Оценка возможного ущерба и времени реакции комплекса средств противодействия на реализацию угроз информационной безопасности сети связи специального назначения
Работая с нашим сайтом, вы даете свое согласие на использование файлов cookie. Это необходимо для нормального функционирования сайта, показа целевой рекламы и анализа трафика. Статистика использования сайта отправляется в «Яндекс» и «Google»
Научный журнал Моделирование, оптимизация и информационные технологииThe scientific journal Modeling, Optimization and Information Technology
Online media
issn 2310-6018

Assessment of possible damage and reaction time of a complex of countermeasures to the implementation of information security threats special purpose communication networks

Bokova O.I.   Kanavin S.V.   Khokhlov N.S.  

UDC 004.056.53
DOI: 10.26102/2310-6018/2020.31.4.037

  • Abstract
  • List of references
  • About authors

In order to determine the optimal algorithm and methods for assessing damage in the event of the implementation of information security threats in special-purpose communication networks, the existing approaches to solving this problem are considered and analyzed. The quality of threat recognition by the adaptive recognition system can be assessed in the form of prevented damage during the implementation of a conflict impact on the communication system. For this, it is advisable to use a standard model for the implementation of threats of conflict impact on the communication network, based on a four-stage strategy of conflict interaction. Using the expression obtained in the work, it is possible to assess the quality of threat recognition by the adaptive recognition system in the form of prevented damage during the implementation of the conflict impact on the communication network. An assessment of the reaction time of a complex of countermeasures to the implementation of threats to information security of a special-purpose communication network in the context of the implementation of centralized and decentralized control has been carried out. The resulting family of dependencies, for specific networks and given technical means, makes it possible to estimate the time parameters of the proposed adaptive routing algorithms, or, according to the specified requirements for control efficiency, form requirements for the performance of technical means of the control system. From the given dependencies it follows that for the considered computational procedures of routing algorithms, the decentralized control method for most types of structures is preferable according to the criterion response time, regardless of the performance of technical means. However, there are such structural characteristics of networks for which the advantage of one or another routing algorithm depends on the ratio of the performance of the technical means of the control system.

1. Grechishnikov E.V., Dobryshin M.M., Gutsyn R.V. Complex of information support for assessing the security of communication nodes from heterogeneous computer attacks. I-methods. 2019;11(4):4-9. (In Russ)

2. Nesterovskiy I.P., Yazov Yu.K. Possible approach to assessing damage from the implementation of threats to the security of information processed in state information systems. Voprosy kiberbezopasnosti. 2015;2(10):20-25. (In Russ)

3. Yazov Yu.K., Grigorieva T.V. The marginal damage paradigm and its use in assessing the risks of information security breaches in a computer system. Izvestiya YUFU. Technical science. 2008;8(85):81-87. (In Russ)

4. Bokova O.I., Kanavin S.V., Meshcheryakov V.A., Khokhlov N.S. Information security system model in the automated system developed in the simulation software environment CPN TOOLS. Journal of Physics: Conference Series. Applied Mathematics, Computational Science and Mechanics: Current Problems. 2020: 012021. DOI:10.1088/1742-6596/ 1479/1/012021.

5. Khokhlov N., Kanavin S., Rybokitov A. Modeling information security infringements in mobile self-organizing network of communication using fuzzy logic and theory of graphs. Proceedings – 2019 1st International Conference on Control Systems, Mathematical Modelling, Automation and Energy Efficiency, SUMMA 2019. 2019:60-63. DOI: 10.1109/SUMMA48161.2019.8947572.

6. Khokhlov N.S., Kanavin S.V., Gilev I.V. A technique for constructing a neural network that solves the problem of choosing ways to counteract destructive electromagnetic influences in special-purpose communication networks. Vestnik Voronezhskogo instituta MVD Rossii. 2020;2:164-174. (In Russ)

7. Khokhlov N.S., Kanavin S.V., Gilev I.V. Typical models of destructive broadband and ultra-wideband signals affecting special-purpose communication systems. Vestnik Voronezhskogo instituta MVD Rossii. 2019;1:91-101. (In Russ)

8. Khokhlov N.S., Panychev S.N., Kanavin S.V., Samotsvet N.A., Gilev I.V. Methodology for quantitative assessment of the influence of radio interference and the signal of radio electronic equipment on the indicators of electronic protection. Vestnik povolzhskogo gosudarstvennogo tekhnologicheskogo universiteta. Seriya: Radiotekhnicheskiye i infokommunikatsionnyye sistemy. 2019;1(41):22-30. DOI:10.25686/2306- 2819.2019.1.22. (In Russ)

9. Bokova O.I., Zhaivoronok D.A., Kanavin S.V., Khokhlov N.S. Model of a complex of means to counter information security threats in special-purpose communication networks. Modeling, optimization and information technology. 2020;2(29):41-42. Available at https://moit.vivt.ru/wp-content/uploads/2020/05/BokovaSoavtors_2_20_1.pdf. DOI: 10.26102/2310-6018/2020.29.2.040 (accessed 23.12.2020).

10. Gilev I.V., Kanavin S.V., Popov A.V., Khokhlov N.S. A method of counteracting destructive electromagnetic influences based on additional modulation using wavelet transform in special-purpose communication networks. Modeling, optimization and information technology. 2020;2(29):12-13. Available at https://moit.vivt.ru/wpcontent/uploads/2020/05/GilevSoavtors_2_20_1.pdf. DOI:10.26102/2310-6018/ 2020.29.2.039 (accessed 23.12.2020).

11. Khokhlov N.S., Kanavin S.V., Gilev I.V. An experimental study on the reproduction of destructive electromagnetic influences leading to the destruction and modification of information in special-purpose communication systems Vestnik Voronezhskogo instituta MVD Rossii. 2020;4:25-38. (In Russ).

Bokova Oksana Igorevna
Doctor of Technical Sciences, Professor
Email: o.i.bokova@gmail.com

ООО «Cascade»

Moscow, Russian Federation

Kanavin Sergey Vladimirovich
Candidate of Technical Sciences
Email: sergejj-kanavin@rambler.ru

Voronezh Institute of the Ministry of Internal Affairs of Russia

Voronezh, Russian Federation

Khokhlov Nikolay Stepanovich
Doctor of Technical Sciences, Professor
Email: nikolayhohlov@rambler.ru

Voronezh Institute of the Ministry of Internal Affairs of Russia

Voronezh, Russian Federation

Keywords: countering information security threats, special purpose communication networks, an integrated approach, information security threats, damage assessment

For citation: Bokova O.I. Kanavin S.V. Khokhlov N.S. Assessment of possible damage and reaction time of a complex of countermeasures to the implementation of information security threats special purpose communication networks. Modeling, Optimization and Information Technology. 2020;8(4). Available from: https://moitvivt.ru/ru/journal/pdf?id=887 DOI: 10.26102/2310-6018/2020.31.4.037 (In Russ).

503

Full text in PDF