Preview

Proceedings of the Voronezh State University of Engineering Technologies

Advanced search

Computational experiment for the purpose of determining the probabilistic and temporal characteristics of information security systems against unauthorized access in automated information systems

https://doi.org/10.20914/2310-1202-2017-4-90-96

Abstract

The article is devoted to the method of experimental estimation of parameters of functioning of standard information protection systems from unauthorized access, certified, widely used in organizations operating automated information systems. In the course of the experiment, statistical data were evaluated in the dynamics of the functioning of information security systems against unauthorized access in automated information systems. Registration of the parameters for the execution time of protective protection functions was carried out using a special utility called ProcessMonitor from the Sysinternals suite of utilities used to filter processes and threads. The loading of the processor and main memory of the computer with the use of special software, specially designed for performing experimental research, simulates the operation of GIS in real-world work for its intended purpose. A special software for simulating the work of a system with high load is developed in "VisualStudio 2015" within the framework of "ConsoleApplication". At the same time, the processor is loaded at a level of 50-70% and 60-80% of the operative memory. The obtained values of the time of implementation of protective functions in conditions of high utilization of resources of computer facilities for their intended purpose will allow us to assess the conflict and dynamic properties of the GIS. In the future, the obtained experimental estimates can be used to develop a model of information security in automated information systems, as well as in the formation of quality requirements (resource intensity, response time to the user's request, availability, etc.). Also, the results of the computational experiment in the future can be used to develop a software package for assessing the dynamic performance of information security systems against unauthorized access in automated information systems

About the Authors

A. V. Skrypnikov
Voronezh state university of engineering technogies
Dr. Sci. (Engin.), professor , Information security affairs department, Revolution Av. 19, Voronezh, 394000, Russia


A. D. Popov
Voronezh Institute of the Ministry of Interior
post-graduate cadet, automated information systems in interior affairs de-partment, Patriotov av., 53, Voronezh, 394086, Russia


E. A. Rogozin
Voronezh Institute of the Ministry of Interior
Dr. Sci. (Engin.), professor, automated information systems in interior affairs department, Patriotov av., 53, Voronezh, 394086, Russia


V. A. Khvostov
Voronezh state university of engineering technolo-gies
Cand. Sci. (Engin.), associate professor, Information security affairs department, Revolution av., 19 Voronezh, 394000, Russia


References

1. FSTEK RF. Rukovodyaschiy dokument. Kon-tseptsiya zaschityi sredstv vyichislitelnoy tehniki i avtomatizirovannyih system ot nesanktsionirovan-no godostupa k informatsii [Guidance document. The concept of protecting computer facilities and automated systems from unauthorized access to information] (in Russian).

2. Postanovlenie Pravitelstva RF ot 01.11.2012 N 1119 "Ob utverzhdenii trebovaniy k zaschite personalnyih dannyih pri ih obrabotke v informatsionnyih sistemah personalnyih dan-nyih". [Decree of the Government of the Russian Federation of 01.11.2012 N 1119 "On the approval of the requirements for the protection of personal data when processing them in information systems of personal data] Available at: http:// http://www.consultant.ru/document/cons_doc_LAW_137356/ (in Russian).

3. SZI «Strazh NT». Rukovodstvoadmini-stratora: [Administrator's Guide] Available at: http://www.guardnt.ru/download/doc/admin_guide_nt_3_0.pdf (in Russian).

4. Sistema zaschityiinformatsiiotnesanktsi-onirovannogodostupa «Strazh NT». Opisaniepri-meneniya: [The system of protection of information from unauthorized access] Available at: http://www.rubinteh.ru/public/opis30.pdf (in Russian).

