Academic Journal

A formalized representation of the target function of the impact of malicious software on the operating environment of a special-purpose automated control system

التفاصيل البيبلوغرافية
العنوان: A formalized representation of the target function of the impact of malicious software on the operating environment of a special-purpose automated control system
المؤلفون: Igor I. Korchagin, Ksenia E. Amelina, Alexander N. Stadnik, Anton O. Karetskiy, Valeriy S. Antonov
المصدر: Безопасность информационных технологий, Vol 31, Iss 2, Pp 42-50 (2024)
بيانات النشر: Joint Stock Company "Experimental Scientific and Production Association SPELS, 2024.
سنة النشر: 2024
المجموعة: LCC:Information technology
LCC:Information theory
مصطلحات موضوعية: automated control systems for special purposes, malicious software, functional modeling, idef0 notation, anti-virus information protection tools, data protection, antivirus mechanisms., Information technology, T58.5-58.64, Information theory, Q350-390
الوصف: The article presents the main provisions of the theory of functional modeling in relation to solving an important and relevant problem for the methodology of information security managing – the development of mathematical models characterizing the dynamic capabilities of malware to implement destructive effects on critical information infrastructure objects. As a result of the analysis of the models that pose a threat to information security through the use of malicious codes, such as the "chain of cyber intrusions", the "unified chain of cyber intrusions", the basic and advanced models of Diamond intrusion analysis, the ATT&CK model, an up-to-date version of the functional model in the IDEF0 notation of the process of malware destructive impact on the operating environment of a special-purpose automated control system was built. The process of malware exposure is decomposed into individual stages, tactics, and techniques. The purpose of the research was to develop a variant of the malware impact on a special-purpose automated control system as a method of violating the state of information security and its processes of the system under consideration. The obtained results are a tool for the formalized presentation of the described processes in terms of the Markov processes and the development of analytical models, appropriate temporal and probabilistic characteristics for quantitative assessment of the intruder's ability to implement threats to the information security state in special-purpose automated control systems, through the malware impact.
نوع الوثيقة: article
وصف الملف: electronic resource
اللغة: English
Russian
تدمد: 2074-7128
2074-7136
Relation: https://bit.spels.ru/index.php/bit/article/view/1632; https://doaj.org/toc/2074-7128; https://doaj.org/toc/2074-7136
DOI: 10.26583/bit.2024.2.02
URL الوصول: https://doaj.org/article/5d05eb6260e84008b3aaf889e0f0b63a
رقم الانضمام: edsdoj.5d05eb6260e84008b3aaf889e0f0b63a
قاعدة البيانات: Directory of Open Access Journals
الوصف
تدمد:20747128
20747136
DOI:10.26583/bit.2024.2.02