Ensuring the Resistance of Critical Information Infrastructure Objects to Advanced Persistent Threats

A. Lapsar’, Sergey Nazaryan, Alisa Vladimirova
{"title":"Ensuring the Resistance of Critical Information Infrastructure Objects to Advanced Persistent Threats","authors":"A. Lapsar’, Sergey Nazaryan, Alisa Vladimirova","doi":"10.21681/2311-3456-2022-2-39-51","DOIUrl":null,"url":null,"abstract":"The purpose of the study: to improve security of significant objects of critical information infrastructure in conditions of destructive information impact, implemented in the form of advanced persistent threat (APT). Methods: comparative analysis of destructive information impact within the framework of a systematic approach; Markov theory of evolutionary processes; synergetics. Results: the authors carried out analysis of APT properties and their impact on objects of critical information infrastructure. To identify APTs, the use of a combination of various detection methods with the priority of heuristic analysis is substantiated. A scheme has been developed for the implementation of the method for assessing the state of an object of a critical information infrastructure based on a modified Markov-parametric model with a system for detecting computer attacks integrated into its structure. The preliminary assessment of computer attacks danger level as well as development of recommendations for their neutralization simultaneously with conducting the assessment of the properties and characteristics of destructive information impact are proposed.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"20 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Voprosy kiberbezopasnosti","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21681/2311-3456-2022-2-39-51","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The purpose of the study: to improve security of significant objects of critical information infrastructure in conditions of destructive information impact, implemented in the form of advanced persistent threat (APT). Methods: comparative analysis of destructive information impact within the framework of a systematic approach; Markov theory of evolutionary processes; synergetics. Results: the authors carried out analysis of APT properties and their impact on objects of critical information infrastructure. To identify APTs, the use of a combination of various detection methods with the priority of heuristic analysis is substantiated. A scheme has been developed for the implementation of the method for assessing the state of an object of a critical information infrastructure based on a modified Markov-parametric model with a system for detecting computer attacks integrated into its structure. The preliminary assessment of computer attacks danger level as well as development of recommendations for their neutralization simultaneously with conducting the assessment of the properties and characteristics of destructive information impact are proposed.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
确保关键信息基础设施对象抵御高级持续性威胁
该研究的目的是:在破坏性信息影响的情况下,以高级持续威胁(APT)的形式实施,提高关键信息基础设施重要对象的安全性。方法:在系统方法的框架内对破坏性信息影响进行比较分析;马尔可夫进化过程理论;协同学。结果:分析了APT的特性及其对关键信息基础设施对象的影响。为了识别apt,使用各种检测方法的组合与启发式分析的优先级被证实。基于改进的马尔可夫参数模型,开发了一种方案,用于实现评估关键信息基础设施对象状态的方法,并将检测计算机攻击的系统集成到其结构中。提出了计算机攻击危险水平的初步评估以及在进行破坏性信息影响的性质和特征评估的同时制定消除计算机攻击的建议。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Model for Building Competencies of a Computer Crime Investigator ASSESSMENT AND PREDICTION OF THE COMPLEX OBJECTS STATE: APPLICATIOIN FOR INFORMATION SECURITY Cellular Automata and Their Generalizations in Cryptography. Part 1 A METHOD OF PARAMETRIC SYNTHESIS OF CRYPTO-CODE STRUCTURES FOR MONITORING AND RESTORING THE INTEGRITY OF INFORMATION Application of Methods of Theory of Fuzzy Sets to Assess the Risk of Violations of Critical Properties Protected Resources Automated Control System
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1