首页> 外文会议>Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology >Mathematical Model of the Computer Attack Implementation Possibility by an Intruder
【24h】

Mathematical Model of the Computer Attack Implementation Possibility by an Intruder

机译:计算机攻击实施可能性的数学模型入侵者

获取原文
获取外文期刊封面目录资料

摘要

The article represents a substantiated mathematical model of the computer attack (CA) possibility by an intruder based on the theory of “defensible space” and the theory of cellular automata. A comparative analysis of mathematical approaches for describing the dynamics of the attacked IS and the cellular automata is carried out. The results of the analysis made it possible to draw a reasonable conclusion: the dynamics of the CA is similar to the dynamics of the cellular automata. Based on the analysis of the CA model, a reasonable list of quantitative indicators has been formed to determine the probability coefficient. The probabilistic coefficient is called the weighting factor of the transition (WFT) in the mathematical model of the CA implementation possibility. We show seven quantitative indicators. Two of them are the time required to develop protection method and the number of nodes potentially affected by CA; and (7) the total number of nodes. Other are coefficients. There are coefficient of availability / popularity of protection means against CA; coefficient of solution availability for CA monitoring; the coefficient of absence / presence of visible CA damage; the coefficient of the attack method popularity. Defines as active discussion (“explanation”) of the attack method on the DarkNet forums. For a specific attack method, the coefficient for all transitions is the same. The sufficiency of selected quantitative indicators list is confirmed by the results of the analysis of the Petya ransomware scenario on information system (IS) located on the territory of Ukraine.
机译:本文代表了基于“可辩护空间”理论和蜂窝自动机理论的入侵者的计算机攻击(CA)可能性的实证数学模型。对描述攻击动力学的数学方法的比较分析和蜂窝自动机。分析结果使得可以得出合理的结论:CA的动态类似于蜂窝自动机的动态。基于CA模型的分析,已经形成了合理的定量指标列表以确定概率系数。概率系数称为CA实现可能性的数学模型中转换(WFT)的加权因子。我们展示了七种量化指标。其中两个是开发保护方法和受CA可能影响的节点数量所需的时间; (7)节点的总数。其他是系数。保护手段的可用性/普及系数对抗CA; CA监测的解决方案可用性系数;可见的Ca损伤的缺席/存在系数;攻击方法人气的系数。定义Darknet论坛上攻击方法的主动讨论(“解释”)。对于特定的攻击方法,所有转换的系数是相同的。所选定量指标列表的充分通过在乌克兰境内的信息系统(IS)上的Petya赎金软件场景的分析结果证实。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号