ENSURING OF INFORMATION PROCESSES’ RELIABILITY AND SECURITY IN CRITICAL APPLICATION DATA PROCESSING SYSTEMS

Valery Lahno

Abstract


The system approach to solving problems of information security, proposed in this work provides for the integration of mathematical models of the processing and protection of information. This model connects invulnerability and flexibility for each of three aspects of security (confidentiality, availability and integrity) of information based on structural unification of these contradictions. The method of modeling the security policy (SP) to provide a highly reliable information processing (HRIP) has been developed. This method differs by using a new problem-based graph-theoretic unit of standard model of the protected automated system for connection flexibility the discretionary model with the principled security of models of the final states of the SP. The mathematical models of synthesis of policy safe interaction of information processes, allowing SP to consider separately the various structural components of network with the ability to its further interlinkages have been developed. Using the new mathematical models of flexible reliability, availability, confidentiality and integrity of information processed, allowing mathematically describe the mechanisms to ensure the availability and confidentiality of the information and take into account the quantitative requirements for data integrity.

Keywords


protection of information, data processing system, security policy, mathematical model, reliability

Full Text:

PDF

References


Ahmad, D., Dubrovskiy, A. & Flinn Х. (2005). Defense from the hackers of corporate networks. Moscow. Companies AyTi; DMK - Press.

Chertov, R., Fahmy, S., & Shroff, N. (2006). Emulation versus simulation: A case study of TCP-targeted denial of service attacks. In Proc. of the 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, p. 10.

Chi, S., Park, J., Jung, K. & Lee, J. (2001). Network Security Modeling and Cyber At-tack Simulation Methodology//LNCS. Vol. 2119.

Goldman, R. (2002). A Stochastic Model for Intrusions // LNCS. Vol. 2516.

Gorodetski, V. & Kotenko, I. (2002). Attacks against Computer Network: Formal Grammar-based Framework and Simulation Tool. RAID 2000 // LNCS. Vol. 2516.

Harel, D. (1987). Visual Formalism for Complex Systems, Science of Computer Programming 8. p. 231-274.

Lahno V. & Petrov A. (2010) . Modelling of discrete recognition and information vulnerability search procedures. TEKA. Volume XI A. p. 137-144.

Lahno V. & Petrov A. (2011). Ensuring security of automated information systems, transportation companies with the intensification of traffic. Lugansk. VNU.

Shun-Chieh, L., & Shian-Shyong, T. (2004). Constructing detection knowledge for DDoS intrusion tolerance // Expert Systems with Applications. - 2004. - V. 27. P. 379–390.

Smirniy, M. & Lahno, V. (2009). The research of the conflict request threads in the data protection systems. Proceedings of Lugansk branch of the International Academy of Informatization. V 2(20). р. 23-30.


Refbacks

  • There are currently no refbacks.