Back to Search Start Over

Adaptive Management of Information Network Protection with Analysis of Intruder's Actions

Authors :
V. A. Lipatnikov
A. A. Shevchenko
V. Y. Malyshev
G. I. Korshunov
Source :
Information and Control Systems. :61-72
Publication Year :
2018
Publisher :
State University of Aerospace Instrumentation (SUAI), 2018.

Abstract

Introduction:The known methods of adaptive management of information network protection with special security measures are not effective enough in modern conditions, as they only take into account collected and processed data on security events and do not analyze the dynamics of the actions.Purpose:Developing a method of adaptive control of information network protection based on the analysis of violator's actions.Results:A method has been proposed for adaptive management of information network protection. Unlike other known methods, it is based on analyzing the dynamics of the violator's actions and determining the situational confrontation parameters under stochastic uncertainty. The method includes situation monitoring, operational control of the sequence of violator's actions, modeling the attacker's strategy, determining the situational parameters with a reliable prediction of the intrusion strategy. During the analysis, the network administrator receives information about the priority purposes of an intruder, the tools used and the vulnerabilities of the network. This provides an opportunity to promptly take measures to increase the security of the network and avoid its compromise.Practical relevance: Đ¢his approach allows you to maintain the operation of automated management systems for an organization with integrated structure, taking into account the scaling in planning and making changes to the structure on the background of information confrontation at the required level when multiple threats are changing their dynamics.

Details

ISSN :
25418610 and 16848853
Database :
OpenAIRE
Journal :
Information and Control Systems
Accession number :
edsair.doi...........706deb870e2e75dca2cbe7c55a66641a
Full Text :
https://doi.org/10.31799/1684-8853-2018-4-61-72