Skip to main content
Top
Published in: Automatic Control and Computer Sciences 8/2020

01-12-2020

Multilevel Model of Computer Attack Based on Attributive Metagraphs

Published in: Automatic Control and Computer Sciences | Issue 8/2020

Login to get access

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Approaches to recognition of malicious behavior in computer networks and security evaluation of information systems using attributive metagraphs have been considered. Matrices of techniques, tactics, and methods of computer attacks for their simulation have been suggested.
Literature
1.
go back to reference The Decree of the Government of the Russian Federation of May 11, 2017 No. 555 “On Amending the Requirements for the Creation, Development, Commissioning, Operation, and Decommissioning of State Information Systems and Further Storage of Information Contained in Their Databases.” https://www.rulaws.ru/goverment/Postanovlenie-Pravitelstva-RF-ot-11.05.2017-N-555/. The Decree of the Government of the Russian Federation of May 11, 2017 No. 555 “On Amending the Requirements for the Creation, Development, Commissioning, Operation, and Decommissioning of State Information Systems and Further Storage of Information Contained in Their Databases.” https://​www.​rulaws.​ru/​goverment/​Postanovlenie-Pravitelstva-RF-ot-11.​05.​2017-N-555/​.​
2.
go back to reference Metodika opredeleniya ugroz bezopasnosti v informatsionnykh sistemakh (Methodology for Determining Security Threats in Information Systems), Moscow: FSTEK, 2015. Metodika opredeleniya ugroz bezopasnosti v informatsionnykh sistemakh (Methodology for Determining Security Threats in Information Systems), Moscow: FSTEK, 2015.
3.
go back to reference Novokhrestov, A.K. and Konev, A.A., Assessment of the security quality of computer networks, Din. Sist. Mekh. Mash., 2014, no. 4, pp. 85–87. Novokhrestov, A.K. and Konev, A.A., Assessment of the security quality of computer networks, Din. Sist. Mekh. Mash., 2014, no. 4, pp. 85–87.
4.
go back to reference Gorodetskii, V.I. and Karasev, O.V., Applied multi-agent systems of group control, Iskustv. Intell. Prinyatie Reshenii, 2009, no. 2, pp. 3–24. Gorodetskii, V.I. and Karasev, O.V., Applied multi-agent systems of group control, Iskustv. Intell. Prinyatie Reshenii, 2009, no. 2, pp. 3–24.
5.
go back to reference Zegzhda, D.P., Stepanova, T.V., and Suprun, A.F., Multiagent system controllability evaluation using the multilevel structure of the graph of agent, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 809–812.CrossRef Zegzhda, D.P., Stepanova, T.V., and Suprun, A.F., Multiagent system controllability evaluation using the multilevel structure of the graph of agent, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 809–812.CrossRef
6.
go back to reference Kotenko, I.V. and Saenko, I.B., Architecture of the system of intelligent information protection services in critical infrastructures, Tr. SPIIRAN, 2013, no. 24, pp. 21–40. Kotenko, I.V. and Saenko, I.B., Architecture of the system of intelligent information protection services in critical infrastructures, Tr. SPIIRAN, 2013, no. 24, pp. 21–40.
7.
go back to reference Kalinin, M.O., Krundyshev, V.M., Rezedinova, E.Y., and Reshetov, D.V., Hierarchical software-defined security management for large-scale dynamic networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 906–911.CrossRef Kalinin, M.O., Krundyshev, V.M., Rezedinova, E.Y., and Reshetov, D.V., Hierarchical software-defined security management for large-scale dynamic networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 906–911.CrossRef
8.
