控制安全中的数学方法:图及其在信息和控制安全中的应用

Svitlana Shevchenko, Yuliia Zhdanovа, P. Skladannyi, S. Spasiteleva
{"title":"控制安全中的数学方法:图及其在信息和控制安全中的应用","authors":"Svitlana Shevchenko, Yuliia Zhdanovа, P. Skladannyi, S. Spasiteleva","doi":"10.28925/2663-4023.2021.13.133144","DOIUrl":null,"url":null,"abstract":"This article is devoted to the problem of applying graph theory in cybersecurity systems and is an overview. Widespread penetration of mathematical methods in the development of information technology characterizes the current stage of our society. Among the mathematical methods used in information and cyber security, a large niche is graph technology. A streamlined system of special terms and symbols of graph theory allows you to easily and easily describe complex and subtle things both geometrically and algebraically. A graph is a mathematical model of a wide variety of objects, phenomena, and the relationships between them. This justifies the choice and relevance of this study. The article outlines the main elements of graph theory, the wide scope of their implementation and provides a historical perspective on the development of this theory. The analysis of scientific works allowed to determine the main directions of application of properties, characteristics of graphs and graph algorithms in information and cyber security. Among them are studies related to the use of graphs in information systems and programming; with modeling, analysis and application of attack graphs; with cryptographic transformations; with the construction of a decision tree in decision-making tasks in conditions of risk and uncertainty. It is proved that the ability to operate with the methods of graph technologies contributes to the development of software and hardware for information protection. The considered approaches to the application of graph theory in information and cyber security can be implemented during the study of the discipline \"Special methods in security systems: discrete mathematics\" for students majoring in 125 Cybersecurity, as well as in training in research or course work or thesis. By increasing the professional orientation of training, future cybersecurity workers gain a thorough knowledge of fundamental disciplines.","PeriodicalId":198390,"journal":{"name":"Cybersecurity: Education, Science, Technique","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"MATHEMATICAL METHODS IN CIBERNETIC SECURITY: GRAPHS AND THEIR APPLICATION IN INFORMATION AND CYBERNETIC SECURITY\",\"authors\":\"Svitlana Shevchenko, Yuliia Zhdanovа, P. Skladannyi, S. Spasiteleva\",\"doi\":\"10.28925/2663-4023.2021.13.133144\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article is devoted to the problem of applying graph theory in cybersecurity systems and is an overview. Widespread penetration of mathematical methods in the development of information technology characterizes the current stage of our society. Among the mathematical methods used in information and cyber security, a large niche is graph technology. A streamlined system of special terms and symbols of graph theory allows you to easily and easily describe complex and subtle things both geometrically and algebraically. A graph is a mathematical model of a wide variety of objects, phenomena, and the relationships between them. This justifies the choice and relevance of this study. The article outlines the main elements of graph theory, the wide scope of their implementation and provides a historical perspective on the development of this theory. The analysis of scientific works allowed to determine the main directions of application of properties, characteristics of graphs and graph algorithms in information and cyber security. Among them are studies related to the use of graphs in information systems and programming; with modeling, analysis and application of attack graphs; with cryptographic transformations; with the construction of a decision tree in decision-making tasks in conditions of risk and uncertainty. It is proved that the ability to operate with the methods of graph technologies contributes to the development of software and hardware for information protection. The considered approaches to the application of graph theory in information and cyber security can be implemented during the study of the discipline \\\"Special methods in security systems: discrete mathematics\\\" for students majoring in 125 Cybersecurity, as well as in training in research or course work or thesis. By increasing the professional orientation of training, future cybersecurity workers gain a thorough knowledge of fundamental disciplines.\",\"PeriodicalId\":198390,\"journal\":{\"name\":\"Cybersecurity: Education, Science, Technique\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Cybersecurity: Education, Science, Technique\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.28925/2663-4023.2021.13.133144\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cybersecurity: Education, Science, Technique","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.28925/2663-4023.2021.13.133144","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

本文致力于图论在网络安全系统中的应用问题,并对其进行了概述。数学方法在信息技术发展中的广泛渗透是我们社会当前阶段的特征。在信息和网络安全中使用的数学方法中,图形技术占有很大的一席之地。图论的特殊术语和符号的流线型系统使您能够轻松地以几何和代数方式描述复杂而微妙的事物。图是各种各样的对象、现象以及它们之间关系的数学模型。这证明了本研究的选择和相关性。本文概述了图论的主要要素及其广泛的实施范围,并提供了这一理论发展的历史视角。通过对科学著作的分析,可以确定图形的性质、特征和图形算法在信息和网络安全领域应用的主要方向。其中包括与在信息系统和编程中使用图形有关的研究;具有攻击图的建模、分析和应用;使用加密转换;用决策树的构造在具有风险和不确定性的条件下进行决策任务。实践证明,能够运用图形技术的方法进行操作,有助于信息保护软硬件的发展。图论在信息与网络安全中的应用,可以在125网络安全专业学生的“安全系统中的特殊方法:离散数学”课程的学习中实施,也可以在研究或课程作业或论文的培训中实施。通过增加培训的专业导向,未来的网络安全工作者可以获得全面的基础学科知识。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
MATHEMATICAL METHODS IN CIBERNETIC SECURITY: GRAPHS AND THEIR APPLICATION IN INFORMATION AND CYBERNETIC SECURITY
This article is devoted to the problem of applying graph theory in cybersecurity systems and is an overview. Widespread penetration of mathematical methods in the development of information technology characterizes the current stage of our society. Among the mathematical methods used in information and cyber security, a large niche is graph technology. A streamlined system of special terms and symbols of graph theory allows you to easily and easily describe complex and subtle things both geometrically and algebraically. A graph is a mathematical model of a wide variety of objects, phenomena, and the relationships between them. This justifies the choice and relevance of this study. The article outlines the main elements of graph theory, the wide scope of their implementation and provides a historical perspective on the development of this theory. The analysis of scientific works allowed to determine the main directions of application of properties, characteristics of graphs and graph algorithms in information and cyber security. Among them are studies related to the use of graphs in information systems and programming; with modeling, analysis and application of attack graphs; with cryptographic transformations; with the construction of a decision tree in decision-making tasks in conditions of risk and uncertainty. It is proved that the ability to operate with the methods of graph technologies contributes to the development of software and hardware for information protection. The considered approaches to the application of graph theory in information and cyber security can be implemented during the study of the discipline "Special methods in security systems: discrete mathematics" for students majoring in 125 Cybersecurity, as well as in training in research or course work or thesis. By increasing the professional orientation of training, future cybersecurity workers gain a thorough knowledge of fundamental disciplines.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
DESIGN OF BIOMETRIC PROTECTION AUTHENTIFICATION SYSTEM BASED ON K-AVERAGE METHOD CRYPTOVIROLOGY: SECURITY THREATS TO GUARANTEED INFORMATION SYSTEMS AND MEASURES TO COMBAT ENCRYPTION VIRUSES MODEL OF CURRENT RISK INDICATOR OF IMPLEMENTATION OF THREATS TO INFORMATION AND COMMUNICATION SYSTEMS SELECTION OF AGGREGATION OPERATORS FOR A MULTI-CRITERIA EVALUTION OF SUTABILITY OF TERRITORIES GETTING AND PROCESSING GEOPRODITIONAL DATA WITH MATLAB MAPPING TOOLBOX
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1