Abstract
The purpose of this work: to develop a model that allows to assess the security of the information system of file exchange, to ensure the efficiency of servicing the maximum number of requests of authorized customers with a simultaneous decrease in the quality of service of requests from the attacker’s means. Methods used: formalization of service processes in the form of Markov random processes, as well as numerical methods. The result of the study: a criterion evaluation base for the effectiveness of the functioning of the information system of file exchange has been developed. The problem of dynamic management of the resource capabilities of the information system of file exchange by managing the parameters of data transmission has been solved. An assessment of the asymptotic stability and robustness of the model relative to the perturbations of the values of the initial parameters is solved in order to increase the adequacy of the model when choosing control modes for the data transmission process. Probabilistic and temporal characteristics and the process of functioning of the information system of file exchange in the conditions of unauthorized influences in various situations of interaction of the parties to the conflict, as well as in the managementand computational and time resource of the means of network intelligence of the attacker are obtained. The optimal modes of functioning of information systemsand file exchange, ensuring its compliance withthe established security requirements of critical information infrastructure objects, aresubstantiated.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.