Abstract:
Methods of detection of typical attacks to the distributed computing systems are considered in this paper. The review of mechanisms of realization of the basic kinds of the removed attacks both to reports TCP/IP, and on a network infrastructure is resulted. As mathematical model of distribution of attack “the false agent” is used object a “hypernetwork”.