Academic Journal
A formalized representation of the target function of the impact of malicious software on the operating environment of a special-purpose automated control system
العنوان: | A formalized representation of the target function of the impact of malicious software on the operating environment of a special-purpose automated control system |
---|---|
المؤلفون: | Igor I. Korchagin, Ksenia E. Amelina, Alexander N. Stadnik, Anton O. Karetskiy, Valeriy S. Antonov |
المصدر: | Безопасность информационных технологий, Vol 31, Iss 2, Pp 42-50 (2024) |
بيانات النشر: | Joint Stock Company "Experimental Scientific and Production Association SPELS, 2024. |
سنة النشر: | 2024 |
المجموعة: | LCC:Information technology LCC:Information theory |
مصطلحات موضوعية: | automated control systems for special purposes, malicious software, functional modeling, idef0 notation, anti-virus information protection tools, data protection, antivirus mechanisms., Information technology, T58.5-58.64, Information theory, Q350-390 |
الوصف: | The article presents the main provisions of the theory of functional modeling in relation to solving an important and relevant problem for the methodology of information security managing – the development of mathematical models characterizing the dynamic capabilities of malware to implement destructive effects on critical information infrastructure objects. As a result of the analysis of the models that pose a threat to information security through the use of malicious codes, such as the "chain of cyber intrusions", the "unified chain of cyber intrusions", the basic and advanced models of Diamond intrusion analysis, the ATT&CK model, an up-to-date version of the functional model in the IDEF0 notation of the process of malware destructive impact on the operating environment of a special-purpose automated control system was built. The process of malware exposure is decomposed into individual stages, tactics, and techniques. The purpose of the research was to develop a variant of the malware impact on a special-purpose automated control system as a method of violating the state of information security and its processes of the system under consideration. The obtained results are a tool for the formalized presentation of the described processes in terms of the Markov processes and the development of analytical models, appropriate temporal and probabilistic characteristics for quantitative assessment of the intruder's ability to implement threats to the information security state in special-purpose automated control systems, through the malware impact. |
نوع الوثيقة: | article |
وصف الملف: | electronic resource |
اللغة: | English Russian |
تدمد: | 2074-7128 2074-7136 |
Relation: | https://bit.spels.ru/index.php/bit/article/view/1632; https://doaj.org/toc/2074-7128; https://doaj.org/toc/2074-7136 |
DOI: | 10.26583/bit.2024.2.02 |
URL الوصول: | https://doaj.org/article/5d05eb6260e84008b3aaf889e0f0b63a |
رقم الانضمام: | edsdoj.5d05eb6260e84008b3aaf889e0f0b63a |
قاعدة البيانات: | Directory of Open Access Journals |
تدمد: | 20747128 20747136 |
---|---|
DOI: | 10.26583/bit.2024.2.02 |