT infrastructure monitoring. [Online]. Available: www.nagios.org. Accessed on: Dec. 15, 2015.

Cacti. [Online]. Available: www.cacti.net. Accessed on: Dec. 15, 2015.

NOC. [Online]. Available: kb.nocproject.org. Accessed on: Dec. 15, 2015.

Published

2016-06-30

How to Cite

Misnik, O., & Antonishyn, M. (2016). Availability government web resources monitoring system. Collection "Information Technology and Security", 4(1), 54–61. https://doi.org/10.20535/2411-1031.2016.4.1.96018

Issue

Section

NETWORK AND APPLICATION SECURITY