Computational experiment for the purpose of determining the probabilistic and temporal characteristics of information security systems against unauthorized access in automated information systems
https://doi.org/10.20914/2310-1202-2017-4-90-96
Abstract
About the Authors
A. V. SkrypnikovDr. Sci. (Engin.), professor , Information security affairs department, Revolution Av. 19, Voronezh, 394000, Russia
A. D. Popov
post-graduate cadet, automated information systems in interior affairs de-partment, Patriotov av., 53, Voronezh, 394086, Russia
E. A. Rogozin
Dr. Sci. (Engin.), professor, automated information systems in interior affairs department, Patriotov av., 53, Voronezh, 394086, Russia
V. A. Khvostov
Cand. Sci. (Engin.), associate professor, Information security affairs department, Revolution av., 19 Voronezh, 394000, Russia
References
1. FSTEK RF. Rukovodyaschiy dokument. Kon-tseptsiya zaschityi sredstv vyichislitelnoy tehniki i avtomatizirovannyih system ot nesanktsionirovan-no godostupa k informatsii [Guidance document. The concept of protecting computer facilities and automated systems from unauthorized access to information] (in Russian).
2. Postanovlenie Pravitelstva RF ot 01.11.2012 N 1119 "Ob utverzhdenii trebovaniy k zaschite personalnyih dannyih pri ih obrabotke v informatsionnyih sistemah personalnyih dan-nyih". [Decree of the Government of the Russian Federation of 01.11.2012 N 1119 "On the approval of the requirements for the protection of personal data when processing them in information systems of personal data] Available at: http:// http://www.consultant.ru/document/cons_doc_LAW_137356/ (in Russian).
3. SZI «Strazh NT». Rukovodstvoadmini-stratora: [Administrator's Guide] Available at: http://www.guardnt.ru/download/doc/admin_guide_nt_3_0.pdf (in Russian).
4. Sistema zaschityiinformatsiiotnesanktsi-onirovannogodostupa «Strazh NT». Opisaniepri-meneniya: [The system of protection of information from unauthorized access] Available at: http://www.rubinteh.ru/public/opis30.pdf (in Russian).
5. Rogozin E. A., Popov A. D., Shagirov T. V. Designing systems to protect information from unauthorized access in automated systems of internal affairs bodies. Vestnik Voronezhskogo instituta MVD Rossii [Bulletin of the Voronezh Institute of the Ministry of Internal Affairs of Russia] 2016. no. 2. pp. 174—183. (in Russian)
6. Rogozin E. A., Popov A. D. The model of the functioning of a standard system for protecting information from unauthorized access in automated information systems ATS. Vestnik Voronezhskogo instituta MVD Rossii [Bulletin of the Voronezh Institute of the Ministry of Internal Affairs of Russia] 2016. no. 4. no. 122—131. (in Russian)
7. Makarov O.Yu., Hvostov V.A., Hvostova N.V. Methodology of rationing requirements for information security of automated systems. Vestnik Voronezhskogo gosudarstvennogo tehnicheskogo universiteta [Proceedings of Voronezh State Technical University] 2010. vol.6. no.11 pp. 47 – 511 (in Russian)
8. Lipaev V.V. Testirovanie komponentov I kompleksov programm [Testing components and software packages] Moscow, SINTEG, 2010. 400 p. (in Russian)
9. Kulikov S.S. Testirovanie programmnogo obespecheniya. Bazovyiykurs. «Chetyire chetverti» [Software testing. Basic course. Four quarters,] 2015. 296 p. Available at: http://svyatoslav.biz/software_testing_book/ (in Russian)
10. Markov A.S., Tsirlov V.L., Barabanov A.V. Metodyiotsenkinesootvetstviyasredstvzaschityiinformatsii [Methods for assessing the discrepancy between information protection means] Moscow, Radio I svyaz, 2012. 192 p. (in Russian)
11. GOSTR ISO/MEK 15408-2—201 3Informatsionnaya tehnologiya. Metodyiisred-stva obespecheniya bezopasnosti. Kriterii otsenki bezopasnosti informatsionnyi htehnologiy. Chast 2. Funktsi onalnyie komponentyi bezopasnosti [Information technology. Methods and means of ensuring security. Criteria for assessing the security of information technology. Part 2. Functional safety components]. (in Russian)
12. Rogozin E.A. et al. Metodologicheskie osnovy bezopasnosti ispolzovaniya informatsionnyih tehnologiy v si-stemahelektronnogo dokumento oborota: monogra-fiya [Methodological fundamentals of the safety of using information technologies in electronic document management systems: monograph] Voronezh, Voronezh: IPTs «Nauchnaya kniga», 2011. 252 p. (in Russian)
13. Saltzer J.H., Schroeder M.D. The protection of information in computer systems Proceedings of the IEEE. 1975. vol. 63. no. 9.
14. Zequ Yang; Peng Cheng; Jiming Chen Differential-privacy preserving optimal power flow in smart grid. IET Generation, Transmission & Distribution. 2017. vol. 11. no. 15. pp. 3853 – 3861.
15. Jun Yang, Chunjie Zhou, Shuanghua Yang, Haizhou Xu et al. Anomaly Detection Based on Zone Partition for Security Protection of Industrial Cyber-Physical Systems. IEEE Transactions on Industrial Electronics Year. 2017. vol. PP. no. 99. pp. 1 – 1.
16. Hwaiyu Geng A Single platform approach for the management of emergency in complex environments such as large events, digital cities, and networked regions. Internet of Things and Data Analytics. 2017.
17. Sghaier Guizani Internet-of-things (IoT) feasibility applications in information Centric Networking System. 13th International Wireless Communications and Mobile Computing Conference (IWCMC). 2017. pp. 2192 – 2197.
18. Semenenko V.A. Informatsionnaya bezopasnost [Information Security] Moscow, MGUIT, 2010. 277 p. (in Russian)
Review
For citations:
Skrypnikov A.V., Popov A.D., Rogozin E.A., Khvostov V.A. Computational experiment for the purpose of determining the probabilistic and temporal characteristics of information security systems against unauthorized access in automated information systems. Proceedings of the Voronezh State University of Engineering Technologies. 2017;79(4):90-96. (In Russ.) https://doi.org/10.20914/2310-1202-2017-4-90-96