A Refined Method for Analytical Modeling of the Processes of Spreading Virus Software to Assess the Security of Informatization Objects

封面

如何引用文章

全文:

开放存取 开放存取
受限制的访问 ##reader.subscriptionAccessGranted##
受限制的访问 订阅存取

详细

Task. The purpose of writing this article is to improve the security of information in information systems. Model. The article proposes an improved method for analytical modeling of the process of spreading virus software in information systems in relation to the features of a special class of attacks implemented by the family of virus software - ransomware. Conclusions. The proposed method makes it possible to analytically calculate the intensity of infection of hosts of a protected information system with various types of virus software and use the obtained characteristics as initial data for the final assessment of the information security risk on the protected informatization object. Value. Modeling in the environment of the mathematical package PTC Mathcad Prime 7 showed the applicability of the proposed approach for analytical threat modeling.

全文:

受限制的访问

作者简介

Ilia Zavodtsev

Lomonosov Moscow State University

Email: nilrs@rambler.ru
Cand. Sci. (Eng.), Associate Professor Moscow, Russian Federation

Mikhail Borisov

Lomonosov Moscow State University

Email: bma_mv@rambler.ru
associate professor Moscow, Russian Federation

Nikolai Bondarenko

Lomonosov Moscow State University

Email: bondarenkonn.corp@gmail.com
PhD student Moscow, Russian Federation

Vladimir Meleshko

Lomonosov Moscow State University

Moscow, Russian Federation

参考

  1. Order of the FSTEC of Russia dated February 11, 2013 No. 17 “On approval of requirements for the protection of information that does not constitute a state secret contained in state information systems”. Rossiyskaya Gazeta. 06.26.2013. No. 136.
  2. Order of the FSTEC of Russia dated February 18, 2013 No. 21 “On approval of the Composition and content of organizational and technical measures to ensure the security of personal data during their processing in personal data information systems”. Rossiyskaya Gazeta. 05.22.2013. No. 107.
  3. Order of the FSTEC of Russia dated December 25, 2017 No. 239 “On approval of the Requirements for ensuring the security of significant objects of critical information infrastructure of the Russian Federation”. URL: http://www.pravo.gov.ru
  4. Methodological document. Information protection measures in state information systems (approved by the FSTEC of Russia on February 11, 2014). URL: https://fstec.ru
  5. Methodological document. Methodology for assessing threats to information security (approved by the FSTEC of Russia on February 5, 2021). URL: https://fstec.ru
  6. Bank of Russia Regulation No. 483-P dated August 6, 2015 “On the procedure for calculating the amount of credit risk based on internal ratings” (together with the “Requirements for the quality of data used by banks to create and apply models for quantitative assessment of credit risk for the purposes of calculating capital adequacy ratios”). Bulletin of the Bank of Russia. 09.29.2015. No. 81.
  7. GOST R 58771-2019. National standard of the Russian Federation. Risk management. Risk assessment technologies (approved and put into effect by the Order of Rosstandart dated December 17, 2019 No. 1405-st). Moscow: Standartinform, 2020.
  8. GOST R ISO/IEC 27001-2021. National standard of the Russian Federation. Information technology. Methods and means of ensuring security. Information security management systems. Requirements (approved and put into effect by the Order of Rosstandart dated November 30, 2021 No. 1653-st). Moscow: Standartinform, 2022.
  9. Boyko A.A. Method for developing test remote information and technical influences on spatially distributed systems of information and technical means. Information and Control Systems. 2014. No. 3. Pp. 84-92. (In Rus.)
  10. Boyko A.A. Information conflict model of a special software tool and information security subsystem of an information technology tool. Radio Engineering. 2015. No. 4. Pp. 136-141. (In Rus.)
  11. Boyko A.A. A Method for analytical modeling of the process of virus spread in computer networks of different structures. Proceedings of SPIIRAS. 2015. Vol. 5 (42). Pp. 196-211. (In Rus.)
  12. Borisov M.A., Golod V.V., Osadchiy A.I., Trofimov V.V. Model of unauthorized access to information in dynamically changing conditions. Software Products and Systems. 2005. No. 4. Pp. 45-48. (In Rus.)
  13. Borisov M.A., Zavodtsev I.V. Vulnerability assessment tools in automated systems. Scientific Journal Vestnik RGGU. Series Informatics. Data protection. Maths. 2010. No. 12 (55)/10. Pp. 259-262. (In Rus.)
  14. Borisov M.A., Zavodtsev I.V., Chizhov I.V. Fundamentals of software and hardware information protection. No. 1. 5th ed., Ex. per. and additional. Moscow: Librokom, 2019. 464 p.
  15. Kozlenko A.V. Method for assessing the level of information protection against unauthorized access in computer networks based on the security graph. Proceedings of SPIIRAS. 2012. Vol. 2 (21). Pp. 41-55. (In Rus.)
  16. The DFIR report. Real intrusions by real attackers, the truth behind the intrusion. URL: https://thedfirreport.com

补充文件

附件文件
动作
1. JATS XML


##common.cookie##