Abstract

It is impossible to imagine modern life without the use of computer networks, which offer many opportunities for their users. However, computer networks and their resources are constantly at risk of being infected by malware or from various types of network attacks. Therefore, for the proper functioning of the network and the provision of quality services, special attention is paid to the organization of network security. To solve problems related to the protection of computer networks, it is convenient to apply a cognitive approach based on the creation and analysis of a fuzzy cognitive map that reflects the status of the situation under study. Considering the importance of this issue, a cognitive model has been developed that reflects the security level of a computer network when exposed to potential threats. A matrix of interaction of concepts is formed and on the basis of it the basic system indicators are calculated, such as: consonance, dissonance and influence of concepts on the system. The analysis of these indicators revealed the most dangerous threats to network security such as: malware, physical impact on the network by the attacker, unintentional actions and errors of network users. Increasing the impact of these concepts on the network, various scenarios have been simulated, resulting in a relative change in the security level of the network. It is revealed that with increased influence of the concept of «unintentional actions, mistakes of network users» the security will be reduced the most, and with the increase of the concept of «physical influence on the network by the attacker» the fault tolerance of network operation will worsen as much as possible. The results of this study will contribute to the implementation of the necessary mechanisms to prevent, protect and control access at the appropriate levels of network infrastructure. Tabl.: 2. Fig.: 5. Refs: 13 titles.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.