Generalized model of actions by an attacker when manipulating messages containing precise time signals

A. Kanaev, E. Oparin, E. Oparina
{"title":"Generalized model of actions by an attacker when manipulating messages containing precise time signals","authors":"A. Kanaev, E. Oparin, E. Oparina","doi":"10.36724/2072-8735-2022-16-6-31-37","DOIUrl":null,"url":null,"abstract":"This article gives the place and role of the common time system in the telecommunications system, gives an overview of the process of functioning of the common time system, indicating the main means of transmitting accurate time signals. Based on the analysis of the process of functioning of the common time system, the main risks of failures in technological and automated systems in case of violation of the accuracy of the transmission of common time signals are identified. As a result of the analysis of emerging risks, attention is focused on the main types of threats to the single time system when attacks are carried out by organized malefactors. A special place among the threats is occupied by the manipulation of messages containing precise time signals. To analyze this threat, a semi-Markov model of an attacker's actions when manipulating messages containing precise time signals is formed. The main stages of the process of carrying out the attack are singled out. Using the method of minors, the main stationary characteristics of the attack process are calculated, such as the probability of finding the attack process at various stages of its implementation, as well as the average time of the attack duration and the average recovery time of the unified time system from the consequences of the attack. This information also serves as the basis for determining the coefficient of correct operation of the unified time system. The results obtained can be reflected in the formation of strategies for protecting the unified time system from attacks by organized intruders.","PeriodicalId":263691,"journal":{"name":"T-Comm","volume":"38 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"T-Comm","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.36724/2072-8735-2022-16-6-31-37","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

This article gives the place and role of the common time system in the telecommunications system, gives an overview of the process of functioning of the common time system, indicating the main means of transmitting accurate time signals. Based on the analysis of the process of functioning of the common time system, the main risks of failures in technological and automated systems in case of violation of the accuracy of the transmission of common time signals are identified. As a result of the analysis of emerging risks, attention is focused on the main types of threats to the single time system when attacks are carried out by organized malefactors. A special place among the threats is occupied by the manipulation of messages containing precise time signals. To analyze this threat, a semi-Markov model of an attacker's actions when manipulating messages containing precise time signals is formed. The main stages of the process of carrying out the attack are singled out. Using the method of minors, the main stationary characteristics of the attack process are calculated, such as the probability of finding the attack process at various stages of its implementation, as well as the average time of the attack duration and the average recovery time of the unified time system from the consequences of the attack. This information also serves as the basis for determining the coefficient of correct operation of the unified time system. The results obtained can be reflected in the formation of strategies for protecting the unified time system from attacks by organized intruders.
攻击者在操纵包含精确时间信号的消息时所采取的行动的广义模型
本文阐述了通用时间系统在电信系统中的地位和作用,概述了通用时间系统的工作过程,指出了传输准确时间信号的主要手段。在分析通用时间系统运行过程的基础上,指出了技术系统和自动化系统在违反通用时间信号传输精度的情况下发生故障的主要风险。由于分析了新出现的风险,当有组织的犯罪分子实施攻击时,人们的注意力集中在单时间系统面临的主要威胁类型上。在这些威胁中,对包含精确时间信号的信息的操纵占据了一个特殊的位置。为了分析这种威胁,形成了攻击者在操纵包含精确时间信号的消息时的行为的半马尔可夫模型。执行攻击过程的主要阶段被挑选出来。利用未成年人的方法,计算攻击过程的主要平稳特征,如在攻击过程实施的各个阶段发现攻击过程的概率,以及从攻击的后果中得出攻击持续时间的平均时间和统一时间系统的平均恢复时间。这些信息也是确定统一时间系统正确运行系数的依据。得到的结果可以反映在保护统一时间系统免受有组织入侵者攻击的策略的形成上。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信