基于功能表设计威胁行为的算法形式化

Shuhratjon Toshmatov, Inomjon Yarashov, Alisher Otakhonov, Avazbek Ismatillayev
{"title":"基于功能表设计威胁行为的算法形式化","authors":"Shuhratjon Toshmatov, Inomjon Yarashov, Alisher Otakhonov, Avazbek Ismatillayev","doi":"10.1109/ICISCT55600.2022.10146987","DOIUrl":null,"url":null,"abstract":"In today’s world of information technology, information security is an important issue. In addressing information security issues, identification of attacks on the system, search for countermeasures to eliminate them, analysis of the causes of attacks, algorithmic review and algorithmization are carried out.Attacks were taken as an example in the analysis of attacks. Issues such as traffic changes and packet overload are investigated in the origin of attacks. Processes can be fully described through algorithmization in research. Identifying a specific set of information security threats by analyzing Functioning tables for algorithmic models and synthesizing and verifying incoming and outgoing data in their different versions allows any complex protection to be achieved through algorithmic descriptions. This is especially noteworthy.The diversity of system blocks means their ability to grow automatically to increase data size and provide redundant data protection. Therefore, additional safety precautions should be taken, as this article discusses the use of certain types of Functioning tables.","PeriodicalId":332984,"journal":{"name":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"Designing an algorithmic formalization of threat actions based on a Functioning table\",\"authors\":\"Shuhratjon Toshmatov, Inomjon Yarashov, Alisher Otakhonov, Avazbek Ismatillayev\",\"doi\":\"10.1109/ICISCT55600.2022.10146987\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In today’s world of information technology, information security is an important issue. In addressing information security issues, identification of attacks on the system, search for countermeasures to eliminate them, analysis of the causes of attacks, algorithmic review and algorithmization are carried out.Attacks were taken as an example in the analysis of attacks. Issues such as traffic changes and packet overload are investigated in the origin of attacks. Processes can be fully described through algorithmization in research. Identifying a specific set of information security threats by analyzing Functioning tables for algorithmic models and synthesizing and verifying incoming and outgoing data in their different versions allows any complex protection to be achieved through algorithmic descriptions. This is especially noteworthy.The diversity of system blocks means their ability to grow automatically to increase data size and provide redundant data protection. Therefore, additional safety precautions should be taken, as this article discusses the use of certain types of Functioning tables.\",\"PeriodicalId\":332984,\"journal\":{\"name\":\"2022 International Conference on Information Science and Communications Technologies (ICISCT)\",\"volume\":\"82 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-09-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2022 International Conference on Information Science and Communications Technologies (ICISCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICISCT55600.2022.10146987\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Information Science and Communications Technologies (ICISCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISCT55600.2022.10146987","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

摘要

在当今信息技术的世界里,信息安全是一个重要的问题。在解决信息安全问题时,识别对系统的攻击,寻找消除攻击的对策,分析攻击的原因,进行算法审查和算法化。在分析攻击时,以攻击为例。在攻击源中研究流量变化和数据包过载等问题。在研究中,过程可以通过算法来充分描述。通过分析算法模型的功能表,并综合和验证不同版本的传入和传出数据,从而识别一组特定的信息安全威胁,从而允许通过算法描述实现任何复杂的保护。这一点尤其值得注意。系统块的多样性意味着它们能够自动增长以增加数据大小并提供冗余数据保护。因此,在本文讨论某些类型的功能表的使用时,应该采取额外的安全预防措施。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Designing an algorithmic formalization of threat actions based on a Functioning table
In today’s world of information technology, information security is an important issue. In addressing information security issues, identification of attacks on the system, search for countermeasures to eliminate them, analysis of the causes of attacks, algorithmic review and algorithmization are carried out.Attacks were taken as an example in the analysis of attacks. Issues such as traffic changes and packet overload are investigated in the origin of attacks. Processes can be fully described through algorithmization in research. Identifying a specific set of information security threats by analyzing Functioning tables for algorithmic models and synthesizing and verifying incoming and outgoing data in their different versions allows any complex protection to be achieved through algorithmic descriptions. This is especially noteworthy.The diversity of system blocks means their ability to grow automatically to increase data size and provide redundant data protection. Therefore, additional safety precautions should be taken, as this article discusses the use of certain types of Functioning tables.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Self heating and DIBL effects in 2D MoS2 based MOSFET with different gate oxide and back oxide materials Memristors: types, characteristics and prospects of use as the main element of the future artificial intelligence An algorithm for parallel processing of traffic signs video on a graphics processor Nonlinear transformations of different type features and the choice of latent space based on them 2D Adiabatic CA Rules over ℤp
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1