The mathematical model of cyber attacks on the critical information system

18Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This article proposes a model of a system of destabilizing effects on the software of an automated system that describes the strategy and tactics of the actions of certain types of violations with the aim of realizing threats to information security through malicious software. Based on the theory of system analysis and the theory of complex systems modeling, an approach is proposed to describe the processes of destabilizing effects that allow to take into account the structure of software, to monitor its interface and to exert malicious software effects on it by limiting its availability and integrity while the software components of the software of automated systems. The materials of the article provide a formalized description of the structure of the software, its interface, malicious software actions that lead to destabilization and the emergence of information conflicts in the operation of automated systems. The presented model and its software implementation will make it possible to comprehensively evaluate the effectiveness of information protection systems for automated control systems for critical objects.

Cite

CITATION STYLE

APA

Kochedykov, S. S., Grechishnikov, E. V., Dushkin, A. V., & Orlova, D. E. (2019). The mathematical model of cyber attacks on the critical information system. In Journal of Physics: Conference Series (Vol. 1202). Institute of Physics Publishing. https://doi.org/10.1088/1742-6596/1202/1/012013

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free