Abstract

Today the world is experiencing a significant increase in the number of cyberattacks. At the same time, their technological complexity increases proportionally. In the near future, the emergence of new potentially dangerous cyberattacks is not ruled out, which in turn may lead to deterioration of their detection and neutralization and, consequently, negatively affect the level of security of information and information and telecommunications systems of critical information infrastructure. Based on this, the article solves the urgent problem of developing a reliable method of constructing patterns of potentially dangerous cyberattacks, the implementation of which eliminates the basic disadvantage of creating attack pattern signatures, namely the "delay effect" to produce the desired signature. The proposed method is based on the definition of key characteristics and parameters of a potentially dangerous cyber-attack. It is based on an analysis of the standard functional security profile implemented in the computer system and network and the primary data sources used to build the patterns of potentially dangerous cyberattacks. The practical application of this method will result in the construction of two patterns of potentially dangerous cyber-attack on a computer system and network. The first, a differential game template for a potentially dangerous cyberattack, will describe the physics of processes occurring in a computer system and network during a potentially dangerous cyberattack, and the second, a physical template, will contain the full set of characteristics and parameters inherent in that attack.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.