A Refined Method for Analytical Modeling of the Processes of Spreading Virus Software to Assess the Security of Informatization Objects
( Pp. 11-20)

More about authors
Zavodtsev Ilia V. Cand. Sci. (Eng.), Associate Professor; associate professor
Lomonosov Moscow State University
Moscow, Russian Federation Borisov Mikhail A. associate professor
Lomonosov Moscow State University
Moscow, Russian Federation Bondarenko Nikolai N. PhD student
Lomonosov Moscow State University
Moscow, Russian Federation Meleshko Vladimir A.
Lomonosov Moscow State University
Moscow, Russian Federation
Abstract:
Task. The purpose of writing this article is to improve the security of information in information systems. Model. The article proposes an improved method for analytical modeling of the process of spreading virus software in information systems in relation to the features of a special class of attacks implemented by the family of virus software - ransomware. Conclusions. The proposed method makes it possible to analytically calculate the intensity of infection of hosts of a protected information system with various types of virus software and use the obtained characteristics as initial data for the final assessment of the information security risk on the protected informatization object. Value. Modeling in the environment of the mathematical package PTC Mathcad Prime 7 showed the applicability of the proposed approach for analytical threat modeling.
How to Cite:
Zavodtsev I.V., Borisov M.A., Bondarenko N.N., Meleshko V.A., (2022), A REFINED METHOD FOR ANALYTICAL MODELING OF THE PROCESSES OF SPREADING VIRUS SOFTWARE TO ASSESS THE SECURITY OF INFORMATIZATION OBJECTS. Computational Nanotechnology, 1 => 11-20.
Reference list:
Order of the FSTEC of Russia dated February 11, 2013 No. 17 “On approval of requirements for the protection of information that does not constitute a state secret contained in state information systems”. Rossiyskaya Gazeta. 06.26.2013. No. 136.
Order of the FSTEC of Russia dated February 18, 2013 No. 21 “On approval of the Composition and content of organizational and technical measures to ensure the security of personal data during their processing in personal data information systems”. Rossiyskaya Gazeta. 05.22.2013. No. 107.
Order of the FSTEC of Russia dated December 25, 2017 No. 239 “On approval of the Requirements for ensuring the security of significant objects of critical information infrastructure of the Russian Federation”. URL: http://www.pravo.gov.ru
Methodological document. Information protection measures in state information systems (approved by the FSTEC of Russia on February 11, 2014). URL: https://fstec.ru
Methodological document. Methodology for assessing threats to information security (approved by the FSTEC of Russia on February 5, 2021). URL: https://fstec.ru
Bank of Russia Regulation No. 483-P dated August 6, 2015 “On the procedure for calculating the amount of credit risk based on internal ratings” (together with the “Requirements for the quality of data used by banks to create and apply models for quantitative assessment of credit risk for the purposes of calculating capital adequacy ratios”). Bulletin of the Bank of Russia. 09.29.2015. No. 81.
GOST R 58771-2019. National standard of the Russian Federation. Risk management. Risk assessment technologies (approved and put into effect by the Order of Rosstandart dated December 17, 2019 No. 1405-st). Moscow: Standartinform, 2020.
GOST R ISO/IEC 27001-2021. National standard of the Russian Federation. Information technology. Methods and means of ensuring security. Information security management systems. Requirements (approved and put into effect by the Order of Rosstandart dated November 30, 2021 No. 1653-st). Moscow: Standartinform, 2022.
Boyko A.A. Method for developing test remote information and technical influences on spatially distributed systems of information and technical means. Information and Control Systems. 2014. No. 3. Pp. 84-92. (In Rus.)
Boyko A.A. Information conflict model of a special software tool and information security subsystem of an information technology tool. Radio Engineering. 2015. No. 4. Pp. 136-141. (In Rus.)
Boyko A.A. A Method for analytical modeling of the process of virus spread in computer networks of different structures. Proceedings of SPIIRAS. 2015. Vol. 5 (42). Pp. 196-211. (In Rus.)
Borisov M.A., Golod V.V., Osadchiy A.I., Trofimov V.V. Model of unauthorized access to information in dynamically changing conditions. Software Products and Systems. 2005. No. 4. Pp. 45-48. (In Rus.)
Borisov M.A., Zavodtsev I.V. Vulnerability assessment tools in automated systems. Scientific Journal Vestnik RGGU. Series Informatics. Data protection. Maths. 2010. No. 12 (55)/10. Pp. 259-262. (In Rus.)
Borisov M.A., Zavodtsev I.V., Chizhov I.V. Fundamentals of software and hardware information protection. No. 1. 5th ed., Ex. per. and additional. Moscow: Librokom, 2019. 464 p.
Kozlenko A.V. Method for assessing the level of information protection against unauthorized access in computer networks based on the security graph. Proceedings of SPIIRAS. 2012. Vol. 2 (21). Pp. 41-55. (In Rus.)
The DFIR report. Real intrusions by real attackers, the truth behind the intrusion. URL: https://thedfirreport.com
Keywords:
virus software, Information system, Information Security, security threat modeling, information security risk assessment, information security system, anti-virus protection.


