About the informatization object functioning stability assessment in conditions of computer attacks at exponential distribution law of time before the enemy’s impact

Objective. The aim of the study is to develop a mathematical model for assessing the stability of the functioning of an informatization object (IO) in the conditions of computer attacks (CA), assuming that the laws of distribution of random variables before the enemy's impact and the recovery t...

Full description

Saved in:
Bibliographic Details
Published in:Vestnik Dagestanskogo gosudarstvennogo tehničeskogo universiteta. Tehničeskie nauki (Online) Vol. 49; no. 3; pp. 39 - 51
Main Authors: Voevodin, V. A., Vinogradov, I. V., Volkov, D. I.
Format: Journal Article
Language:English
Published: Dagestan State Technical University 07-11-2022
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Objective. The aim of the study is to develop a mathematical model for assessing the stability of the functioning of an informatization object (IO) in the conditions of computer attacks (CA), assuming that the laws of distribution of random variables before the enemy's impact and the recovery time are distributed exponentially. Method. Application of the method of discrete Markov processes to solve the problem of assessing the stability of IO, which differs from the known approaches in that to describe the state of IO, the concept of "non-returnable state" is introduced, into which the system can move due to the exhaustion of the resource allocated to restore its readiness after a successful CA. Result . As a result of the research, a mathematical model has been developed that allows us to build the stability function of the IO taking into account the intensity of the CA flow and the intensity of restoring its operability, taking into account the limitations on the allocated resource. Conclusion. The application of the method makes it possible to quantify the stability of the functioning of the IO by constructing the survivability function of the IO for conditions under which the flows of attacks and recoveries cannot be assumed stationary and ergodic, and there is also no representative statistics for calculating asymptotic estimates of stability. A quantitative assessment of the stability of the IO for the conditions of the CA is in demand by information security management bodies when making decisions to ensure the protection of information, as well as when justifying the requirements for the system to restore operability.
ISSN:2073-6185
2542-095X
DOI:10.21822/2073-6185-2022-49-3-39-51