ABSTRACT
In this paper1 is proposed a graph model, designed to solve security challenges of information systems (IS). The model allows to describe information systems at two levels. The first is the transport layer, represented by the graph, and the second is functional level, represented by the semantic network. Proposed model uses "subject-object" terms to establish a security policy. Based on the proposed model, one can define information system security features location, and choose their deployment in the best way. In addition, it is possible to observe data access control security features inadequacy and calculate security value for the each IS node. Novelty of this paper is that one can get numerical evaluation of IS security according to its nodes communications and network structure.
- Belyaeva O.V., Gritsyk V.A. Simulation modeling of information security systems // International Journal of Experimental Education. 2010, No5.Google Scholar
- Nesteruk F.G., Osovetskiy L.G., Nesteruk G.F., Voskresensky S.I. To the modeling of the adaptive information security system // Information Counteraction to Terrorism Threats. SFU publishing house. Taganrog. 2005. No3 p. 37--43.Google Scholar
- Domarev V.V. Modeling the processes of creating and evaluating the effectiveness of information security systems // available at http://citforum.ru/security/articles/model_proc/ 2016Google Scholar
- Moore A., Ellison R., Linger R. Attack Modeling for Information Security and Survivability //Software Engineering Institute, Technical Note CMU / SEI-2001-TN-01, March 2001.Google Scholar
- Camtepe S., Yener B. A Formal Method for Attack Modeling and Detection // available at Http://cs.rpi.edu/research/pdf/06-01.pdf.Google Scholar
- Jajodia S., Noel S. Managing Attack Graph Complexity Through Visual Hierarchical Aggregation // In the 1st International Workshop on Visualization and Data Mining for Computer Security, Washington, DC, USA. - October 2004. - P. 109 -- 118. Google ScholarDigital Library
- Siljak D.D. Dynamic Graphs // The International Conference on Hybrid Systems and Applications.-2006.-P. 110--141.Google Scholar
- Zegzhda, P.D., Zegzhda, D.P., Stepanova, T. V. Approach to the construction of the generalized functional-semantic cyber security model // Automatic Control and Computer Sciences Volume 49, Issue 8, 1 December 2015, Pages 627--633Google ScholarCross Ref
- Zegzhda D.P., Zegzhda P.D. Methodology of dynamic protection. Materials of the International Scientific and Practical Conference on Security and Counter-Terrorism // The Intellectual Center of Moscow State University. 2-3 November 2005 - M.: MIIHMO, 2006 p. - 480c.Google Scholar
- Pechenkin A. Functional - semantic modeling of information systems for safety tasks // proceedings of the 25 scientific and technical conference "Methods and technical tools of information security", St. Petersburg: publishing house of Polytechnical Institute. University press, 2016 P. 29--31Google Scholar
Index Terms
- Modeling of information systems to their security evaluation
Recommendations
Capturing industry experience for an effective information security assessment
An Information System (IS) security programme consists of several essential security controls. In order to verify and maintain the effectiveness of an IS security programme, it is pertinent to identify how security controls are compared to each other in ...
Redefining information systems security: viable information systems
Sec '01: Proceedings of the 16th international conference on Information security: Trusted information: the new decade challengeResearch on Information Security has been based on a well-established definition of the subject. Consequently, it has delivered a plethora of methods, techniques, mechanisms and tools to protect the so-called security attributes (i.e. availability, ...
Employees' adherence to information security policies: An exploratory field study
The key threat to information security comes from employees who do not comply with information security policies. We developed a new multi-theory based model that explained employees' adherence to security policies. The paradigm combines elements from ...
Comments