Justification of network attacks time distribution in automated systems of internal affairs bodies based on a full-scale experiment

Autor: Irina G. Drovnikova, Elena S. Ovchinnikova
Jazyk: English<br />Russian
Rok vydání: 2021
Předmět:
Zdroj: Безопасность информационных технологий, Vol 28, Iss 3, Pp 28-43 (2021)
Druh dokumentu: article
ISSN: 2074-7128
2074-7136
DOI: 10.26583/bit.2021.3.02
Popis: The goal of the paper is to substantiate the laws of time distribution at various stages of the implementation of network attacks in protected automated systems of internal affairs bodies. To achieve this goal, a full-scale experiment to study the dynamics of the "Network attack-protection system" information conflict was carried on taking into account the differences in the initial and potential capabilities of the conflicting parties on the basis of the developed generalized graph model. The results of the full-scale experiment are presented in the form of quantitative values of the start and implementation times of typical network attack affecting information resources and elements of a protected automated system of internal affairs bodies, the times of loading and functioning of the information protection system. The number of iterations of experiments with a network attack and security system sufficient for an adequate justification of the laws of time distribution at various stages of conflict interaction is calculated. To justify the normal law of time distribution at the initial stage of the information conflict, the -criterion of K. Pearson was used, while to justify the exponential law at its subsequent stage the -criterion of A.N. Kolmogorov was used. The results of the empirical distribution of the values of the time of the implementation of a network attack and the functioning of the protection system are presented in tabular form and graphically displayed. Knowledge of the distribution laws will allow us to develop an analytical model of the"Network attack-protection system" information conflict based on a graph of the dynamics of the implementation of a typical network attack and a generalized graph of the dynamics of the conflict. The prospects of using the developed analytical model are associated with the calculation of probabilistic-temporal characteristics and an accurate quantitative assessment of the danger of implementing network attacks in automated systems operated in a protected version at the informatization objects in internal affairs bodies.
Databáze: Directory of Open Access Journals