Functional modeling of formalization malware implementation tactics

This paper is devoted to illustrating the possibilities of using the methodological apparatus of functional modeling to solve the problem of formalized representation of threats of destructive impact of malicious software on the operating environment of an automated control system for special purpos...

Full description

Saved in:
Bibliographic Details
Main Authors: Igor I. Korchagin, Ksenia E. Amelina, Alexander N. Stadnik, Anton O. Karetskiy, Valeriy S. Antonov
Format: Article
Language:English
Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 2024-11-01
Series:Безопасность информационных технологий
Subjects:
Online Access:https://bit.spels.ru/index.php/bit/article/view/1717
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850270545347608576
author Igor I. Korchagin
Ksenia E. Amelina
Alexander N. Stadnik
Anton O. Karetskiy
Valeriy S. Antonov
author_facet Igor I. Korchagin
Ksenia E. Amelina
Alexander N. Stadnik
Anton O. Karetskiy
Valeriy S. Antonov
author_sort Igor I. Korchagin
collection DOAJ
description This paper is devoted to illustrating the possibilities of using the methodological apparatus of functional modeling to solve the problem of formalized representation of threats of destructive impact of malicious software on the operating environment of an automated control system for special purposes. It examines an attacker's sequence of actions to compromise the confidentiality, integrity, and availability of information on these systems, using malicious code as a tool to destructively affect their operating environment to their operating environment with malicious code. The article presents the results of functional decomposition of the target function of the threat into its stages realized by the intruder - infiltration of malicious code into the operating environment of a special-purpose automated control system, its execution of destructive actions and concealment of traces of destructive impact. The tactics performed in this process are described, as well as the malware techniques used. A formalized representation of the multiple structure of the decomposition representation of the target function is given. Functional diagrams of the corresponding functional components are given in terms of the IDEF0 methodology. The prerequisites for the development of mathematical models in terms of the Markov process for determining the time characteristics of individual functional components and the objective function as a whole are substantiated. The developed functional model serves as a tool for assessing the ability of an intruder to implement such threats and damage to the object of control caused by information failures of the system. The purpose of this article is to illustrate the possibilities of achieving the required level of adequacy of mathematical models for studying the threats of the destructive impact of malicious objects on such systems.
format Article
id doaj-art-47fef815825e4662bf493c0e8bf2b7e4
institution OA Journals
issn 2074-7128
2074-7136
language English
publishDate 2024-11-01
publisher Joint Stock Company "Experimental Scientific and Production Association SPELS
record_format Article
series Безопасность информационных технологий
spelling doaj-art-47fef815825e4662bf493c0e8bf2b7e42025-08-20T01:52:37ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362024-11-01314879810.26583/bit.2024.4.051423Functional modeling of formalization malware implementation tacticsIgor I. Korchagin0Ksenia E. Amelina1Alexander N. Stadnik2Anton O. Karetskiy3Valeriy S. Antonov4JSC “Information Implementation Company”Bauman Moscow State Technical UniversityKrasnodar Higher Military awarded School named after the general of the Army S.M. ShtemenkoKrasnodar Higher Military awarded School named after the general of the Army S.M. ShtemenkoKrasnodar Higher Military awarded School named after the general of the Army S.M. ShtemenkoThis paper is devoted to illustrating the possibilities of using the methodological apparatus of functional modeling to solve the problem of formalized representation of threats of destructive impact of malicious software on the operating environment of an automated control system for special purposes. It examines an attacker's sequence of actions to compromise the confidentiality, integrity, and availability of information on these systems, using malicious code as a tool to destructively affect their operating environment to their operating environment with malicious code. The article presents the results of functional decomposition of the target function of the threat into its stages realized by the intruder - infiltration of malicious code into the operating environment of a special-purpose automated control system, its execution of destructive actions and concealment of traces of destructive impact. The tactics performed in this process are described, as well as the malware techniques used. A formalized representation of the multiple structure of the decomposition representation of the target function is given. Functional diagrams of the corresponding functional components are given in terms of the IDEF0 methodology. The prerequisites for the development of mathematical models in terms of the Markov process for determining the time characteristics of individual functional components and the objective function as a whole are substantiated. The developed functional model serves as a tool for assessing the ability of an intruder to implement such threats and damage to the object of control caused by information failures of the system. The purpose of this article is to illustrate the possibilities of achieving the required level of adequacy of mathematical models for studying the threats of the destructive impact of malicious objects on such systems.https://bit.spels.ru/index.php/bit/article/view/1717automated control systems for special purposes, malicious software, functional modeling, idef0 notation, anti-virus information protection tools, data protection.
spellingShingle Igor I. Korchagin
Ksenia E. Amelina
Alexander N. Stadnik
Anton O. Karetskiy
Valeriy S. Antonov
Functional modeling of formalization malware implementation tactics
Безопасность информационных технологий
automated control systems for special purposes, malicious software, functional modeling, idef0 notation, anti-virus information protection tools, data protection.
title Functional modeling of formalization malware implementation tactics
title_full Functional modeling of formalization malware implementation tactics
title_fullStr Functional modeling of formalization malware implementation tactics
title_full_unstemmed Functional modeling of formalization malware implementation tactics
title_short Functional modeling of formalization malware implementation tactics
title_sort functional modeling of formalization malware implementation tactics
topic automated control systems for special purposes, malicious software, functional modeling, idef0 notation, anti-virus information protection tools, data protection.
url https://bit.spels.ru/index.php/bit/article/view/1717
work_keys_str_mv AT igorikorchagin functionalmodelingofformalizationmalwareimplementationtactics
AT kseniaeamelina functionalmodelingofformalizationmalwareimplementationtactics
AT alexandernstadnik functionalmodelingofformalizationmalwareimplementationtactics
AT antonokaretskiy functionalmodelingofformalizationmalwareimplementationtactics
AT valeriysantonov functionalmodelingofformalizationmalwareimplementationtactics