About the informatization object functioning stability assessment in conditions of computer attacks at exponential distribution law of time before the enemy’s impact
Objective. The aim of the study is to develop a mathematical model for assessing the stability of the functioning of an informatization object (IO) in the conditions of computer attacks (CA), assuming that the laws of distribution of random variables before the enemy's impact and the recovery t...
Saved in:
Published in: | Vestnik Dagestanskogo gosudarstvennogo tehničeskogo universiteta. Tehničeskie nauki (Online) Vol. 49; no. 3; pp. 39 - 51 |
---|---|
Main Authors: | , , |
Format: | Journal Article |
Language: | English |
Published: |
Dagestan State Technical University
07-11-2022
|
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Objective.
The aim of the study is to develop a mathematical model for assessing the stability of the functioning of an informatization object (IO) in the conditions of computer attacks (CA), assuming that the laws of distribution of random variables before the enemy's impact and the recovery time are distributed exponentially.
Method.
Application of the method of discrete Markov processes to solve the problem of assessing the stability of IO, which differs from the known approaches in that to describe the state of IO, the concept of "non-returnable state" is introduced, into which the system can move due to the exhaustion of the resource allocated to restore its readiness after a successful CA.
Result
. As a result of the research, a mathematical model has been developed that allows us to build the stability function of the IO taking into account the intensity of the CA flow and the intensity of restoring its operability, taking into account the limitations on the allocated resource.
Conclusion.
The application of the method makes it possible to quantify the stability of the functioning of the IO by constructing the survivability function of the IO for conditions under which the flows of attacks and recoveries cannot be assumed stationary and ergodic, and there is also no representative statistics for calculating asymptotic estimates of stability. A quantitative assessment of the stability of the IO for the conditions of the CA is in demand by information security management bodies when making decisions to ensure the protection of information, as well as when justifying the requirements for the system to restore operability. |
---|---|
ISSN: | 2073-6185 2542-095X |
DOI: | 10.21822/2073-6185-2022-49-3-39-51 |