the METHOD OF CONSTRUCTING MODELS OF INFORMATION ATTACKS
СПОСОБ ПОСТРОЕНИЯ МОДЕЛЕЙ ИНФОРМАЦИОННЫХ АТАК
Keywords:
attack, modeling, information attack model, managing E-network, agent, multi-agent management.Abstract
The existing approaches to the construction of formal models of information attacks are considered and analyzed. The basic requirements for information attack models are formulated. A method is proposed for constructing models of information attacks based on control E-network transitions and multi-agent management, taking into account the formulated requirements. The considered approaches to modeling allow describing the process of an information attack with varying degrees of detail. The models use different mathematical bases, but most of them are based on finite automata and represent the attack as
a sequence of automaton states. None of the models makes it possible to take into account the vulnerability activated by such a complex, the method of its implementation and possible consequences. The models allow us to more accurately determine the effectiveness of existing
and developed means of protection against simulated information attacks
Downloads
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 ADVANCED TECHNOLOGIES AND COMPUTER SCIENCE
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.