Abstract. Aim Currently, the implementation of computational experiments to determine the probabilistic-temporal characteristics of protection functions for automated information systems is a complex and costly task. In order to study the dynamics of transitions between the states of this type of system, it is necessary to develop a mathematical model and an algorithm for computing the corresponding characteristics.Method. To achieve this goal, a mathematical model of the information security system was developed in the MATLAB software environment. The main advantages of this software environment consist in a high level of visualisation, the ability to modify models to analyse other systems of this type and the availability of integration tools with other software products.Results. The article presents a numerical and analytical model of a system for protecting information from unauthorised access. The functional dynamics of the system are described using a stochastic Petri net. In order to solve the integral equations and determine the probabilities of reaching the final state in a given time, the Laplace transform is used. The solution is carried out in an analytical mode to obtain an explicit form of the dependences of the probability-time characteristics of the system on the probabilities of transitions between states and the average times the system stays in each state. The paper presents the results of calculating the probability-time characteristics of the “Turning on the personal computer and user identification” subsystem of the “Guard NT” system for preventing unauthorised access to information.Conclusion. The developed model, which can be used to study the dynamics of transitions between states of an information protection system against unauthorised access in an automated system, as well as to optimise the time it takes to complete functional tasks, can also be used to improve the operational efficiency of these systems.
The paper presents a mathematical model of functioning of the system of information protection (IPS) from unauthorized access (UA) in automated systems (AS). This model was developed in framework of the CPN Tools software environment. For convenience, visibility and preservation of logical integrity, the model is divided into subsystems using the tools built into CPN Tools. The model is necessary for a computational experiment, namely, to study the real consumer properties of IPS from UA in AS, as well as for development a software package for analyzing and quantifying the effectiveness of these systems. The results of the simulation of functioning of the IPS from the UA in the AS can be presented in the form of various characteristics of each state, which characterize the work of the system as a whole and its subsystems. The developed simulation model can be used to create similar systems, during their operation, during certification of information security systems, during certification of informatization facilities, and during periodic monitoring of used information protection software at these facilities. The programming language Meta language used by CPN Tools allows you to monitor random transitions of the marker from the initial state to the final through the intermediate one, to set time delays, etc. The simulation model of IPS from UA to AS will be used in further studies to build the models of impact of various types of threats to this system according to the bank data threats to information security of the Federal Service for Technical and Export Control of Russia.
Целью и задачами исследования являются: анализ нормативных международных и российских документов, а также научных материалов по проблемам оценки качества программного обеспечения; исследование свойств эффективности функционирования систем защиты информации от несанкционированного доступа в автоматизированных информационных системах; аналитическое обобщение существующих недостатков систем защиты информации от несанкционированного доступа в автоматизированных информационных системах, на основе которых разработать показатели эффективности функционирования. На основе проведенного анализа обосновать и разработать критерии оценок эффективности функционирования систем защиты информации от несанкционированного доступа в автоматизированных информационных системах. На основе созданных критериев и показателей разработать алгоритм интегральной оценки эффективности функционирования систем защиты информации от несанкционированного доступа в автоматизированных информационных системах. Метод. Методической основой решения поставленных цели и задач являются основные положения теории эффективности и теории систем. Результат. Разработаны критерии и показатели эффективности функционирования при создании в автоматизированных информационных системах на основе проведенного анализа открытых литературных источников и существующих недостатков реального использования систем защиты информации от несанкционированного доступа. Разработан алгоритм интегральной оценки эффективности функционирования систем защиты информации от несанкционированного доступа. Вывод. Cоздана система показателей эффективности функционирования систем защиты информации от несанкционированного доступа, включающая частные показатели (статические), практически независимые от времени, достоверность которых основывается на экспертных оценках) и интегральные (динамические), зависимые от времени, оценка которых основывается на математическом моделировании. Ключевые слова: автоматизированная информационная система, несанкционированный доступ к информации, качество, показатель, критерий, система защиты информации, оценка эффективности
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.