PROTECTION OF INFORMATION IN CRITICAL APPLICATION DATA PROCESSING SYSTEMS

Valery Lahno

Abstract


The results of researches, allowing raising the level of protection of the automated data processing systems of critical applications and intellectual information systems of enterprises are presented in the article. The mathematical models and results of vulnerability estimation of information systems which have Internet connection through various communication channels are resulted in this work. The system approach to solving problems of information security, proposed in this work provides for the integration of mathematical models of the processing and protection of information. The method of modeling the security policy to provide a highly reliable information processing has been developed. The mathematical models of synthesis of policy safe interaction of information processes, allowing security policy to consider separately the various structural components of network with the ability to its further interlinkages have been developed. Using the new mathematical models of flexible reliability, availability, confidentiality and integrity of information processed, allowing mathematically describe the mechanisms to ensure the availability and confidentiality of the information and take into account the quantitative requirements for data integrity.

Keywords


Protection of Information, the data processing system, security policy, mathematical models

Full Text:

PDF

References


Ahmad D., Dubrovskiy A. & Flinn Х. (2005). Defense from the hackers of corporate networks. Moscow. Companies AyTi; DMK - Press.

Chertov R., Fahmy S., & Shroff N. (2006). Emulation versus simulation: A case study of TCP-targeted denial of service attacks. In Proc. of the 2nd International Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, p. 10.

Chi S., Park J., Jung K. & Lee J. (2001). Network Security Modeling and Cyber At-tack Simulation Methodology//LNCS. Vol. 2119.

Goldman R. (2002). A Stochastic Model for Intrusions // LNCS. Vol. 2516.

Gorodetski V. & Kotenko I. (2002). Attacks against Computer Network: Formal Grammar-based Framework and Simulation Tool. RAID 2000 // LNCS. Vol. 2516.

Harel D. (1987). Visual Formalism for Complex Systems, Science of Computer Programming 8. p. 231-274.

Lahno V. & Petrov A. (2010) . Modelling of discrete recognition and information vulnerability search procedures. TEKA. Volume XI A. p. 137-144.

Lahno V. & Petrov A. (2011). Ensuring security of automated information systems, transportation companies with the intensification of traffic. Lugansk. VNU.

Rogozin Е. А. Е- network presentation of functioning of the perspective programmatic system of priv. Journal - Questions of information security. - 2003. N 3(62). - P. 71-74.

Shun-Chieh Lin & Shian-Shyong Tseng. (2004). Constructing detection knowledge for DDoS intrusion tolerance // Expert Systems with Applications. - 2004. - V. 27. P. 379–390.

Smirniy M. & Lahno V. (2009). The research of the conflict request threads in the data protection systems. Proceedings of Lugansk branch of the International Academy of Informatization. V 2(20). р. 23-30.


Refbacks

  • There are currently no refbacks.