O. S. Avsentiev, A. Avsentiev, A. Krugov, Yuri Yazov
{"title":"利用Petri-Markov网模拟信息化对象信息通过技术渠道泄漏的过程","authors":"O. S. Avsentiev, A. Avsentiev, A. Krugov, Yuri Yazov","doi":"10.14529/mmp210404","DOIUrl":null,"url":null,"abstract":"We propose an approach to simulation of information protection processes at informatization objects in the dynamics of realizing threats of its leakage through technical channels using the apparatus of composite Petri–Markov nets. We investigate the interrelationships of the processes of transferring information at the object of informatization, its interception by a violator from outside this object through technical channels and protection against interception. Analytical expressions are obtained for calculating the probabilistic-temporal characteristics of simulated processes in order to assess the possibility of a violator implementing threats of information leakage at objects of informatization; protection of this information through the use of preventive measures aimed at blocking or anticipating the actions of the violator to implement these threats.","PeriodicalId":44106,"journal":{"name":"Bulletin of the South Ural State University Series-Mathematical Modelling Programming & Computer Software","volume":"42 1","pages":""},"PeriodicalIF":0.2000,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Simulation of Processes to Protect Information of Informatization Objects Against Leakage Through Technical Channels Using an Apparatus of Petri-Markov Nets\",\"authors\":\"O. S. Avsentiev, A. Avsentiev, A. Krugov, Yuri Yazov\",\"doi\":\"10.14529/mmp210404\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We propose an approach to simulation of information protection processes at informatization objects in the dynamics of realizing threats of its leakage through technical channels using the apparatus of composite Petri–Markov nets. We investigate the interrelationships of the processes of transferring information at the object of informatization, its interception by a violator from outside this object through technical channels and protection against interception. Analytical expressions are obtained for calculating the probabilistic-temporal characteristics of simulated processes in order to assess the possibility of a violator implementing threats of information leakage at objects of informatization; protection of this information through the use of preventive measures aimed at blocking or anticipating the actions of the violator to implement these threats.\",\"PeriodicalId\":44106,\"journal\":{\"name\":\"Bulletin of the South Ural State University Series-Mathematical Modelling Programming & Computer Software\",\"volume\":\"42 1\",\"pages\":\"\"},\"PeriodicalIF\":0.2000,\"publicationDate\":\"2021-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Bulletin of the South Ural State University Series-Mathematical Modelling Programming & Computer Software\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14529/mmp210404\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q4\",\"JCRName\":\"MATHEMATICS, APPLIED\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Bulletin of the South Ural State University Series-Mathematical Modelling Programming & Computer Software","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14529/mmp210404","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"MATHEMATICS, APPLIED","Score":null,"Total":0}
Simulation of Processes to Protect Information of Informatization Objects Against Leakage Through Technical Channels Using an Apparatus of Petri-Markov Nets
We propose an approach to simulation of information protection processes at informatization objects in the dynamics of realizing threats of its leakage through technical channels using the apparatus of composite Petri–Markov nets. We investigate the interrelationships of the processes of transferring information at the object of informatization, its interception by a violator from outside this object through technical channels and protection against interception. Analytical expressions are obtained for calculating the probabilistic-temporal characteristics of simulated processes in order to assess the possibility of a violator implementing threats of information leakage at objects of informatization; protection of this information through the use of preventive measures aimed at blocking or anticipating the actions of the violator to implement these threats.
期刊介绍:
Series «Mathematical Modelling, Programming & Computer Software» of the South Ural State University Bulletin was created in 2008. Nowadays it is published four times a year. The basic goal of the editorial board as well as the editorial commission of series «Mathematical Modelling, Programming & Computer Software» is research promotion in the sphere of mathematical modelling in natural, engineering and economic science. Priority publication right is given to: -the results of high-quality research of mathematical models, revealing less obvious properties; -the results of computational research, containing designs of new computational algorithms relating to mathematical models; -program systems, designed for computational experiments.