DETECTING AND COUNTERING MODERN ATTACKS

Dovletaly N. Nuryagdyyev
The Institute of Telecommunications and Informatics of Turkmenistan, Ashgabat, Turkmenistan;
97dowlet97@gmail.com

Vitaly B. Kreindelin
Moscow Technical University of Communications and Informatics, Moscow, Russia;
vitkrend@gmail.com

DOI: 10.36724/2664-066X-2026-12-2-2-7

SYNCHROINFO JOURNAL. Volume 12, Number 2 (2026). P. 2-7.

Abstract

The IT community’s top priority has become the implementation of monitoring and active defense tools, including IDS, IPS, and integrated IDS platforms. This paper provides a detailed analysis of existing threats, with a particular emphasis on the destructive impact of zero-day attacks, which have become a critical problem for US cybersecurity. It examines the paradigm of network infrastructure protection using IDS/IPS (Intrusion Detection System/Intrusion Prevention System) tools against the backdrop of a qualitative change in cyberthreats. Analyzing modern challenges – from fileless infection methods to targeted APT (Advanced Persistent Threat) campaigns – the authors point to the exhaustion of the potential of standard signature analysis. The paper aims to find ways to improve the effectiveness of network traffic monitoring in the face of constantly evolving attacker tools.

Keywords Information security, IDS/IPS solutions, machine learning, network packet analysis, data security, intrusion prevention, cyber threats, behavioral analysis, network resiliency

References

[1] K. Scarfone, Guide to Intrusion Detection and Prevention Systems (IDPS). NIST Special Publication 800-94. Washington: National Institute of Standards and Technology, 2024 (updated). 120 p.

[2] X. Chen, “Intrusion Detection and Prevention Systems: Hybrid Models and Isolation Mechanisms,” Journal of Cybersecurity and Information Management, 2018. Vol. 12, no. 4, pp. 45–58.

[3] V. I. Averchenkov, Intrusion Detection Systems: A Textbook for Universities. 3rd ed. Moscow: Flinta, 2022. 145 p.

[4] Yu. S. Vasiliev, “Machine Learning in Information Security Problems: Anomaly Detection Methods,” Information Technology Security. 2021. No. 2, pp. 88-101.

[5] E. Tanenbaum, D. Weatherall, Computer Networks. 6th ed. St. Petersburg: Piter, 2023. 992 p.

[6] Kaspersky Lab. Modern Cyber Threat Landscapes: EDR, MDR, and XDR Solutions / Kaspersky Lab: official website. URL: https://www.kaspersky.ru/enterprise-security/endpoint-detection-response (accessed: 27.01.2026).

[7] V. F. Shan’gin, Computer Information Protection. Effective Methods and Tools. Moscow: DMK Press, 2020. 544 p.

[8] V. B. Kreindelin, N. A. Legkov, “Protecting Authentication Data for Websites and WEB Applications,” Telecommunications and Information Technology. 2022. Vol. 9, No. 1, pp. 6-10.

[9] V. G. Olifer, N. A. Olifer, Computer Networks. Principles, Technologies, Protocols: Textbook for Universities. St. Petersburg: Piter, 2020. 992 p. (in the context of network infrastructure security).

[10] V. B. Kreindelin, G. A. Vakhromeev, “The Most Effective Machine Learning Algorithms for Risk-Based Authentication Systems,” Telecommunications and Information Technology. 2024. Vol. 11, No. 1, pp. 87-92.

[11] M.G. Bakulin, T.B.C. Ben Rejeb, V.B. Kreyndelin, D.Y. Pankratov, A.E. Smirnov, “Code domain NOMA in 3GPP specifications: 5G or 6G?,” T-Comm. 2022. vol. 16, no.1, pр. 4-14. DOI: 10.36724/2072-8735-2022-16-1-4-14.