FUNCTIONAL MODEL OF THE PROCESS OF INFORMATION SECURITY THREATS IMPLEMENTATION USING COVERT STEGANOGRAPHIC CHANNELS BY AN EXTERNAL INTRUDER
The functional description of processes of information security threats implementation by hidden steganographic channels as a way of their realization by an external intruder in the absence of measures to counteract such threats is given. The article considers the mechanisms of information hiding an...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2025-05-01
|
| Series: | Безопасность информационных технологий |
| Subjects: | |
| Online Access: | https://bit.spels.ru/index.php/bit/article/view/1777 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Summary: | The functional description of processes of information security threats implementation by hidden steganographic channels as a way of their realization by an external intruder in the absence of measures to counteract such threats is given. The article considers the mechanisms of information hiding and transmitting by using steganography, which allow to bypass conventional information protection measures. The analysis of methods of information security threats implementation by steganographic channels for malware deployment, management and stealing sensitive information is carried out. A descriptive model and functional model of process of implementing threats in the absence of protection measures have been developed. These models can be used to develop analytical models for estimating the time required for the realization of the investigated information security threats, characterizing the dynamics of their implementation in the absence and applying protection measures. An indicator for assessing information security is proposed. It is shown that, while developing analytical models for calculating this indicator, necessary to consider the interrelation of parallel processes of information processing in information systems, threats to its security by hidden steganography channels and counteraction to the implementation of these threats using steganalysis. To develop these models, it is reasonable to use the apparatus of composite Petri-Markov networks. |
|---|---|
| ISSN: | 2074-7128 2074-7136 |