the METHOD OF CONSTRUCTING MODELS OF INFORMATION ATTACKS

СПОСОБ ПОСТРОЕНИЯ МОДЕЛЕЙ ИНФОРМАЦИОННЫХ АТАК

Authors

  • Aliya Barakova phd
  • Александровна Almaty University of Power Engineering and Telecommunications named after Gumarbek Daukeyev

Keywords:

attack, modeling, information attack model, managing E-network, agent, multi-agent management.

Abstract

The existing approaches to the construction of formal models of information attacks are considered and analyzed. The basic requirements for information attack models are formulated. A method is proposed for constructing models of information attacks based on control E-network transitions and multi-agent management, taking into account the formulated requirements. The considered approaches to modeling allow describing the process of an information attack with varying degrees of detail. The models use different mathematical bases, but most of them are based on finite automata and represent the attack as

a sequence of automaton states. None of the models makes it possible to take into account the vulnerability activated by such a complex, the method of its implementation and possible consequences. The models allow us to more accurately determine the effectiveness of existing

and developed means of protection against simulated information attacks

Downloads

Download data is not yet available.

Downloads

Published

2023-09-27

How to Cite

Barakova, A., & Ussatova, O. (2023). the METHOD OF CONSTRUCTING MODELS OF INFORMATION ATTACKS: СПОСОБ ПОСТРОЕНИЯ МОДЕЛЕЙ ИНФОРМАЦИОННЫХ АТАК. ADVANCED TECHNOLOGIES AND COMPUTER SCIENCE, 1(3), 32–38. Retrieved from https://atcs.iict.kz/index.php/atcs/article/view/139

Issue

Section

Information Security and Data Protection