ANALYSIS OF THE RESULTS OF SIMULATION MODELING OF THE INFORMATION SECURITY SYSTEM AGAINST UNAUTHORIZED ACCESS IN SERVICE NETWORKS
DOI:
https://doi.org/10.15588/1607-3274-2024-2-4Keywords:
unauthorized access, information security systems, information security, queuing systems, defense mechanism, simulation modelingAbstract
Context. An analysis of the service network shows that insufficient information security in service networks is the cause of huge losses incurred by corporations. Despite the appearance of a number of works and materials on standardization, there is currently no unified system for assessing information security in the field of information security. It should be noted that existing methods, as well as accumulated experience in this area, do not completely overcome these difficulties. This circumstance confirms that this problem has not yet been sufficiently studied and, therefore, remains relevant. The presented work is one of the steps towards creating a unified system for assessing information security in service networks.
Objective. Development of an algorithm and simulation model, analysis of simulation results to determine the key characteristics of the Information Security System, providing the capability for complete closure, through the security system, of all potential threat channels by ensuring control over the passage of all unauthorized access requests through defense mechanisms.
Method. To solve the problem, a simulation method was applied using the principles of queuing system modeling. This method makes it possible to obtain the main characteristics of the Information Security System from the unauthorized access with a limited amount of buffer memory.
Results. Algorithms, models, and methodology have been developed for the development of Information Security System from unauthorized access, considered as a single-phase multi-channel queuing system with a limited volume of buffer memory. The process of obtaining model results was implemented in the General Purpose Simulation System World modelling system, and comparative assessments of the main characteristics of the Information Security System were carried out for various laws of distribution of output parameters, i.e., in this case, unauthorized access requests are the simplest flows, and the service time obeys exponential, constant, and Erlang distribution laws.
Conclusions. The conducted experiments based on the algorithm and model confirmed the expected results when analyzing the characteristics of the Information Security System from the unauthorized access as a single-phase multi-channel queuing system with a limited waiting time for requests in the queue. These results can be used for practical construction of new or modification of existing Information Security System s in service networks of objects of various purposes. This work is one of the approaches to generalizing the problems under consideration for systems with a limited volume of buffer memory. Prospects for further research include research and development of the principles of hardware and software implementation of Information Security System in service networks.
References
Ismailov B. G. Modelling and analysis of the security system information in service networks, Problemi ínformatizatsíí̈ ta upravlínnya, 2022, Vol. 1, № 69, pp. 46–53. DOI: 10.1 837 2/2073-4751.6 9.16812
Fan L., Wang Y., Cheng X., Li J., Jin S. Privacy theft malware multi-process collaboration analysis, Security and Communication Networks, 2013, No. 8 (1), pp. 51– 67. DOI:10.10 02/sec. 705
Gordon L. A., Loeb M. P. The Economics of Information Security Investment, ACM Transactions on Information and System Security, 2002, No. 5 (4), pp. 438– 457. DOI:10.1145/58 127 1.5812 74. S2CID 1 500 788
Fienberg S. E., Slavković A. B. Data Privacy and Confidentiality, International Encyclopedia of Statistical Science, 2011, pp. 342–345, DOI:10.1007/978-3-642-04898-2_202
Pevnev V. Model Threats and Ensure the Integrity of Information, Systems and Technologies, 2018, No. 2 (56), pp. 80–95. DOI:10.32836/2521-66 43-2018.2-56.6
Loukas G., Oke G. Protection Against Denial of Service Attacks: A Survey, Comput. J., 2012, No. 53 (7), pp. 1020– 1037. Archived from the original on March 24, Retrieved August 28, 2015. DOI: 10.1 093/ com jnl/bxp078
Fowler Kevvie Developing a Computer Security Incident Response Plan, Data Breach Preparation and Response, Elsevier, 2016, pp. 49–77. retrieved June 5, 2021. DOI:10.1016/b978-0-12-803451-4.00003-4
Parker D. B. A Guide to Selecting and Implementing Security Controls, Information Systems Security, 1994, No. 3 (2), pp. 75–86. DOI:10.1080/10658989 4093 42459
Venter H. S., Eloff J. H. P. A taxonomy for information security technologies, Computers & Security, 2003, No.22 (4), pp. 299–307. DOI: 10. 1016/S01674048(03)00406-1
McDermott B. E.,Geer D. Information security is information risk management, In Proceedings of the 2001 Workshop on New Security Paradigms NSPW’01, pp. 97–104. ACM. DOI:10.1 145/ 5081 71. 508187
Authorization and approval program, Internal Controls Policies and Procedures. Hoboken, NJ, US, John Wiley & Sons, Inc., October 23, 2015, pp 69–72, retrieved June1, 2021. DOI:10.1002/9781119 20 39 64.ch10
Almehmadi A., El-Khatib Kh. Authorized! Access denied, unauthorized! Access granted, Proceedings of the 6th International Conference on Security of Information and Networks. Sin '13.US: ACMPress. New York, 2013, pp. 363– 367. DOI:10.1145/2 52 3514.25 23612
Joshi Ch., Singh U. K. Information security risks management framework A step towards mitigating security risks in university network, Journal of Information Security and Applications. August, 2017, No. 35, pp. 128– 137. DOI:10.1016/ j.jisa.2017.06.006
Randall A. Harm, risk and threat, Risk and Precaution. Cambridge, Cambridge University Press, 2011, pp. 31– 42, retrieved May29, 2021. DOİ:1 0.1017/ cbo97805 1197455 7.0 03
Boritz J. E. IS Practitioners’ Views on Core Concepts of Information Integrity, International Journal of Accounting Information Systems. Elsevier, 2005, No. 6 (4), pp. 260– 279. DOI:10.1016/j.accinf. 2005. 07.001
Keyser T. Security policy, The Information Governance Toolkit. CRC Press, April 19, 2018, pp. 57–62, retrieved May 28, 2021. DOI:10.1 201/978 1315385488-13
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 B. G. Ismailov
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Creative Commons Licensing Notifications in the Copyright Notices
The journal allows the authors to hold the copyright without restrictions and to retain publishing rights without restrictions.
The journal allows readers to read, download, copy, distribute, print, search, or link to the full texts of its articles.
The journal allows to reuse and remixing of its content, in accordance with a Creative Commons license СС BY -SA.
Authors who publish with this journal agree to the following terms:
-
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License CC BY-SA that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
-
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
-
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.