Method of Detection and Elimination of Tracks of Attacks in the Information System | IEEE Conference Publication | IEEE Xplore