Related Articles

1. ECONOMIC THEORY Pages: 20-28 Issue №18204
Human and labor in the digital post-crisis economy: relationships, modern trends, statements, future professions, system solutions
digital economy digital post-crisis economy digital technologies social and labor sphere a person
Show more
7. Criminal law, Criminal enforcement law, Criminology Pages: 159-162 Issue №4088
THE USE OF TECHNICAL DEVICES AND INFORMATION TECHNOLOGIES FOR CRIMINAL PURPOSES AS A CIRCUMSTANCE AGGRAVATING THE CRIMINAL LIABILITY
information security crimes cynicism social danger computer
Show more
11. LAND AND PROPERTY RELATIONS Pages: 126-130 Issue №10779
INFORMATION'S PROVISIONOFCADASTRAL ACCOUNTINGIN RUSSIAN FEDERATION
information support of inventory information system cadastre, real estate registration rights real estate
Show more
9. Administrative law; Administrative process, Information Law Pages: 116-120 Issue №5518
THE MODEL OF LEGAL REGULATION OF THE ACTIVITY OF MASS MEDIA IN THE СONTEXT OF INFORMATIONAL SECURITY
Legal model the mechanism of legal regulation subsystem system communication Media
Show more
4. CRIMINAL - LEGAL, CRIMINOLOGICAL, ADMINISTRATIVE AND OTHER MEASURES FOR COUNTERING CRIME IN CONTEMPORARY CONDITIONS Pages: 166-170 Issue №19590
Information Support of Services and Units of the MIA of Russia as an Aspect of Effectiveness of Countering Crime
information resource data banks crime prevention operational environment categorized machine-readable medium
Show more
6. LEGAL SUPPORT OF ENTREPRENEURIAL ACTIVITIES Pages: 140-143 Issue №3231
Actions on identification and disclosure of crimes in the sphere the economy which isn't entering the list of operational search actions
operatively-search activity information system information support analytical work economic analysis and statistical data analysis
Show more
2. SCIENTIFIC SCHOOL OF DOCTOR OF SCIENCE, PROFESSOR ShHAGAPSOEV Z.L. Pages: 139-141 Issue №7907
INFORMATIONAL TERRORISM AS THE RUSSIAN FEDERATION NATIONAL SECURITY THREAT
information terrorism the threat of information national security information security the global information space
Show more
12. CRIME IN THE FIELD OF INFORMATION TECHNOLOGY AND CYBER CRIME Pages: 146-148 Issue №10327
ABOUT SOME METHODS OF INFORMATION SECURITY IN THE WORLD WIDE WEB
information security the threat of information national security the global information space the Internet
Show more
8. INFORMATION LAW (12.00.13) Pages: 197-201 Issue №17728
Information terrorism is a threat to national security in the context of digitalization
information terrorism national security information security cybercrime government regulation
Show more
8. CIVIL LAW BUSINESS LAW FAMILY LAW; PRIVATE INTERNATIONAL LAW 12.00.03 Pages: 222-226 Issue №17564
On the issue of the nominal (special) account of operators of investment, financial platforms and information systems
operator financial platform investment platform information system credit organization
Show more