RISK MINIMIZATION MODEL FOR INFORMATION SECURITY SYSTEMS WITH COST CONSTRAINTS

Author(s):  
Olga Nikolaevna Yarkova ◽  
◽  
Anastasiya Sergeevna Yarkova ◽  

The paper presents a model of nonlinear programming that allows us to determine the optimal distribution of costs for improving the protective properties of a multi-level information security system that minimizes the risk of unauthorized access to data for a system described by the Markov model. A study of the protective properties depending on the allocated investments of the system was carried out.

2019 ◽  
Vol 18 (6) ◽  
pp. 1301-1332 ◽  
Author(s):  
Oksana Bokova ◽  
Irina Drovnikova ◽  
Andrei Etepnev ◽  
Evgeniy Rogozin ◽  
Victor Khvostov

Modern methods of protecting information  from unauthorized access in automated systems are based on the use of specialized information security systems from unauthorized access. Security systems are necessarily included in the form of additional software systems in the software as in a secure execution. Information security systems from unauthorized access can be developed not only in a process of automated systems design, but also complement the system-wide software of functioning systems. The use of the information security systems from unauthorized access can reduce a overall reliability of the automated systems, if they contain errors that are not detected during debugging. The reliability of the information security systems affects effectiveness of information security (confidentiality, integrity and availability). Guidelines of the Federal Service for Technical and Export Control (FSTEC) of Russia are a methodological basis for the formation of the information security systems’ image both in the process of development and in the process of modernization of the automated systems. The guidance documents of FSTEC of Russia do not contain methodological approaches to assessing the reliability of these program systems. In this regard, the actual design of techniques of estimating reliability of the information security systems from unauthorized access in automated systems in a secure execution. The structural complexity of the information security systems from unauthorized access and large number of functions performed necessitates the use of three reliability indicators that characterize the system in solving problems of confidentiality, integrity and availability of information. To develop the technique, the known methods of evaluating the reliability of complex systems are used, which do not allow their decomposition into serial and parallel connection. The developed methods were tested in assessing the reliability of the information security systems from unauthorized access with typical indicators of initial characteristics. The results of calculations and prospects of using the developed methods are presented in the paper.


Author(s):  
Ольга Николаевна Яркова ◽  
Анастасия Сергеевна Яркова ◽  
Алена Владимировна Труфанова

В работе предложен алгоритм формирования стратегии распределения инвестиций на улучшение защитных свойств системы по уровням доступа, обеспечивающей, при выделенных финансовых средствах, наилучший уровень надежности многоуровневой системы защиты информации в целом. In this article, we propose an algorithm for forming a strategy for allocating investments to improve the security properties of the system by access levels, which provides the best level of reliability of a multi-level information security system as a whole with allocated financial resources.


Author(s):  
Wei-Sheng Liu ◽  
shanshan zhao ◽  
Zhenbin Wang ◽  
Yuanying Lin ◽  
Bin Yu

Nowadays, with the development of technology, the safely performance of traditional single- or dual-mode luminescent materials used for anti-counterfeiting has been significantly reduced due to their single and predictable readout...


2017 ◽  
Vol 5 (1) ◽  
pp. 8-15
Author(s):  
Sergii Hilgurt ◽  

The multi-pattern matching is a fundamental technique found in applications like a network intrusion detection system, anti-virus, anti-worms and other signature- based information security tools. Due to rising traffic rates, increasing number and sophistication of attacks and the collapse of Moore’s law, traditional software solutions can no longer keep up. Therefore, hardware approaches are frequently being used by developers to accelerate pattern matching. Reconfigurable FPGA-based devices, providing the flexibility of software and the near-ASIC performance, have become increasingly popular for this purpose. Hence, increasing the efficiency of reconfigurable information security tools is a scientific issue now. Many different approaches to constructing hardware matching circuits on FPGAs are known. The most widely used of them are based on discrete comparators, hash-functions and finite automata. Each approach possesses its own pros and cons. None of them still became the leading one. In this paper, a method to combine several different approaches to enforce their advantages has been developed. An analytical technique to quickly advance estimate the resource costs of each matching scheme without need to compile FPGA project has been proposed. It allows to apply optimization procedures to near-optimally split the set of pattern between different approaches in acceptable time.


Author(s):  
Xiaoqi Lu ◽  
Yu Gu ◽  
Lidong Yang ◽  
Baohua Zhang ◽  
Ying Zhao ◽  
...  

Objective: False-positive nodule reduction is a crucial part of a computer-aided detection (CADe) system, which assists radiologists in accurate lung nodule detection. In this research, a novel scheme using multi-level 3D DenseNet framework is proposed to implement false-positive nodule reduction task. Methods: Multi-level 3D DenseNet models were extended to differentiate lung nodules from falsepositive nodules. First, different models were fed with 3D cubes with different sizes for encoding multi-level contextual information to meet the challenges of the large variations of lung nodules. In addition, image rotation and flipping were utilized to upsample positive samples which consisted of a positive sample set. Furthermore, the 3D DenseNets were designed to keep low-level information of nodules, as densely connected structures in DenseNet can reuse features of lung nodules and then boost feature propagation. Finally, the optimal weighted linear combination of all model scores obtained the best classification result in this research. Results: The proposed method was evaluated with LUNA16 dataset which contained 888 thin-slice CT scans. The performance was validated via 10-fold cross-validation. Both the Free-response Receiver Operating Characteristic (FROC) curve and the Competition Performance Metric (CPM) score show that the proposed scheme can achieve a satisfactory detection performance in the falsepositive reduction track of the LUNA16 challenge. Conclusion: The result shows that the proposed scheme can be significant for false-positive nodule reduction task.


2021 ◽  
Author(s):  
Larisa K. Ptitsyna ◽  
Anastasia O. Zharanova ◽  
Mikhail P. Belov ◽  
Aleksey V. Ptitsyn

Sign in / Sign up

Export Citation Format

Share Document