Architecture of consecutive identification of attack to information resourcesдоклад на конференции