Functional modeling of formalization malware implementation tactics
This paper is devoted to illustrating the possibilities of using the methodological apparatus of functional modeling to solve the problem of formalized representation of threats of destructive impact of malicious software on the operating environment of an automated control system for special purpos...
Saved in:
| Main Authors: | , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2024-11-01
|
| Series: | Безопасность информационных технологий |
| Subjects: | |
| Online Access: | https://bit.spels.ru/index.php/bit/article/view/1717 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850270545347608576 |
|---|---|
| author | Igor I. Korchagin Ksenia E. Amelina Alexander N. Stadnik Anton O. Karetskiy Valeriy S. Antonov |
| author_facet | Igor I. Korchagin Ksenia E. Amelina Alexander N. Stadnik Anton O. Karetskiy Valeriy S. Antonov |
| author_sort | Igor I. Korchagin |
| collection | DOAJ |
| description | This paper is devoted to illustrating the possibilities of using the methodological apparatus of functional modeling to solve the problem of formalized representation of threats of destructive impact of malicious software on the operating environment of an automated control system for special purposes. It examines an attacker's sequence of actions to compromise the confidentiality, integrity, and availability of information on these systems, using malicious code as a tool to destructively affect their operating environment to their operating environment with malicious code. The article presents the results of functional decomposition of the target function of the threat into its stages realized by the intruder - infiltration of malicious code into the operating environment of a special-purpose automated control system, its execution of destructive actions and concealment of traces of destructive impact. The tactics performed in this process are described, as well as the malware techniques used. A formalized representation of the multiple structure of the decomposition representation of the target function is given. Functional diagrams of the corresponding functional components are given in terms of the IDEF0 methodology. The prerequisites for the development of mathematical models in terms of the Markov process for determining the time characteristics of individual functional components and the objective function as a whole are substantiated. The developed functional model serves as a tool for assessing the ability of an intruder to implement such threats and damage to the object of control caused by information failures of the system. The purpose of this article is to illustrate the possibilities of achieving the required level of adequacy of mathematical models for studying the threats of the destructive impact of malicious objects on such systems. |
| format | Article |
| id | doaj-art-47fef815825e4662bf493c0e8bf2b7e4 |
| institution | OA Journals |
| issn | 2074-7128 2074-7136 |
| language | English |
| publishDate | 2024-11-01 |
| publisher | Joint Stock Company "Experimental Scientific and Production Association SPELS |
| record_format | Article |
| series | Безопасность информационных технологий |
| spelling | doaj-art-47fef815825e4662bf493c0e8bf2b7e42025-08-20T01:52:37ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362024-11-01314879810.26583/bit.2024.4.051423Functional modeling of formalization malware implementation tacticsIgor I. Korchagin0Ksenia E. Amelina1Alexander N. Stadnik2Anton O. Karetskiy3Valeriy S. Antonov4JSC “Information Implementation Company”Bauman Moscow State Technical UniversityKrasnodar Higher Military awarded School named after the general of the Army S.M. ShtemenkoKrasnodar Higher Military awarded School named after the general of the Army S.M. ShtemenkoKrasnodar Higher Military awarded School named after the general of the Army S.M. ShtemenkoThis paper is devoted to illustrating the possibilities of using the methodological apparatus of functional modeling to solve the problem of formalized representation of threats of destructive impact of malicious software on the operating environment of an automated control system for special purposes. It examines an attacker's sequence of actions to compromise the confidentiality, integrity, and availability of information on these systems, using malicious code as a tool to destructively affect their operating environment to their operating environment with malicious code. The article presents the results of functional decomposition of the target function of the threat into its stages realized by the intruder - infiltration of malicious code into the operating environment of a special-purpose automated control system, its execution of destructive actions and concealment of traces of destructive impact. The tactics performed in this process are described, as well as the malware techniques used. A formalized representation of the multiple structure of the decomposition representation of the target function is given. Functional diagrams of the corresponding functional components are given in terms of the IDEF0 methodology. The prerequisites for the development of mathematical models in terms of the Markov process for determining the time characteristics of individual functional components and the objective function as a whole are substantiated. The developed functional model serves as a tool for assessing the ability of an intruder to implement such threats and damage to the object of control caused by information failures of the system. The purpose of this article is to illustrate the possibilities of achieving the required level of adequacy of mathematical models for studying the threats of the destructive impact of malicious objects on such systems.https://bit.spels.ru/index.php/bit/article/view/1717automated control systems for special purposes, malicious software, functional modeling, idef0 notation, anti-virus information protection tools, data protection. |
| spellingShingle | Igor I. Korchagin Ksenia E. Amelina Alexander N. Stadnik Anton O. Karetskiy Valeriy S. Antonov Functional modeling of formalization malware implementation tactics Безопасность информационных технологий automated control systems for special purposes, malicious software, functional modeling, idef0 notation, anti-virus information protection tools, data protection. |
| title | Functional modeling of formalization malware implementation tactics |
| title_full | Functional modeling of formalization malware implementation tactics |
| title_fullStr | Functional modeling of formalization malware implementation tactics |
| title_full_unstemmed | Functional modeling of formalization malware implementation tactics |
| title_short | Functional modeling of formalization malware implementation tactics |
| title_sort | functional modeling of formalization malware implementation tactics |
| topic | automated control systems for special purposes, malicious software, functional modeling, idef0 notation, anti-virus information protection tools, data protection. |
| url | https://bit.spels.ru/index.php/bit/article/view/1717 |
| work_keys_str_mv | AT igorikorchagin functionalmodelingofformalizationmalwareimplementationtactics AT kseniaeamelina functionalmodelingofformalizationmalwareimplementationtactics AT alexandernstadnik functionalmodelingofformalizationmalwareimplementationtactics AT antonokaretskiy functionalmodelingofformalizationmalwareimplementationtactics AT valeriysantonov functionalmodelingofformalizationmalwareimplementationtactics |