Systems and Means of Informatics
2019, Volume 29, Issue 3, pp 194-201
METHODS OF IDENTIFICATION OF "WEAK" SIGNS OF VIOLATIONS OF INFORMATION SECURITY
Abstract
To ensure information security of information technologies in distributed information computing systems, a metadata mechanism implementing a permit system for establishing connections in a network has previously been proposed. If a host is captured by an adversary, there is a strategy for organizing attacks that are not detected at the traditional metadata level. A number of errors in data that can be generated by an adversary during the implementation of infor-mation technology require the construction of cause-and-effect chains preceding the error in order to identify the cause of the error. At the same time, metadata implement a simplified model of cause-and-effect relations when solving problems during implementation of information technology. This model can be used to find the specified errors. The author constructs a synergistic relationship between the solution of the mentioned problem of information security and the work of an experienced system administrator to determine the causes of implicit errors. This relationship allows leveraging the expertise of system administrators to make it easier to find a captured host and some strategies of an adversary to incorporate errors into the implementation of information technology. It also minimizes network reconfiguration requirements to bypass the captured host.
[+] References (7)
- Grusho, A. A., E.E. Timonina, and S.Ya. Shorgin. 2017. Modelling for ensuring information security of the distributed information systems. 31st European Conference on Modelling and Simulation Proceedings. Digitaldruck Pirrot GmbHP Dudweiler, Germany. 656-660. Available at: http://www.scs-europe.net/ dlib/2017/ecms2017accepted papers/0656- probstat_ECMS2017_0026.pdf (accessed August 16, 2019).
- Grusho, A., N. Grusho, M. Zabezhailo, A. Zatsarinny, and E. Timonina. 2017. Information security of SDN on the basis of metadata. Computer network security. Eds. J. Rak, J. Bay, I. V. Kotenko, et al. Lecture notes in computer science ser. Springer. 10446:339-347. Available at: https://link.springer.com/chapter/10.1007/978-3-319- 65127-9_27 (accessed August 16, 2019).
- Grusho, A. A., E. E. Timonina, and S. Ya. Shorgin. 2018. Ierarkhicheskiy metodporozh- deniya metadannykh dlya upravleniya setevymi soedineniyami [Hierarchical method of meta data generation for control of network connections]. Informatika i ee Prime- neniya - Inform. Appl. 12(2):44-49.
- Grusho, A., E. Timonina, and S. Shorgin. 2017. Security models based on stochastic metadata. Analytical and computational methods in theory probability. Eds. V. Rykov, N. Singpurwalla, and A. Zubkov. Lecture notes in computer science ser. Springer. 10684:388-400. Available at: https://link.springer.com/chapter/10.1007/978-3-319- 71504-9_32 (accessed August 16, 2019).
- Grusho, A. A., N. A. Grusho, M.V. Levykin, and E.E. Timonina. 2018. Metody identifikatsii zakhvata khosta v raspredelennoy informatsionno-vychislitel'noy sisteme, zashchishchennoy s pomoshch'yu metadannykh [Methods of identification of host capture in the distributed information system which is protected on the base of meta data]. Informatika i ee Primeneniya - Inform. Appl. 12(4):41-45.
- Grusho, A. A., M.I. Zabezhailo, A. A. Zatsarinnyy, A.V. Nikolaev, V. O. Piskovski, and E.E. Timonina. 2017. Klassifikatsiya oshibochnykh sostoyaniy v raspredelennykh vychislitel'nykh sistemakh i istochniki ikh vozniknoveniya [Erroneous states classification in distributed computing systems and sources of their occurrence]. Sistemy i Sredstva Informatiki - Systems and Means of Informatics 27(3):30-41.
- Grusho, A. A., M.I. Zabezhailo, A. A. Zatsarinnyy, A.V. Nikolaev, V. O. Piskovski, V. V. Senchilo, I. V. Sudarikov, and E. E. Timonina. 2018. Ob analize oshibochnykh sostoyaniy v raspredelennykh vychislitel'nykh sistemakh [About the analysis of erratic statuses in the distributed computing systems]. Sistemy i Sredstva Informatiki - Systems and Means of Informatics 28(1):99-109.
[+] About this article
Title
METHODS OF IDENTIFICATION OF "WEAK" SIGNS OF VIOLATIONS OF INFORMATION SECURITY
Journal
Systems and Means of Informatics
Volume 29, Issue 3, pp 194-201
Cover Date
2019-10-30
DOI
10.14357/08696527190317
Print ISSN
0869-6527
Publisher
Institute of Informatics Problems, Russian Academy of Sciences
Additional Links
Key words
information security; metadata; cause-and-effect relationships; system administration; implicit failures and errors
Authors
N. A. Grusho
Author Affiliations
Institute of Informatics Problems, Federal Research Center "Computer Science and Control" of the Russian Academy of Sciences, 44-2 Vavilov Str., Moscow 119333, Russian Federation
|