基于逻辑和概率方法的信息通信系统网络攻击最佳场景选择

Lesia Alekseichuk, Oleksii Novikov, Andrii Rodionov, Dmytro Yakobchuk
{"title":"基于逻辑和概率方法的信息通信系统网络攻击最佳场景选择","authors":"Lesia Alekseichuk, Oleksii Novikov, Andrii Rodionov, Dmytro Yakobchuk","doi":"10.20535/tacs.2664-29132023.2.288973","DOIUrl":null,"url":null,"abstract":"Abstract
 The task of analyzing and selecting the best scenario of a cyberattack on information and communication system is considered as a component of the task of analyzing systems security. A method and corresponding algorithm for finding the best scenario of an attack on information and communication system using a logical and probabilistic model is proposed. The model describes the development of adverse events that arise in the information and communication system from the implementation of possible attacks on the security system from cyberspace. Analysis of cyber attack scenarios allows predicting the development of possible adverse cyber security events from the implementation of multiple threats to the system. The developed method and corresponding algorithm for analyzing attack scenarios can be used to analyze the security of information and communication systems, as well as in automation systems for designing information security systems or designing attacks on such systems.","PeriodicalId":471817,"journal":{"name":"Theoretical and applied cybersecurity","volume":"108 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The Best Scenario of Cyber Attack Selecting on the Information and Communication System Based on the Logical and Probabilistic Method\",\"authors\":\"Lesia Alekseichuk, Oleksii Novikov, Andrii Rodionov, Dmytro Yakobchuk\",\"doi\":\"10.20535/tacs.2664-29132023.2.288973\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Abstract
 The task of analyzing and selecting the best scenario of a cyberattack on information and communication system is considered as a component of the task of analyzing systems security. A method and corresponding algorithm for finding the best scenario of an attack on information and communication system using a logical and probabilistic model is proposed. The model describes the development of adverse events that arise in the information and communication system from the implementation of possible attacks on the security system from cyberspace. Analysis of cyber attack scenarios allows predicting the development of possible adverse cyber security events from the implementation of multiple threats to the system. The developed method and corresponding algorithm for analyzing attack scenarios can be used to analyze the security of information and communication systems, as well as in automation systems for designing information security systems or designing attacks on such systems.\",\"PeriodicalId\":471817,\"journal\":{\"name\":\"Theoretical and applied cybersecurity\",\"volume\":\"108 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2023-11-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Theoretical and applied cybersecurity\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.20535/tacs.2664-29132023.2.288973\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Theoretical and applied cybersecurity","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.20535/tacs.2664-29132023.2.288973","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

摘要# x0D;分析和选择针对信息通信系统的网络攻击的最佳场景的任务被认为是分析系统安全任务的一个组成部分。提出了一种利用逻辑和概率模型寻找信息通信系统攻击最佳方案的方法和相应算法。该模型描述了由于网络空间对安全系统实施可能的攻击而在信息和通信系统中产生的不利事件的发展。通过对网络攻击场景的分析,可以预测多种威胁对系统的实施可能导致的不利网络安全事件的发展。所开发的攻击场景分析方法和相应算法可用于信息通信系统的安全性分析,也可用于自动化系统中信息安全系统的设计或对信息安全系统的攻击设计。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
The Best Scenario of Cyber Attack Selecting on the Information and Communication System Based on the Logical and Probabilistic Method
Abstract The task of analyzing and selecting the best scenario of a cyberattack on information and communication system is considered as a component of the task of analyzing systems security. A method and corresponding algorithm for finding the best scenario of an attack on information and communication system using a logical and probabilistic model is proposed. The model describes the development of adverse events that arise in the information and communication system from the implementation of possible attacks on the security system from cyberspace. Analysis of cyber attack scenarios allows predicting the development of possible adverse cyber security events from the implementation of multiple threats to the system. The developed method and corresponding algorithm for analyzing attack scenarios can be used to analyze the security of information and communication systems, as well as in automation systems for designing information security systems or designing attacks on such systems.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信