z-logo
open-access-imgOpen Access
Model and Technique for Abonent Address Masking in Cyberspace
Author(s) -
Vadim Kuchurov,
Roman Maximov,
Roman Sherstobitov
Publication year - 2020
Publication title -
voprosy kiberbezopasnosti
Language(s) - English
Resource type - Journals
ISSN - 2311-3456
DOI - 10.21681/2311-3456-2020-06-2-13
Subject(s) - computer science , cyberspace , masking (illustration) , emulation , set (abstract data type) , information system , information exchange , probabilistic logic , information security , process (computing) , information sensitivity , information processing , computer security , risk analysis (engineering) , the internet , engineering , artificial intelligence , telecommunications , medicine , art , neuroscience , world wide web , electrical engineering , economics , visual arts , biology , programming language , economic growth , operating system
Regulators charge to counter information security threats against the structural and functional characteristics of the information system to ensure the information security requirements. These requirements include information system structure and composition, information technologies and functioning characteristics, physical and logical, functional and technological interconnections between information system segments. They order false components of information system emulation as a basic step of protection, as well as information technologies hiding, information system configuration management and its switching to predetermined configuration that provides a protection. However that steps are not included into basic set and they protection aims are reached with compensative assets, formalizing and implementing inhibitory orders and set of organizational and technical measures on threat source. The purpose of research – to disclose and to state main ways of search of new technical solutions for structure masking of distributed information systems in cyberspace implementing masking traffic taking into account the requirements for the timeliness of information exchange. The method of research – operations research in the face of uncertainty, the application of the theory of Markov processes and Kolmogorov equation for solving the problem of increasing the efficiency of masking exchange. The result of research – finding the probabilistic and temporal characteristics of the functioning process of the data transmission network when applying technical solutions for information systems masking in cyberspace. The results obtained make it possible to explicitly implement protection measures aimed at forming persistent false stereotypes among violators about information systems and control processes implemented with their help.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here