|
This article is cited in 1 scientific paper (total in 1 paper)
Methods of identification of “weak” signs of violations of information security
N. A. Grusho Institute of Informatics Problems, Federal Research Center "Computer Sciences and Control" of the Russian Academy of Sciences; 44-2 Vavilov Str., Moscow 119133,
Russian Federation
Abstract:
To ensure information security of information technologies in distributed information
computing systems, a metadata mechanism implementing a permit system for establishing connections
in a network has previously been proposed. If a host is captured by an adversary, there is a strategy for
organizing attacks that are not detected at the traditional metadata level. A number of errors in data
that can be generated by an adversary during the implementation of information technology require the
construction of cause-and-effect chains preceding the error in order to identify the cause of the error.
At the same time, metadata implement a simplified model of cause-and-effect relations when solving
problems during implementation of information technology. This model can be used to find the
specified errors.
The author constructs a synergistic relationship between the solution of the mentioned problem of
information security and the work of an experienced system administrator to determine the causes of
implicit errors. This relationship allows leveraging the expertise of system administrators to make it
easier to find a captured host and some strategies of an adversary to incorporate errors into the
implementation of information technology. It also minimizes
network reconfiguration requirements to
bypass the captured host.
Keywords:
information security, metadata, cause-and-effect relationships, system administration, implicit failures and errors.
Received: 15.08.2019
Citation:
N. A. Grusho, “Methods of identification of “weak” signs of violations of information security”, Sistemy i Sredstva Inform., 29:3 (2019), 194–201
Linking options:
https://www.mathnet.ru/eng/ssi666 https://www.mathnet.ru/eng/ssi/v29/i3/p194
|
Statistics & downloads: |
Abstract page: | 154 | Full-text PDF : | 31 | References: | 26 |
|