PRIVATE TECHNIQUE OF FORMATION OF REQUIREMENTS TO INFORMATION PROTECTION SYSTEMS FROM UNAUTHORIZED ACCESS TO AUTOMATED BATH SYSTEMS USING GENETIC ALGORITHM

Objectives. Analysis of the existing methodology for the formation of requirements for information protection systems (GIS) from unauthorized access (NSD) to automated systems (AS) revealed a number of significant flaws, the main of which is the following: despite the fact that the considered method...

Full description

Saved in:
Bibliographic Details
Main Authors: I. G. Drovnikova, A. A. Zmeev, E. A. Rogozin
Format: Article
Language:Russian
Published: Dagestan State Technical University 2019-05-01
Series:Вестник Дагестанского государственного технического университета: Технические науки
Subjects:
Online Access:https://vestnik.dgtu.ru/jour/article/view/596
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850023821576241152
author I. G. Drovnikova
A. A. Zmeev
E. A. Rogozin
author_facet I. G. Drovnikova
A. A. Zmeev
E. A. Rogozin
author_sort I. G. Drovnikova
collection DOAJ
description Objectives. Analysis of the existing methodology for the formation of requirements for information protection systems (GIS) from unauthorized access (NSD) to automated systems (AS) revealed a number of significant flaws, the main of which is the following: despite the fact that the considered method undoubtedly has theoretical significance, the same time, it can not claim practical value. This is due to the fact that in this methodology, the studies were carried out not on a specific standard (widely used certified according to the regulations of the Federal Service for Technical and Export Control of Russia) GIS, and the data on threats of unauthorized access given in it do not correspond to reality (morally obsolete), but therefore require a significant upgrade. Accepting the existing methodology as a baseline, the purpose of the article is to develop a private method of forming requirements for GIS from unauthorized access to the AU, which has practical value and allows you to formulate quantitative requirements for a wide class of certified GIS.Method. When writing the article, the methods of system analysis, evolutionary modeling, probability theory and mathematical statistics, mathematical apparatus for modeling dynamic discrete networks (E-networks), and theory of algorithms were used. The methodological basis is a systematic approach.Result. A private methodology has been developed that determines the parameters of the symbolic genetic algorithm (GA) for creating a software package for analysis, evolutionary modeling, and forming quantitative requirements for GIS from un-authorized access to speakers using the Matlab 13 application software to implement GA in the Optimization toolbox programming environment.Conclusion. The proposed private method of forming requirements for GIS from unauthorized access in the AU using GA has a theoretical significance, practical value and allows you to formulate quantitative requirements for a wide class of AS certified in a certain class of security in accordance with the requirements of current regulatory documentation.
format Article
id doaj-art-d26a8dca6b134761ac2f7b2ff2fd3776
institution DOAJ
issn 2073-6185
2542-095X
language Russian
publishDate 2019-05-01
publisher Dagestan State Technical University
record_format Article
series Вестник Дагестанского государственного технического университета: Технические науки
spelling doaj-art-d26a8dca6b134761ac2f7b2ff2fd37762025-08-20T03:01:15ZrusDagestan State Technical UniversityВестник Дагестанского государственного технического университета: Технические науки2073-61852542-095X2019-05-0145311412210.21822/2073-6185-2018-45-3-114-122454PRIVATE TECHNIQUE OF FORMATION OF REQUIREMENTS TO INFORMATION PROTECTION SYSTEMS FROM UNAUTHORIZED ACCESS TO AUTOMATED BATH SYSTEMS USING GENETIC ALGORITHMI. G. Drovnikova0A. A. Zmeev1E. A. Rogozin2Voronezh Institute of the Ministry of the Interior of the Russian Federation.G.K. Zhukov Military Academy of Aerospace Defense.Voronezh Institute of the Ministry of the Interior of the Russian Federation.Objectives. Analysis of the existing methodology for the formation of requirements for information protection systems (GIS) from unauthorized access (NSD) to automated systems (AS) revealed a number of significant flaws, the main of which is the following: despite the fact that the considered method undoubtedly has theoretical significance, the same time, it can not claim practical value. This is due to the fact that in this methodology, the studies were carried out not on a specific standard (widely used certified according to the regulations of the Federal Service for Technical and Export Control of Russia) GIS, and the data on threats of unauthorized access given in it do not correspond to reality (morally obsolete), but therefore require a significant upgrade. Accepting the existing methodology as a baseline, the purpose of the article is to develop a private method of forming requirements for GIS from unauthorized access to the AU, which has practical value and allows you to formulate quantitative requirements for a wide class of certified GIS.Method. When writing the article, the methods of system analysis, evolutionary modeling, probability theory and mathematical statistics, mathematical apparatus for modeling dynamic discrete networks (E-networks), and theory of algorithms were used. The methodological basis is a systematic approach.Result. A private methodology has been developed that determines the parameters of the symbolic genetic algorithm (GA) for creating a software package for analysis, evolutionary modeling, and forming quantitative requirements for GIS from un-authorized access to speakers using the Matlab 13 application software to implement GA in the Optimization toolbox programming environment.Conclusion. The proposed private method of forming requirements for GIS from unauthorized access in the AU using GA has a theoretical significance, practical value and allows you to formulate quantitative requirements for a wide class of AS certified in a certain class of security in accordance with the requirements of current regulatory documentation.https://vestnik.dgtu.ru/jour/article/view/596automated systeminformation protection systemunauthorized accessgenetic algorithmevaluation network (e-network)markov model
spellingShingle I. G. Drovnikova
A. A. Zmeev
E. A. Rogozin
PRIVATE TECHNIQUE OF FORMATION OF REQUIREMENTS TO INFORMATION PROTECTION SYSTEMS FROM UNAUTHORIZED ACCESS TO AUTOMATED BATH SYSTEMS USING GENETIC ALGORITHM
Вестник Дагестанского государственного технического университета: Технические науки
automated system
information protection system
unauthorized access
genetic algorithm
evaluation network (e-network)
markov model
title PRIVATE TECHNIQUE OF FORMATION OF REQUIREMENTS TO INFORMATION PROTECTION SYSTEMS FROM UNAUTHORIZED ACCESS TO AUTOMATED BATH SYSTEMS USING GENETIC ALGORITHM
title_full PRIVATE TECHNIQUE OF FORMATION OF REQUIREMENTS TO INFORMATION PROTECTION SYSTEMS FROM UNAUTHORIZED ACCESS TO AUTOMATED BATH SYSTEMS USING GENETIC ALGORITHM
title_fullStr PRIVATE TECHNIQUE OF FORMATION OF REQUIREMENTS TO INFORMATION PROTECTION SYSTEMS FROM UNAUTHORIZED ACCESS TO AUTOMATED BATH SYSTEMS USING GENETIC ALGORITHM
title_full_unstemmed PRIVATE TECHNIQUE OF FORMATION OF REQUIREMENTS TO INFORMATION PROTECTION SYSTEMS FROM UNAUTHORIZED ACCESS TO AUTOMATED BATH SYSTEMS USING GENETIC ALGORITHM
title_short PRIVATE TECHNIQUE OF FORMATION OF REQUIREMENTS TO INFORMATION PROTECTION SYSTEMS FROM UNAUTHORIZED ACCESS TO AUTOMATED BATH SYSTEMS USING GENETIC ALGORITHM
title_sort private technique of formation of requirements to information protection systems from unauthorized access to automated bath systems using genetic algorithm
topic automated system
information protection system
unauthorized access
genetic algorithm
evaluation network (e-network)
markov model
url https://vestnik.dgtu.ru/jour/article/view/596
work_keys_str_mv AT igdrovnikova privatetechniqueofformationofrequirementstoinformationprotectionsystemsfromunauthorizedaccesstoautomatedbathsystemsusinggeneticalgorithm
AT aazmeev privatetechniqueofformationofrequirementstoinformationprotectionsystemsfromunauthorizedaccesstoautomatedbathsystemsusinggeneticalgorithm
AT earogozin privatetechniqueofformationofrequirementstoinformationprotectionsystemsfromunauthorizedaccesstoautomatedbathsystemsusinggeneticalgorithm