Informatics and Applications
2020, Volume 14, Issue 1, pp 71-79
MODELING OF MONITORING OF INFORMATION SECURITY PROCESS ON THE BASIS OF QUEUING SYSTEMS
- G. A. Popov
- S. Zh. Simavoryan
- A. R. Simonyan
- E. I. Ulitina
Abstract
The paper is devoted to the mathematical modeling of monitoring process by the information security systems, aimed at detection of hidden malicious attacks. The modeling is based on the queueing theory formalism. The monitoring process is reduced to the analysis of the customer flow arriving at the queueing system, in which each customer is regarded as carrying potential malicious attacks. Functional relations between the system state probability distribution and the distribution of the number of undetected malicious attacks on service completion epochs are obtained. These characteristics may allow one to improve the efficiency of malicious attacks detection process in the data processing systems.
[+] References (5)
- Grusho, A. A., N.A. Grusho, and E. E. Timonina. 2009. Metody zashchity informatsii ot atak s pomoshch'yu skry- tykh kanalov i vrazhdebnykh programmno-apparatnykh agentov v raspredelennykh sistemakh [Methods of infor-mation protection aganst covert channels attacks and ma-licious software/hardware agents in distributed systems]. Vestnik RGGU. Ser. Dokumentovedenie i arkhivovedenie. In-formatika. Zashchita informatsii i informatsionnaya bezopas- nost' [RGGU Bulletin. Informatics. Information security. Mathematician ser.] 10:33-45.
- Kopyrin, A. S., S.Zh. Simavoryan, A. R. Simonyan, and E. I. Ulitina. 2017. The methodology of risk analysis in assessing information security threats. Modeling Artificial Intelligence 4-2:78-85.
- Bazhayev, N. A., A. E. Davydov, I. E. Krivtsova, I. S. Lebedev, and K. I. Salakhutdinova. 2016. Podkhod k analizu so- stoyaniya informatsionnoy bezopasnosti besprovodnoy seti [Wireless security information analysis approach]. Priklad- naya informatika [J. Applied Informatics] 11(6(66)):121- 128.
- Kolyadenko Yu. Yu., and I. G. Lukinov. 2017. Model' raspredelennykhatak v programmno-konfiguriruemykh setyakh svyazi [Model of distributed attacks in program- configurable communication networks]. Vestnik YUUrGU. Ser. Komp'yuternye tekhnologii, upravleniye, radioelektroni- ka [Bulletin of SUSU. Computer technologies, automatic control, radioelectronics ser.] 17(3):34-43.
- Gnedenko, B.V., E.A. Danielyan, B.N. Dimitrov, G. P. Klimov, and V. F. Matveev 1973. Prioritetnyye sistemy massovogo obsluzhivaniya [Priority queues]. Moscow: MSU. 448p.
[+] About this article
Title
MODELING OF MONITORING OF INFORMATION SECURITY PROCESS ON THE BASIS OF QUEUING SYSTEMS
Journal
Informatics and Applications
2020, Volume 14, Issue 1, pp 71-79
Cover Date
2020-03-30
DOI
10.14357/19922264200110
Print ISSN
1992-2264
Publisher
Institute of Informatics Problems, Russian Academy of Sciences
Additional Links
Key words
protection of information; information security; queuing system; probability
Authors
G. A. Popov , S. Zh. Simavoryan , A. R. Simonyan , and E. I. Ulitina
Author Affiliations
Astrakhan State Technical University, 16 Tatischeva Str., Astrakhan 414056, Russian Federation
Sochi State University, 94 Plastunskaya Str., Sochi 354003, Russian Federation
|