FIELD: information protection.
SUBSTANCE: method for identifying software vulnerabilities forming the conditions for information security violation in an information system due to a computer attack consists in forming a set of types of terms of known computer attack techniques (hereinafter referred to as techniques) and vulnerabilities identified by analysing the descriptions of techniques and vulnerabilities; determining the weights of each type of terms by an expert evaluation method; forming an ordered vector of types of terms with account to the weights; forming vector representations of each technique and vulnerability included in the formed set, represented as values of the types of terms; calculating measures of matching of the descriptions of techniques and vulnerabilities in order to determine identity thereof; and forming a list of vulnerabilities required to implement a computer attack based on the calculated measures of matching of the descriptions of techniques and vulnerabilities.
EFFECT: higher effectiveness of forming a list of information system vulnerabilities, the operation whereof may lead to a violation of information security in the information systems.
1 cl, 1 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD OF CONTROLLING PROTECTION SURFACE OF CORPORATE COMMUNICATION NETWORK | 2023 |
|
RU2824314C1 |
METHOD AND SYSTEM FOR AUTOMATED DOCUMENTATION OF SECURITY THREATS AND VULNERABILITIES RELATED TO AN INFORMATION RESOURCE | 2022 |
|
RU2789990C1 |
METHOD FOR AUTOMATED TESTING OF SOFTWARE AND HARDWARE SYSTEMS AND COMPLEXES | 2018 |
|
RU2715025C2 |
METHOD OF AUTOMATED DESIGN ENGENEERING OF HARDWARE AND SOFTWARE SYSTEMS AND COMPLEXES | 2017 |
|
RU2659740C1 |
CONTROL SYSTEM FOR SECURITY POLICY OF ELEMENTS OF CORPORATE COMMUNICATION NETWORK | 2023 |
|
RU2813469C1 |
METHOD OF DETERMINING POTENTIAL THREATS TO INFORMATION SECURITY BASED ON INFORMATION ON VULNERABILITIES OF SOFTWARE | 2019 |
|
RU2705460C1 |
METHOD OF COMPUTER SECURITY DISTRIBUTED EVENTS INVESTIGATION | 2015 |
|
RU2610395C1 |
SYSTEM AND METHOD FOR DETERMINING THE LEVEL OF DANGER OF INFORMATION SECURITY EVENTS | 2022 |
|
RU2800739C1 |
DEVICE FOR COMPLEX DYNAMIC EVALUATION AND PROVISION OF REQUIRED SECURITY OF COMPUTER NETWORK | 2022 |
|
RU2818880C2 |
SOFTWARE AND HARDWARE COMPLEX OF THE DECISION SUPPORT SYSTEM FOR MANAGING THE RELAY PROTECTION SUBSYSTEM AND AUTOMATION OF A DIGITAL SUBSTATION IN THE CONDITIONS OF COMPUTER ATTACKS AGAINST IT | 2022 |
|
RU2798437C1 |
Authors
Dates
2022-11-10—Published
2021-09-15—Filed