Methods and algorithms to assess the destructive impact of violators on elements of distributed information systems
Download article in PDF format
Authors: Baranov V. V., Shelupanov A. A.
Annotation: The paper substantiates the relevance of the development of methods and algorithms to assess the destructive impact of violators on elements of distributed information systems. The analysis of scientific works and research in this field is carried out. The target functions of simple computer attacks have been identified and the objects of destructive influence (DI) to which they are directed have been identified. The goals, objectives and stages of complex computer attacks (CCAs) are structured. An algorithm and a graph object-oriented model for the formation of CCAs scenarios have been developed. Ontological structural and functional models (OS-FM) of components of distributed information systems (DIS) at the levels of the OSI\ISO model, represented as objects of destructive influence (DI), have been compiled, and a methodology to determine their vulnerabilities and consequences of destructive influence has been developed. A methodology has been developed to determine the preference of CCAs scenarios and the degree of their criticality based on digital security maps reflecting the topology and functional processes of the DIS elements, allowing to assess the possibil-ity of information security threats and their preferred scenarios.
Keywords: digital security maps, techniques of computer attacks, tactics, scenarios, vulnerabilities, methods for assessing destructive effects, ontological modeling