Vestnik of Astrakhan State Technical University. Series: Management, Computer Sciences and Informatics
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Vestnik of Astrakhan State Technical University. Series: Management, Computer Sciences and Informatics, 2020, Number 2, Pages 34–44
DOI: https://doi.org/10.24143/2072-9502-2020-2-34-44
(Mi vagtu624)
 

COMPUTER SOFTWARE AND COMPUTING EQUIPMENT

Analysis of time of committing nearest malicious attack in information security system using apparatus of rare regenerating processes

G. A. Popov, E. A. Popova

Astrakhan State Technical University, Astrakhan, Russian Federation
References:
Abstract: The paper analyzes the model that describes the process of attacking the protected object, where closed information is stored, the model built on the basis of the apparatus of regenerating sequences of the successful completion of malicious attacks. The moments of the attacks are considered in detail. It is assumed that attacks originating from a single source are rare enough, have an isolated singled character and are quite distant in time, that is, the event of a successful attack is a rare event, but the losses upon its successful completion can be huge. For the studied characteristic there is chosen a nearest moment when the next attack is successful: this characteristic is very important with relation to the information security. Knowing the parameters of this characteristic will help, at appropriate time intervals, to take additional actions that increase the level of protection. Studies are conducted under the assumption that all characteristics of the model are heterogeneous, which more adequately corresponds to the real state in information security systems. There has been obtained an asymptotic relation for the moment of the next successful malicious attack under conditions when the time interval for analyzing the attack is constantly rising and the probability of attack is becoming less common, both values changing consistently.
Keywords: information security, protected object, moment of nearest successful attack, regenerative processes, rare events.
Received: 24.12.2019
Document Type: Article
UDC: 519.233.22
Language: Russian
Citation: G. A. Popov, E. A. Popova, “Analysis of time of committing nearest malicious attack in information security system using apparatus of rare regenerating processes”, Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2020, no. 2, 34–44
Citation in format AMSBIB
\Bibitem{PopPop20}
\by G.~A.~Popov, E.~A.~Popova
\paper Analysis of time of committing nearest malicious attack in information security system using apparatus of rare regenerating processes
\jour Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics
\yr 2020
\issue 2
\pages 34--44
\mathnet{http://mi.mathnet.ru/vagtu624}
\crossref{https://doi.org/10.24143/2072-9502-2020-2-34-44}
Linking options:
  • https://www.mathnet.ru/eng/vagtu624
  • https://www.mathnet.ru/eng/vagtu/y2020/i2/p34
  • Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Вестник Астраханского государственного технического университета. Серия: Управление, вычислительная техника и информатика
    Statistics & downloads:
    Abstract page:60
    Full-text PDF :22
    References:15
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024