Марковская модель совместных киберугроз и ее применение для выбора оптимального набора средств защиты информации
https://doi.org/10.18255/1818-1015-2020-1-108-123
Аннотация
Об авторах
Адиль Аскарович КасеновРоссия
магистрант
Алексей Анатольевич Магазев
Россия
доктор физ.-мат. наук, профессор
Валерия Федоровна Цырульник
Россия
аспирантка
Список литературы
1. N. Ye, Y. Zhang, and B. C.M., “Robustness of the Markov-chain model for cyber-attack detection”, IEEE Transactions on Reliability, vol. 53, no. 1, pp. 116–123, 2004.
2. S. Jha, K. Tan, and R. Maxion, “Markov Chains, Classifiers, and Intrusion Detection.”, in Proc. IEEE Computer Security Foundations Workshops, vol. 1, 2001, pp. 206–219.
3. A. Ahmadian Ramaki, A. Rasoolzadegan, and A. Javan Jafari, “A systematic review on intrusion detection based on the Hidden Markov Model”, Statistical Analysis and Data Mining: The ASA Data Science Journal, vol. 11, no. 3, pp. 111–134, 2018.
4. P. Garcia-Teodoro, J. Diaz-Verdejo, G. Macia-Fern ´ andez, and E. V ´ azquez, “Anomaly-based network ´ intrusion detection: Techniques, systems and challenges”, Computers and Security, vol. 28, no. 1-2, pp. 18–28, 2009.
5. L. Billings, W. Spears, and I. Schwartz, “A unified prediction of computer virus spread in connected networks”, Physics Letters A, vol. 297, no. 3-4, pp. 261–266, 2002.
6. A. Boyko, “Sposob analiticheskogo modelirovaniya protsessa rasprostraneniya virusov v komp’yuternykh setyakh razlichnoy struktury”, Trudy SPIIRAN, vol. 5, no. 42, pp. 196–211, 2015.
7. Y. Dalinger, D. Babanin, and B. S.M., “Matematicheskie modeli rasprostraneniya virusov v komp’yuternykh setyakh razlichnoy struktury”, Informatika i sistemy upravleniya, no. 4, pp. 25–33, 2012.
8. A. Del Rey, “Mathematical modeling of the propagation of malware: a review”, Security and Communication Networks, vol. 8, no. 15, pp. 2561–2579, 2015.
9. M. Yang, R. Jiang, T. Gao, W. Xie, and J. Wang, “Research on Cloud Computing Security Risk Assessment Based on Information Entropy and Markov Chain.”, I. J. Network Security, vol. 20, no. 4, p. 664–673, 2018.
10. C. Xiaolin, T. Xiaobin, Z. Yong, and X. Hongsheng, “A Markov game theory-based risk assessment model for network information system”, in International Conference on Computer Science and Software Engineering, China, IEEE, vol. 3, 2008, pp. 1057–1061.
11. H. Orojloo and M. Azgomi, “A method for modeling and evaluation of the security of cyber-physical systems”, in 11th International ISC Conference on Information Security and Cryptology, Iran, IEEE, 2014, pp. 131–136.
12. J. Almasizadeh and M. Azgomi, “A stochastic model of attack process for the evaluation of security metrics”, Computer Networks, vol. 57, no. 10, pp. 2159–2180, 2013.
13. K. Shcheglov and A. Shcheglov, “Markovskie modeli ugrozy bezopasnosti informatsionnoy sistemy”, Izvestiya vysshikh uchebnykh zavedeniy. Priborostroenie, vol. 58, no. 12, pp. 957–965, 2015.
14. A. Rosenko, “Matematicheskoe modelirovanie vliyaniya vnutrennikh ugroz na bezopasnost’ konfidentsial’noy informatsii, tsirkuliruyushchey v avtomatizirovannoy informatsionnoy sisteme”, Izvestiya Yuzhnogo federal’nogo universiteta. Tekhnicheskie nauki, vol. 85, no. 8, pp. 71–81, 2008.
15. A. Magazev and V. Tsyrulnik, “Investigation of a Markov Model for Computer System Security reats”, Automatic Control and Computer Sciences, vol. 52, no. 7, pp. 615–624, 2018.
16. A. Magazev and V. Tsyrulnik, “Optimizing the selection of information security remedies in terms of a Markov security model”, in Journal of Physics: Conference Series, vol. 1096, 2018, p. 012 160.
17. D. Shirtz and Y. Elovici, “Optimizing investment decisions in selecting information security remedies”, Information Management and Computer Security, vol. 19, no. 2, pp. 95–112, 2011.
18. P. A.P., Y. Brychkov, and M. O.I., Integrals and series: Elementary functions. Gordon&Breach Sci. Publ., New York, 1986, vol. 1.
19. W. Feller, An introduction to probability theory and its applications. John Wiley & Sons Inc, 1968, vol. 1, 528 pp.
20. A. e. a. Ovchinnikov, “Matematicheskaya model’ optimal’nogo vybora sredstv zashchity ot ugroz bezopasnosti vychislitel’noy seti predpriyatiya”, Vestnik Moskovskogo gosudarstvennogo tekhnicheskogo universiteta im. N. E. Baumana. Ser. “Priborostroenie”, no. 3, pp. 115–121, 2007.
21. M. Kovalev, Diskretnaya optimizatsiya (tselochislennoe programmirovanie), 2-e izd., stereotipnoe. Editorial URSS, 2003, 192 pp.
22. Beshelev, S.D., and F. Gurvich, Matematiko-statisticheskie metody ekspertnykh otsenok. 1980, 263 pp.
Рецензия
Для цитирования:
Касенов А.А., Магазев А.А., Цырульник В.Ф. Марковская модель совместных киберугроз и ее применение для выбора оптимального набора средств защиты информации. Моделирование и анализ информационных систем. 2020;27(1):108-123. https://doi.org/10.18255/1818-1015-2020-1-108-123
For citation:
Kassenov A.A., Magazev A.A., Tsyrulnik V.F. A Markov Model of Non-Mutually Exclusive Cyber Threats and its Applications for Selecting an Optimal Set of Information Security Remedies. Modeling and Analysis of Information Systems. 2020;27(1):108-123. (In Russ.) https://doi.org/10.18255/1818-1015-2020-1-108-123