2IDENTIFICATION OF CYBER ATTACKS ON INFORMATION NETWORKS WITH A RANDOM MOMENT OF ITS APPEARANCE 2IDENTIFICATION OF CYBER ATTACKS ON INFORMATION NETWORKS WITH A RANDOM MOMENT OF ITS APPEARANCE