
USERS BEHAVIOR MODEL IN TASKS OF COMPUTER SYSTEMS SECURITY ANALYSIS
Author(s) -
V. P. Shyrochin,
Vadim Mukhin,
Hu Zheng Bing
Publication year - 2014
Publication title -
computing
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.184
H-Index - 11
eISSN - 2312-5381
pISSN - 1727-6209
DOI - 10.47839/ijc.2.2.221
Subject(s) - computer science , computer security , formalism (music) , information security , authentication (law) , identification (biology) , access control , human–computer interaction , art , musical , botany , visual arts , biology
Security of computer systems of various purpose and the appropriate information technologies appreciably depends on tools of user identification and authentication, and also on tools of the analysis of their behavior and behavior of their programs during reception of access to those or other information resources. This article is devoted to a substantiation of a method of use of a known formalism - state machine for modeling users behavior and to testing of protection tools on detection of attempts of the non-authorized access to information resources, including at early stages of preparation for such actions.