MODELS, METHODS AND INFORMATION TECHNOLOGIES OF PROTECTION OF CORPORATE SYSTEMS BASED ON INTELLECTUAL IDENTIFICATION OF THREATS

Valery Lahno

Abstract


The article to contain results of the researches, allowing to raise level of protection of the automated and intellectual information systems of the motor transportation enterprises (AISTE) in the conditions of an intensification of transportations.  The article also considers the issues of research and protection of the AISTE under the condition of several conflict data request threads. The system approach to solving problems of information security, proposed in this work provides for the integration of mathematical models of the processing and protection of information. This model connects invulnerability and flexibility for each of three aspects of security (confidentiality, availability and integrity) of information based on structural unification of these contradictions. In article results of researches on development of methods and models of intellectual recognition of threats to information systems of transport. The article to contain mathematical models and results of an estimation information systems having Internet connection through various communication channels.

Keywords


Protection of information, data processing system, security policy, mathematical models

Full Text:

PDF

References


Ahmad, D., Dubrovskiy, A., & Flinn, Х. (2005). Defense from the hackers of corporate networks. Moscow: Companies AyTi; DMK - Press.

Chi, S., Park, J., Jung, K., & Lee, J. (2001). Network Security Modeling and Cyber At-tack Simulation Methodology (Vol. 2119). LNCS. Vol. 2119. Retrieved from http://link.springer.com/chapter/10.1007%2F3-540-47719-5_26

Daston, L. (1988). Classical Probability in the Enlightenment. Princeton Univ Press.

ISO/IEC 15408-1:2009. (2009). Information technology - Security techniques - Evaluation criteria for IT security - Part 1: Introduction and general model. ISO.

Kolodgy, C. J. (2014). Worldwide Security and Vulnerability Management 2004-2014. Manchester: National Computer Center Publications.

Lahno, V., & Petrov, A. (2010). Modelling of discrete recognition and information vulnerability search procedures (Vol. XI A). TEKA.

Lahno, V., & Petrov, A. (2011). Ensuring security of automated information systems, transportation companies with the intensification of traffic. Lugansk.

Lahno, V., & Petrov, A. (2012). Modeling information security system of transport enterprises. In H. H. Marek Dudek (Ed.), Management and production engineering (pp. 221-248). ATH. Academia Techniczno – Humanistyczna of Bielsko-Biala.

Mirkovic, J., Dietrich, S., Dittrich, D., & Reiher, P. (2004). Internet Denial of Service: Attack and Defense Mechanisms. Prentice Hall PTR.

Trivedi, K. S., Kim, D. S., & Arpan, R. (2001). Dependability and Security Models. Durham, NC, USA: Duke University Department of Electrical and Computer Engineering .

Xiang, Y., Zhou, W., & Chowdhury, M. (2004). A Survey of Active and Passive Defence Mechanisms against DDoS Attacks. Technical Report, TR C04/02. Australia: School of Information Technology, Deakin University.


Refbacks

  • There are currently no refbacks.