Informatics and Applications
2018, Volume 12, Issue 4, pp 39-43
METHODS OF IDENTIFICATION OF HOST CAPTURE IN A DISTRIBUTED INFORMATION SYSTEM WHICH IS PROTECTED ON THE BASIS OF META DATA
- A. A. Grusho
- N. A. Grusho
- M. V. Levykin
- E. E. Timonina
Abstract
The model of a distributed information system in which permissions on network connections are based on meta data is considered. Meta data are simplification of business process models. It is proved that the adversary of information security who captured a host and accurately attacked a system by means of changes of output data of tasks solved on this host cannot be detected at the level of meta data. The problem is connected with the fact that a business process model and, therefore, meta data operate with variables for which changes of specific values are not reflected in their description. Exceptions are output cases on forbidden values, for example, out of limits of definition ranges and a set of values of functions of which information technologies are constructed. Additional variants of information security measures which consider "invisibility" of similar violations of information security at the level of meta data are suggested.
[+] References (9)
- Grusho, A., N. Grusho, M. Zabezhailo, A. Zatsarinny, and E. Timonina. 2017. Information security of SDN on the basis of meta data. Computer network security. Eds. J. Rak, J. Bay, I. V. Kotenko, et al. Lecture notes in computer science ser. Springer. 10446:339-347. Available at: https://link.springer.com/chapter/10.1007/978- 3-319-65127-9_27 (September 23, 2018).
- Grusho, A. A., E. E. Timonina, and S.Ya. Shorgin.
2017. Modelling for ensuring information security
of the distributed information systems. 31th European Conference on Modelling and Simulation Proceedings. Dudweiler, Germany: Digitaldruck Pirrot GmbHP. 656-660. Available at: http://www.scs- europe.net/dlib/2017/ecms2017acceptedpapers/0656- probstat_ECMS2017_0026.pdf (accessed September 23, 2018).
- Grusho, A. A., E. E. Timonina, and S.Ya. Shorgin. 2018. Ierarkhicheskiy metod porozhdeniya metadannykh dlya upravleniya setevymi soedineniyami [Hierarchical method of meta data generation for control of network connections]. Informatika i ee Primeneniya - Inform. Appl. 12(2):44-49.
- Samuylov, K. E., A. V. Chukarin, and N. V. Yarkina. 2009. Biznes-protsessy i informatsionnye tekhnologii v upravlenii telekommunikatsionnymi kompaniyami [Business processes and information technologies in management of the telecommunication companies]. Moscow: Alpina Pabls. 442 p.
- Grusho, A., E. Timonina, and S. Shorgin. 2017. Security models based on stochastic meta data. Analytical and computational methods in theory probability. Eds. V. Rykov, N. Singpurwalla, and A. Zubkov. Lecture notes in computer science ser. Springer. 10684:388-400. Available at: https://link.springer.com/chapter/10.1007/978- 3-319-71504-9_32 (accessed September 23, 2018).
- Grusho, A., and E. Timonina. 2011. Prohibitions in discrete probabilistic statistical problems. Discrete Mathematics Applications 21(3):275-281.
- Grusho, A. A., N.A. Grusho, and E. E. Timonina. 2013.
Statisticheskie metody opredeleniya zapretov veroyatnostnykh mer na diskretnykh prostranstvakh [Statistical methods of definition of the bans of probability measures on
discrete spaces]. Informatika i ee Primeneniya - Inform. Appl. 7(1):54-57.
- Grusho, A., N. Grusho, and E. Timonina. 2016. Detection of anomalies in non-numerical data. 8th Congress
(International) on Ultra Modern Telecommunications and
Control Systems and Workshops Proceedings. Piscataway
NJ: IEEE. 273-276. Available at: https://ieeexplore.ieee.
org/document/7765370/ (accessed September 23, 2018).
- Grusho, A., N. Grusho, M. Zabezhailo, and E. Timonina. 2018. Zashchita tsennoy informatsii v informatsionnykh tekhnologiyakh [Protection of valuable information in
information technologies]. Information Security Problems.
Computer Systems 2:22-26.
[+] About this article
Title
METHODS OF IDENTIFICATION OF HOST CAPTURE IN A DISTRIBUTED INFORMATION SYSTEM WHICH IS PROTECTED ON THE BASIS OF META DATA
Journal
Informatics and Applications
2018, Volume 12, Issue 4, pp 39-43
Cover Date
2018-12-30
DOI
10.14357/19922264180406
Print ISSN
1992-2264
Publisher
Institute of Informatics Problems, Russian Academy of Sciences
Additional Links
Key words
information security; information technologies; distributed information system; meta data; ban; threat of host capture
Authors
A. A. Grusho , N. A. Grusho , M. V. Levykin , and E. E. Timonina
Author Affiliations
Institute of Informatics Problems, Federal Research Center "Computer Science and Control" of the Russian Academy of Sciences, 44-2 Vavilov Str., Moscow 119333, Russian Federation
|