FIELD: computer technology.
SUBSTANCE: claimed invention relates to the field of computer technology and can be used to assess the security of automated systems (AS). The method for simulating the process of functioning of the AS is designed to carry out measures to assess the security of the AS. The specified technical result is achieved by the fact that, based on the information about the system collected during the security assessment process, using virtualization tools, a virtual environment is formed that most accurately imitates the structure and configuration of the AS. In the process of simulating the functioning of the AS with dynamic periodicity, obeying the Poisson distribution law, they generate requests for sending data, transmitting data, and carrying out a malicious impact. When processing requests, the status of its execution generates counters of successfully completed requests, violations of confidentiality, integrity and availability of processed information, which are then used to plot the dependence of the corresponding indicators on time. Based on the data obtained, the official who performs the check determines the most relevant vulnerabilities of the real AS.
EFFECT: increasing the efficiency of the AS security assessment process with the implementation of imitation of destructive information impacts on the system under test that have a direct impact on the system under test at a fixed level of reliability of the assessment results due to the formation of the AS model that most fully reflects the features and processes of the operation of the test object, and simulating destructive impacts in relation to the above model.
1 cl, 3 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD OF COMPUTER NETWORKS PROTECTION | 2017 |
|
RU2649789C1 |
METHOD OF DETECTING REMOTE ATTACKS ON AUTOMATED CONTROL SYSTEMS | 2016 |
|
RU2628913C1 |
AUTOMATED CYBERSECURITY EVENT TESTING SYSTEM | 2019 |
|
RU2747099C1 |
METHOD FOR PROTECTION OF AUTOMATED SYSTEMS | 2009 |
|
RU2408927C1 |
METHOD OF PROTECTING COMPUTER NETWORKS | 2018 |
|
RU2696330C1 |
METHOD OF TESTING FIREWALLS FOR INFORMATION SECURITY REQUIREMENTS | 2024 |
|
RU2824313C1 |
ARTIFICIAL INTELLIGENCE BASED COMPUTER SECURITY SYSTEM | 2017 |
|
RU2750554C2 |
METHOD OF DETECTION OF COMPUTER ATTACKS IN INFORMATION AND TELECOMMUNICATION NETWORK | 2013 |
|
RU2531878C1 |
METHOD OF PROTECTION OF INFORMATION SYSTEMS | 2023 |
|
RU2805368C1 |
METHOD FOR INCREASING THE STABILITY OF INFORMATION TRANSMISSION THROUGH COMMUNICATION CHANNELS OF VIRTUAL PRIVATE NETWORKS | 2021 |
|
RU2755684C1 |
Authors
Dates
2023-01-16—Published
2022-04-12—Filed