They are considered methods of protection of the telecommunication systems and networks from action of bad software, in particular, are analysed methods of the finding the invasions, founded on use the signature analysis and methods proactive protection. It is shown by that the most perspective direction in development of the methods of protection of the telecommunication systems and networks from action of bad software is an using proactive technology, building on their base of the network systems of the finding and preventions of the invasions.
telecommunication systems and network, system of the revealing the invasions
"Metody obnaruzheniia vredonosnogo programmnogo obespecheniia v telekommunikatsionnykh sistemakh i setiakh" ,
Information Processing Systems,