Designing an algorithmic formalization of threat actions based on a Functioning table

Shuhratjon Toshmatov, Inomjon Yarashov, Alisher Otakhonov, Avazbek Ismatillayev
{"title":"Designing an algorithmic formalization of threat actions based on a Functioning table","authors":"Shuhratjon Toshmatov, Inomjon Yarashov, Alisher Otakhonov, Avazbek Ismatillayev","doi":"10.1109/ICISCT55600.2022.10146987","DOIUrl":null,"url":null,"abstract":"In today’s world of information technology, information security is an important issue. In addressing information security issues, identification of attacks on the system, search for countermeasures to eliminate them, analysis of the causes of attacks, algorithmic review and algorithmization are carried out.Attacks were taken as an example in the analysis of attacks. Issues such as traffic changes and packet overload are investigated in the origin of attacks. Processes can be fully described through algorithmization in research. Identifying a specific set of information security threats by analyzing Functioning tables for algorithmic models and synthesizing and verifying incoming and outgoing data in their different versions allows any complex protection to be achieved through algorithmic descriptions. This is especially noteworthy.The diversity of system blocks means their ability to grow automatically to increase data size and provide redundant data protection. Therefore, additional safety precautions should be taken, as this article discusses the use of certain types of Functioning tables.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISCT55600.2022.10146987","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

In today’s world of information technology, information security is an important issue. In addressing information security issues, identification of attacks on the system, search for countermeasures to eliminate them, analysis of the causes of attacks, algorithmic review and algorithmization are carried out.Attacks were taken as an example in the analysis of attacks. Issues such as traffic changes and packet overload are investigated in the origin of attacks. Processes can be fully described through algorithmization in research. Identifying a specific set of information security threats by analyzing Functioning tables for algorithmic models and synthesizing and verifying incoming and outgoing data in their different versions allows any complex protection to be achieved through algorithmic descriptions. This is especially noteworthy.The diversity of system blocks means their ability to grow automatically to increase data size and provide redundant data protection. Therefore, additional safety precautions should be taken, as this article discusses the use of certain types of Functioning tables.
基于功能表设计威胁行为的算法形式化
在当今信息技术的世界里,信息安全是一个重要的问题。在解决信息安全问题时,识别对系统的攻击,寻找消除攻击的对策,分析攻击的原因,进行算法审查和算法化。在分析攻击时,以攻击为例。在攻击源中研究流量变化和数据包过载等问题。在研究中,过程可以通过算法来充分描述。通过分析算法模型的功能表,并综合和验证不同版本的传入和传出数据,从而识别一组特定的信息安全威胁,从而允许通过算法描述实现任何复杂的保护。这一点尤其值得注意。系统块的多样性意味着它们能够自动增长以增加数据大小并提供冗余数据保护。因此,在本文讨论某些类型的功能表的使用时,应该采取额外的安全预防措施。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信