go back to reference Gorbachev, I.E., Sukhov, A.M., Eremeev, M.A., and Smirnov, S.I., Methodology for implementing a systematic approach in creating the image of the information security system of critical information infrastructure, taking into account economic feasibility, Probl. Inf. Bezop., Komp’yut. Sist., 2018, no. 2, pp. 93–111. Gorbachev, I.E., Sukhov, A.M., Eremeev, M.A., and Smirnov, S.I., Methodology for implementing a systematic approach in creating the image of the information security system of critical information infrastructure, taking into account economic feasibility, Probl. Inf. Bezop., Komp’yut. Sist., 2018, no. 2, pp. 93–111.
9.
go back to reference Konev, A.A. and Davydova, E.M., An approach to the description of the structure of the information security system, Dokl. TUSUR, 2013, vol. 28, no. 2, pp. 107–111. Konev, A.A. and Davydova, E.M., An approach to the description of the structure of the information security system, Dokl. TUSUR, 2013, vol. 28, no. 2, pp. 107–111.
11.
go back to reference Zegzhda, P.D. and Kalinin, M.O., Automatic security management of computer systems, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 665–672.CrossRef Zegzhda, P.D. and Kalinin, M.O., Automatic security management of computer systems, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 665–672.CrossRef
12.
go back to reference Zegzhda, D.P., Zegzhda, P.D., and Kalinin, M.O., Clarifying integrity control at the trusted information environment, Lect. Notes Comput. Sci., 2010, vol. 6258. Zegzhda, D.P., Zegzhda, P.D., and Kalinin, M.O., Clarifying integrity control at the trusted information environment, Lect. Notes Comput. Sci., 2010, vol. 6258.
13.
go back to reference Pavlenko, E., Zegzhda, D., and Shtyrkina, A., Criterion of cyber-physical systems sustainability, CEUR Workshop Proc., 2019, vol. 2603, pp. 60–64. Pavlenko, E., Zegzhda, D., and Shtyrkina, A., Criterion of cyber-physical systems sustainability, CEUR Workshop Proc., 2019, vol. 2603, pp. 60–64.
14.
go back to reference Pavlenko, E. and Zegzhda, D., Sustainability of cyber-physical systems in the context of targeted destructive influences, IEEE Industrial Cyber-Physical Systems, 2018, pp. 830–834.CrossRef Pavlenko, E. and Zegzhda, D., Sustainability of cyber-physical systems in the context of targeted destructive influences, IEEE Industrial Cyber-Physical Systems, 2018, pp. 830–834.CrossRef
15.
go back to reference Konev, A.A., An approach to building a model of threats to protected information, Dokl. TUSUR, 2012, vol. 25, no. 1, pp. 34–39. Konev, A.A., An approach to building a model of threats to protected information, Dokl. TUSUR, 2012, vol. 25, no. 1, pp. 34–39.
16.
go back to reference Mallon, S., Strategic Cybersecurity Leader & Executive Consultant, at Black Hat 2016: Extended Cyber Kill Chain. https://www.blackhat.com/docs/us-16/materials/us-16-Malone-Using-An-Expanded-Cyber-Kill-Chain-Model-To-Increase-Attack-Resiliency.pdf. Accessed May 19, 2020. Mallon, S., Strategic Cybersecurity Leader & Executive Consultant, at Black Hat 2016: Extended Cyber Kill Chain. https://​www.​blackhat.​com/​docs/​us-16/​materials/​us-16-Malone-Using-An-Expanded-Cyber-Kill-Chain-Model-To-Increase-Attack-Resiliency.​pdf.​ Accessed May 19, 2020.
17.
go back to reference Mesarovic, M., Macko, D., and Takahara, Y., Theory of Hierarchical, Multilevel, Systems, Elsevier, 2000.MATH Mesarovic, M., Macko, D., and Takahara, Y., Theory of Hierarchical, Multilevel, Systems, Elsevier, 2000.MATH
18.
go back to reference Astanin, S.V., Dragnysh, N.V., and Zhukovskaya, N.K., Nested metagraphs as models of complex objects. http://ivdon.ru/magazine/archive/n4p2y2012/1434. Accessed May 19, 2020. Astanin, S.V., Dragnysh, N.V., and Zhukovskaya, N.K., Nested metagraphs as models of complex objects. http://​ivdon.​ru/​magazine/​archive/​n4p2y2012/​1434.​ Accessed May 19, 2020.
Metadata
Title
Multilevel Model of Computer Attack Based on Attributive Metagraphs
Publication date
01-12-2020
Published in
Automatic Control and Computer Sciences / Issue 8/2020
Print ISSN: 0146-4116
Electronic ISSN: 1558-108X
DOI
https://doi.org/10.3103/S0146411620080192

Other articles of this Issue 8/2020

Automatic Control and Computer Sciences 8/2020 Go to the issue