Back to Search
Start Over
Determination of parameters affecting the possibility of computer attack implemented by an intruder
- Source :
- Bezopasnostʹ Informacionnyh Tehnologij, Vol 28, Iss 2, Pp 6-20 (2021)
- Publication Year :
- 2021
- Publisher :
- Moscow Engineering Physics Institute, 2021.
-
Abstract
- One of the urgent tasks of information security (IS) is to predict the probabilities of IS threats to an organization that are implemented due to a computer attack (CA). Existing methodologies for assessing CA are Cyber Kill Chain, Mitre Att&ck, NIST 800-115, Certified Ethical Hacker (CEH), FSTEC of Russia and ISO 27001/ They offer approaches to the analysis of CA from the organization point of view. The article offers a completely new approach to CA predicting from the intruder point of view. The analysis of the CA from the intruder point of view is carried out. The methods of CA discussed by intruder s in the DarkNet and their structuring are highlighted. The stages of the implementation of the SC from the intruder point of view are justified: theoretical training, practical training, achieving the goal of the CA. The conclusion about the possibility of using the mathematical apparatus of cellular automata in the simulation of the CA is justified, since the dynamics of the CA is similar to the dynamics of a cellular automaton. The parameters that affect the possibility of implementing the CA by the intruder are determined, in particular, the popularity of the CA method, the availability/sufficiency of means of protection against this CA, and others. The quantitative characteristics of the CA that determine the weighting factor of the transition (WCP) are justified. The sufficiency of the list of selected quantitative characteristics of the CA is confirmed by the results of the analysis of the CA, implemented with the help of the malicious software Petya, on the nodes of the information infrastructure of organizations located on the territory of Ukraine.
- Subjects :
- Information theory
Computer science
Darknet
prediction, computer attacks, intruder, weighting factor of the transition, theory of cellular automata
General Medicine
Information security
Information technology
Computer security
computer.software_genre
T58.5-58.64
Cellular automaton
Weighting
Certified Ethical Hacker
Kill chain
Malware
Information infrastructure
Q350-390
computer
Subjects
Details
- Language :
- English
- ISSN :
- 20747136 and 20747128
- Volume :
- 28
- Issue :
- 2
- Database :
- OpenAIRE
- Journal :
- Bezopasnostʹ Informacionnyh Tehnologij
- Accession number :
- edsair.doi.dedup.....6aec80127430a4d706a08caec3bdb864