skip to main content
10.1145/3136825.3136857acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
extended-abstract

Modeling of information systems to their security evaluation

Authors Info & Claims
Published:13 October 2017Publication History

ABSTRACT

In this paper1 is proposed a graph model, designed to solve security challenges of information systems (IS). The model allows to describe information systems at two levels. The first is the transport layer, represented by the graph, and the second is functional level, represented by the semantic network. Proposed model uses "subject-object" terms to establish a security policy. Based on the proposed model, one can define information system security features location, and choose their deployment in the best way. In addition, it is possible to observe data access control security features inadequacy and calculate security value for the each IS node. Novelty of this paper is that one can get numerical evaluation of IS security according to its nodes communications and network structure.

References

  1. Belyaeva O.V., Gritsyk V.A. Simulation modeling of information security systems // International Journal of Experimental Education. 2010, No5.Google ScholarGoogle Scholar
  2. Nesteruk F.G., Osovetskiy L.G., Nesteruk G.F., Voskresensky S.I. To the modeling of the adaptive information security system // Information Counteraction to Terrorism Threats. SFU publishing house. Taganrog. 2005. No3 p. 37--43.Google ScholarGoogle Scholar
  3. Domarev V.V. Modeling the processes of creating and evaluating the effectiveness of information security systems // available at http://citforum.ru/security/articles/model_proc/ 2016Google ScholarGoogle Scholar
  4. Moore A., Ellison R., Linger R. Attack Modeling for Information Security and Survivability //Software Engineering Institute, Technical Note CMU / SEI-2001-TN-01, March 2001.Google ScholarGoogle Scholar
  5. Camtepe S., Yener B. A Formal Method for Attack Modeling and Detection // available at Http://cs.rpi.edu/research/pdf/06-01.pdf.Google ScholarGoogle Scholar
  6. Jajodia S., Noel S. Managing Attack Graph Complexity Through Visual Hierarchical Aggregation // In the 1st International Workshop on Visualization and Data Mining for Computer Security, Washington, DC, USA. - October 2004. - P. 109 -- 118. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Siljak D.D. Dynamic Graphs // The International Conference on Hybrid Systems and Applications.-2006.-P. 110--141.Google ScholarGoogle Scholar
  8. Zegzhda, P.D., Zegzhda, D.P., Stepanova, T. V. Approach to the construction of the generalized functional-semantic cyber security model // Automatic Control and Computer Sciences Volume 49, Issue 8, 1 December 2015, Pages 627--633Google ScholarGoogle ScholarCross RefCross Ref
  9. Zegzhda D.P., Zegzhda P.D. Methodology of dynamic protection. Materials of the International Scientific and Practical Conference on Security and Counter-Terrorism // The Intellectual Center of Moscow State University. 2-3 November 2005 - M.: MIIHMO, 2006 p. - 480c.Google ScholarGoogle Scholar
  10. Pechenkin A. Functional - semantic modeling of information systems for safety tasks // proceedings of the 25 scientific and technical conference "Methods and technical tools of information security", St. Petersburg: publishing house of Polytechnical Institute. University press, 2016 P. 29--31Google ScholarGoogle Scholar

Index Terms

  1. Modeling of information systems to their security evaluation

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader