PRIVATE TECHNIQUE OF FORMATION OF REQUIREMENTS TO INFORMATION PROTECTION SYSTEMS FROM UNAUTHORIZED ACCESS TO AUTOMATED BATH SYSTEMS USING GENETIC ALGORITHM
Objectives. Analysis of the existing methodology for the formation of requirements for information protection systems (GIS) from unauthorized access (NSD) to automated systems (AS) revealed a number of significant flaws, the main of which is the following: despite the fact that the considered method...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | Russian |
| Published: |
Dagestan State Technical University
2019-05-01
|
| Series: | Вестник Дагестанского государственного технического университета: Технические науки |
| Subjects: | |
| Online Access: | https://vestnik.dgtu.ru/jour/article/view/596 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850023821576241152 |
|---|---|
| author | I. G. Drovnikova A. A. Zmeev E. A. Rogozin |
| author_facet | I. G. Drovnikova A. A. Zmeev E. A. Rogozin |
| author_sort | I. G. Drovnikova |
| collection | DOAJ |
| description | Objectives. Analysis of the existing methodology for the formation of requirements for information protection systems (GIS) from unauthorized access (NSD) to automated systems (AS) revealed a number of significant flaws, the main of which is the following: despite the fact that the considered method undoubtedly has theoretical significance, the same time, it can not claim practical value. This is due to the fact that in this methodology, the studies were carried out not on a specific standard (widely used certified according to the regulations of the Federal Service for Technical and Export Control of Russia) GIS, and the data on threats of unauthorized access given in it do not correspond to reality (morally obsolete), but therefore require a significant upgrade. Accepting the existing methodology as a baseline, the purpose of the article is to develop a private method of forming requirements for GIS from unauthorized access to the AU, which has practical value and allows you to formulate quantitative requirements for a wide class of certified GIS.Method. When writing the article, the methods of system analysis, evolutionary modeling, probability theory and mathematical statistics, mathematical apparatus for modeling dynamic discrete networks (E-networks), and theory of algorithms were used. The methodological basis is a systematic approach.Result. A private methodology has been developed that determines the parameters of the symbolic genetic algorithm (GA) for creating a software package for analysis, evolutionary modeling, and forming quantitative requirements for GIS from un-authorized access to speakers using the Matlab 13 application software to implement GA in the Optimization toolbox programming environment.Conclusion. The proposed private method of forming requirements for GIS from unauthorized access in the AU using GA has a theoretical significance, practical value and allows you to formulate quantitative requirements for a wide class of AS certified in a certain class of security in accordance with the requirements of current regulatory documentation. |
| format | Article |
| id | doaj-art-d26a8dca6b134761ac2f7b2ff2fd3776 |
| institution | DOAJ |
| issn | 2073-6185 2542-095X |
| language | Russian |
| publishDate | 2019-05-01 |
| publisher | Dagestan State Technical University |
| record_format | Article |
| series | Вестник Дагестанского государственного технического университета: Технические науки |
| spelling | doaj-art-d26a8dca6b134761ac2f7b2ff2fd37762025-08-20T03:01:15ZrusDagestan State Technical UniversityВестник Дагестанского государственного технического университета: Технические науки2073-61852542-095X2019-05-0145311412210.21822/2073-6185-2018-45-3-114-122454PRIVATE TECHNIQUE OF FORMATION OF REQUIREMENTS TO INFORMATION PROTECTION SYSTEMS FROM UNAUTHORIZED ACCESS TO AUTOMATED BATH SYSTEMS USING GENETIC ALGORITHMI. G. Drovnikova0A. A. Zmeev1E. A. Rogozin2Voronezh Institute of the Ministry of the Interior of the Russian Federation.G.K. Zhukov Military Academy of Aerospace Defense.Voronezh Institute of the Ministry of the Interior of the Russian Federation.Objectives. Analysis of the existing methodology for the formation of requirements for information protection systems (GIS) from unauthorized access (NSD) to automated systems (AS) revealed a number of significant flaws, the main of which is the following: despite the fact that the considered method undoubtedly has theoretical significance, the same time, it can not claim practical value. This is due to the fact that in this methodology, the studies were carried out not on a specific standard (widely used certified according to the regulations of the Federal Service for Technical and Export Control of Russia) GIS, and the data on threats of unauthorized access given in it do not correspond to reality (morally obsolete), but therefore require a significant upgrade. Accepting the existing methodology as a baseline, the purpose of the article is to develop a private method of forming requirements for GIS from unauthorized access to the AU, which has practical value and allows you to formulate quantitative requirements for a wide class of certified GIS.Method. When writing the article, the methods of system analysis, evolutionary modeling, probability theory and mathematical statistics, mathematical apparatus for modeling dynamic discrete networks (E-networks), and theory of algorithms were used. The methodological basis is a systematic approach.Result. A private methodology has been developed that determines the parameters of the symbolic genetic algorithm (GA) for creating a software package for analysis, evolutionary modeling, and forming quantitative requirements for GIS from un-authorized access to speakers using the Matlab 13 application software to implement GA in the Optimization toolbox programming environment.Conclusion. The proposed private method of forming requirements for GIS from unauthorized access in the AU using GA has a theoretical significance, practical value and allows you to formulate quantitative requirements for a wide class of AS certified in a certain class of security in accordance with the requirements of current regulatory documentation.https://vestnik.dgtu.ru/jour/article/view/596automated systeminformation protection systemunauthorized accessgenetic algorithmevaluation network (e-network)markov model |
| spellingShingle | I. G. Drovnikova A. A. Zmeev E. A. Rogozin PRIVATE TECHNIQUE OF FORMATION OF REQUIREMENTS TO INFORMATION PROTECTION SYSTEMS FROM UNAUTHORIZED ACCESS TO AUTOMATED BATH SYSTEMS USING GENETIC ALGORITHM Вестник Дагестанского государственного технического университета: Технические науки automated system information protection system unauthorized access genetic algorithm evaluation network (e-network) markov model |
| title | PRIVATE TECHNIQUE OF FORMATION OF REQUIREMENTS TO INFORMATION PROTECTION SYSTEMS FROM UNAUTHORIZED ACCESS TO AUTOMATED BATH SYSTEMS USING GENETIC ALGORITHM |
| title_full | PRIVATE TECHNIQUE OF FORMATION OF REQUIREMENTS TO INFORMATION PROTECTION SYSTEMS FROM UNAUTHORIZED ACCESS TO AUTOMATED BATH SYSTEMS USING GENETIC ALGORITHM |
| title_fullStr | PRIVATE TECHNIQUE OF FORMATION OF REQUIREMENTS TO INFORMATION PROTECTION SYSTEMS FROM UNAUTHORIZED ACCESS TO AUTOMATED BATH SYSTEMS USING GENETIC ALGORITHM |
| title_full_unstemmed | PRIVATE TECHNIQUE OF FORMATION OF REQUIREMENTS TO INFORMATION PROTECTION SYSTEMS FROM UNAUTHORIZED ACCESS TO AUTOMATED BATH SYSTEMS USING GENETIC ALGORITHM |
| title_short | PRIVATE TECHNIQUE OF FORMATION OF REQUIREMENTS TO INFORMATION PROTECTION SYSTEMS FROM UNAUTHORIZED ACCESS TO AUTOMATED BATH SYSTEMS USING GENETIC ALGORITHM |
| title_sort | private technique of formation of requirements to information protection systems from unauthorized access to automated bath systems using genetic algorithm |
| topic | automated system information protection system unauthorized access genetic algorithm evaluation network (e-network) markov model |
| url | https://vestnik.dgtu.ru/jour/article/view/596 |
| work_keys_str_mv | AT igdrovnikova privatetechniqueofformationofrequirementstoinformationprotectionsystemsfromunauthorizedaccesstoautomatedbathsystemsusinggeneticalgorithm AT aazmeev privatetechniqueofformationofrequirementstoinformationprotectionsystemsfromunauthorizedaccesstoautomatedbathsystemsusinggeneticalgorithm AT earogozin privatetechniqueofformationofrequirementstoinformationprotectionsystemsfromunauthorizedaccesstoautomatedbathsystemsusinggeneticalgorithm |