Method and Model of Analysis of Possible Threats in User Authentication in Electronic Information Educational Environment of the University

N/ACitations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The article presents the research results of the development of a method and mathematical model of subject authentication in the electronic information educational environment of universities (EIEEU). The problem was solved on the basis of processing updated data sets with software and hardware detection tools. It is proposed to separate the verification procedures for new threats and precedents that have already been entered into the knowledge base of protection and cybersecurity systems of EIEEU. A method for analyzing threats is described, which involves the use of information sets characterizing each of the threats by features typical of their implementation, and takes into account the information content of each of the feat user. It is shown that the use of the proposed method and mathematical model of the subject authentication in the EIEEU, allows allocating resources of information protection systems and cybersecurity of educational institutions effectively. A reduction in the number of erroneous and false reactions while identifying threats, as well as an increase of the probability of detection of new cyber threats in the EIEEU, are confirmed.

Cite

CITATION STYLE

APA

Lakhno, V. A., Kasatkin, D. Y., Blozva, A. I., & Gusev, B. S. (2020). Method and Model of Analysis of Possible Threats in User Authentication in Electronic Information Educational Environment of the University. In Advances in Intelligent Systems and Computing (Vol. 938, pp. 600–609). Springer Verlag. https://doi.org/10.1007/978-3-030-16621-2_56

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free