Abstract

Current trends in the organization of the authentication process in information systems for critical use are primarily aimed at improving its reliability, however, this approach contradicts the CIA triad that dominates information security, in particular, the first and third components of the triad come into conflict. Consequently, there is a need to formalize the mathematical apparatus that would allow describing the relationship between confidentiality of a complex stepwise authentication procedure and the availability of the information system’s for critical use resources, which would allow flexible adjustment of the access control subsystem in accordance with the operating conditions of the information system. The article first proposed the dependence of the loss of the confidentiality of the authentication process and the availability indicator of an information system for critical use. In this model, unlike the existing ones, the process of an optimal semi-Markov decision management strategy in a Markov authentication process of subjects wishing to gain access to the information system’s for critical use resources synthesis is formalized as a mathematical programming task, which allows minimizing the loss of availability of the authentication process, the confidentiality of which should not fall below the threshold set by the administrator. The article outlines the methodology for applying the model described above, taking into account that the “critical error” and “suspicion of error” situations are described in the system security policy, which can be identified by the access control subsystem during the authentication process. These situations are defined taking into account the fact that the access control subsystem has a stepped, complex, sequentially connected block structure, and each block-level subsystem includes the corresponding sub-blocks for the informative features selection and classifications combined into an ensemble. The experiments carried out using the created model showed that as the requirements for the authentication process are less stringent, the availability of the information system for critical use increases, but when the loss threshold reaches α ≈ 10∙10-2, the availability increase stops, which can be explained by the final completion of the subsystem adaptation delimiting access to the individual features of the subjects for which the system has been trained. It turned out that for small α values, the availability of the information system for critical use is relatively low, which is due to the registration of a large number of “critical error” and “suspicion of error” situations, which take time to process. Access restriction subsystems based on the simplest (perceptron) and complex (GMM-HMM) classifiers provide low availability indicators for small values of α, which is caused by the registration of a large number of “critical error” situations in the first and a large number of “suspicion of error” in the second situations. Finally, the best indicators of accessibility for any α values were shown by access control subsystems, based on deep and deep convolution neural networks, the effectiveness of which for the tasks of biometric identification of subjects based on the individual features of their voices was high.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.