scholarly journals MATHEMATICAL MODEL OF INFORMATION SECURITY’S THEAT AGENT

Author(s):  
Yury Shcheblanin ◽  
Dmytro Rabchun

To provide information security in automated control systems, the construction of an effective system of information security, it was not enough to identify channels of information leakage, to analyze the possible threats, the consequences of their implementation and estimate the losses. It is necessary to imagine an offender even better. An offender model is one of the most important components of a possible scenario for unlawful actions on access to information. The existence of such a model of a security breach, which is constantly corrected on the basis of obtaining new knowledge about the possibilities of the offender and changes in the security system, based on an analysis of the causes of violations, will allow themselves to affect these reasons, as well as more precisely define the requirements for the information security system from this type of violations. Correctly constructed model of the violator of information security, (adequate to reality), which reflects his practical and theoretical capabilities, a priori knowledge, time and place of action, etc. characteristics are an important part of a successful risk analysis and the definition of requirements for the composition and characteristics of the protection system. The difficulties of mathematical modeling in the study of information confrontation, which are conditioned, on the one hand, by the uncertainty of the opponent’s actions, and on the other, the complexity of creating a conditional image, which in the largest degree corresponds to the branched protective structure, is considered in the paper. When creating a mathematical model one of the main tasks is to determine the parameters and characteristics that form the target function. The consideration of this task is devoted to this work. A model is considered in which the target function determines the proportion of information lost during an attack and is expressed through the dynamic vulnerability of the system, which depends on the ratio of attacks and protection resources, as well as on the likelihood of the implementation of such a relationship. The form of these dependencies is considered. The vulnerability is expressed by the fractional-power function in which the degree of power is determined by the nature of the information system and its structure. The density of probability of allocating an attack of resources with a given number of defense resources is given by a two-parameter distribution law. By selecting the indicators in both dependencies, it is possible to reach their maximum approximation to the statistical curves and eventually to form an explicit form of the target function.

Author(s):  
A. B. Lachikhina ◽  
A. A. Petrakov

The paper considers the information resources protection assessing in the information security management in an industrial enterprise. The main aspects of information security as a process are given. It is proposed to use data integrity as a criterion for resources security assessing of the corporate information system, defined as the probability of a possible violation of the integrity in the corresponding process of processing information. The groups of technological operations related to the process of information processing are considered. An approximate set of probabilities of possible events that contribute to maintaining data integrity is given. For the mathematical formulation of the problem, each of the events is considered as an alternative with a given optimization criterion. The introduction of a target function for a variety of alternatives allows you to select the best one and determine the cause of the integrity violation. The dependence of the total probability of integrity violation on a priori probability distribution is noted.


2019 ◽  
Vol 6 (1) ◽  
pp. 115-121
Author(s):  
Anastasiya Goldobina ◽  
Valentin Selifanov

Protection components of state information system represent the uniform mechanism capable to protect confidential information. If one of protection elements does not work effectively, it will become a problem for the entire information security system. Public information systems need to take into account all available ways to prevent information leakage, for this, operators should evaluate the efficiency. This article proposes possible solutions of the problem.


Author(s):  
Iurii I. Sineshchuk ◽  
◽  
Tatiana I. Davydova ◽  

Finding the optimal structure of an information security system is an important task complicated by its uncertain, stochastic and nonlinear nature especially, if resources are constrained. The article considers a mathematical model for determining the cost of damage prevented by information security tools, and the cost of their installation and maintenance. The optimization criterion is the minimum cost of the damage prevented. Task variables are the number of different types of security features installed in the security system. The authors propose a methodology to substantiate rational composition of information security tools, taking into account economic constraints.


Author(s):  
Bogdan Korniyenko ◽  
Lilia Galata

In this article, the research of information system protection by ana­ ly­ zing the risks for identifying threats for information security is considered. Information risk analysis is periodically conducted to identify information security threats and test the information security system. Currently, various information risk analysis techni­ ques exist and are being used, the main difference being the quantitative or qualitative risk assessment scales. On the basis of the existing methods of testing and evaluation of the vulnerabilities for the automated system, their advantages and disadvantages, for the possibility of further comparison of the spent resources and the security of the information system, the conclusion was made regarding the deter­ mi­ nation of the optimal method of testing the information security system in the context of the simulated polygon for the protection of critical information resources. A simula­ tion ground for the protection of critical information resources based on GNS3 application software has been developed and implemented. Among the considered methods of testing and risk analysis of the automated system, the optimal iRisk methodology was identified for testing the information security system on the basis of the simulated. The quantitative method Risk for security estimation is considered. Generalized iRisk risk assessment is calculated taking into account the following parameters: Vulnerabili­ ty  — vulnerability assessment, Threat — threat assessment, Control — assessment of security measures. The methodology includes a common CVSS vul­ nerability assessment system, which allows you to use constantly relevant coefficients for the calculation of vulnerabilities, as well as have a list of all major vulnerabilities that are associated with all modern software products that can be used in the automated system. The known software and hardware vulnerabilities of the ground are considered and the resistance of the built network to specific threats by the iRisk method is calculated.


2021 ◽  
Vol 2021 (4) ◽  
Author(s):  
Luke Corcoran ◽  
Florian Loebbert ◽  
Julian Miczajka ◽  
Matthias Staudacher

Abstract We extend the recently developed Yangian bootstrap for Feynman integrals to Minkowski space, focusing on the case of the one-loop box integral. The space of Yangian invariants is spanned by the Bloch-Wigner function and its discontinuities. Using only input from symmetries, we constrain the functional form of the box integral in all 64 kinematic regions up to twelve (out of a priori 256) undetermined constants. These need to be fixed by other means. We do this explicitly, employing two alternative methods. This results in a novel compact formula for the box integral valid in all kinematic regions of Minkowski space.


2020 ◽  
Vol 2020 (8) ◽  
Author(s):  
I. L. Buchbinder ◽  
E. A. Ivanov ◽  
B. S. Merzlikin ◽  
K. V. Stepanyantz

Abstract We apply the harmonic superspace approach for calculating the divergent part of the one-loop effective action of renormalizable 6D, $$ \mathcal{N} $$ N = (1, 0) supersymmetric higher-derivative gauge theory with a dimensionless coupling constant. Our consideration uses the background superfield method allowing to carry out the analysis of the effective action in a manifestly gauge covariant and $$ \mathcal{N} $$ N = (1, 0) supersymmetric way. We exploit the regularization by dimensional reduction, in which the divergences are absorbed into a renormalization of the coupling constant. Having the expression for the one-loop divergences, we calculate the relevant β-function. Its sign is specified by the overall sign of the classical action which in higher-derivative theories is not fixed a priori. The result agrees with the earlier calculations in the component approach. The superfield calculation is simpler and provides possibilities for various generalizations.


Sign in / Sign up

Export Citation Format

Share Document