5. Rogozin E. A., Popov A. D., Shagirov T. V. Designing systems to protect information from unauthorized access in automated systems of internal affairs bodies. Vestnik Voronezhskogo instituta MVD Rossii [Bulletin of the Voronezh Institute of the Ministry of Internal Affairs of Russia] 2016. no. 2. pp. 174—183. (in Russian)

6. Rogozin E. A., Popov A. D. The model of the functioning of a standard system for protecting information from unauthorized access in automated information systems ATS. Vestnik Voronezhskogo instituta MVD Rossii [Bulletin of the Voronezh Institute of the Ministry of Internal Affairs of Russia] 2016. no. 4. no. 122—131. (in Russian)

7. Makarov O.Yu., Hvostov V.A., Hvostova N.V. Methodology of rationing requirements for information security of automated systems. Vestnik Voronezhskogo gosudarstvennogo tehnicheskogo universiteta [Proceedings of Voronezh State Technical University] 2010. vol.6. no.11 pp. 47 – 511 (in Russian)

8. Lipaev V.V. Testirovanie komponentov I kompleksov programm [Testing components and software packages] Moscow, SINTEG, 2010. 400 p. (in Russian)

9. Kulikov S.S. Testirovanie programmnogo obespecheniya. Bazovyiykurs. «Chetyire chetverti» [Software testing. Basic course. Four quarters,] 2015. 296 p. Available at: http://svyatoslav.biz/software_testing_book/ (in Russian)

10. Markov A.S., Tsirlov V.L., Barabanov A.V. Metodyiotsenkinesootvetstviyasredstvzaschityiinformatsii [Methods for assessing the discrepancy between information protection means] Moscow, Radio I svyaz, 2012. 192 p. (in Russian)

11. GOSTR ISO/MEK 15408-2—201 3Informatsionnaya tehnologiya. Metodyiisred-stva obespecheniya bezopasnosti. Kriterii otsenki bezopasnosti informatsionnyi htehnologiy. Chast 2. Funktsi onalnyie komponentyi bezopasnosti [Information technology. Methods and means of ensuring security. Criteria for assessing the security of information technology. Part 2. Functional safety components]. (in Russian)

12. Rogozin E.A. et al. Metodologicheskie osnovy bezopasnosti ispolzovaniya informatsionnyih tehnologiy v si-stemahelektronnogo dokumento oborota: monogra-fiya [Methodological fundamentals of the safety of using information technologies in electronic document management systems: monograph] Voronezh, Voronezh: IPTs «Nauchnaya kniga», 2011. 252 p. (in Russian)

13. Saltzer J.H., Schroeder M.D. The protection of information in computer systems Proceedings of the IEEE. 1975. vol. 63. no. 9.

14. Zequ Yang; Peng Cheng; Jiming Chen Differential-privacy preserving optimal power flow in smart grid. IET Generation, Transmission & Distribution. 2017. vol. 11. no. 15. pp. 3853 – 3861.

15. Jun Yang, Chunjie Zhou, Shuanghua Yang, Haizhou Xu et al. Anomaly Detection Based on Zone Partition for Security Protection of Industrial Cyber-Physical Systems. IEEE Transactions on Industrial Electronics Year. 2017. vol. PP. no. 99. pp. 1 – 1.

16. Hwaiyu Geng A Single platform approach for the management of emergency in complex environments such as large events, digital cities, and networked regions. Internet of Things and Data Analytics. 2017.

17. Sghaier Guizani Internet-of-things (IoT) feasibility applications in information Centric Networking System. 13th International Wireless Communications and Mobile Computing Conference (IWCMC). 2017. pp. 2192 – 2197.

18. Semenenko V.A. Informatsionnaya bezopasnost [Information Security] Moscow, MGUIT, 2010. 277 p. (in Russian)


Review

For citations:


Skrypnikov A.V., Popov A.D., Rogozin E.A., Khvostov V.A. Computational experiment for the purpose of determining the probabilistic and temporal characteristics of information security systems against unauthorized access in automated information systems. Proceedings of the Voronezh State University of Engineering Technologies. 2017;79(4):90-96. (In Russ.) https://doi.org/10.20914/2310-1202-2017-4-90-96

Views: 627


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2226-910X (Print)
ISSN 2310-1202 (Online)