Abstract

Purpose of the article: development of mechanisms for evaluating the actions of agents of complex information systems from the point of view of information security. Research method: game-theoretic models using stochastic modeling methods. The result: the description of the subject area of application of the model is given, it is shown that the actions of the violator and defender can be considered from the point of view of obtaining and further escalation of access rights on the objects of the information system. It is shown that the model of information confrontation between the defender and the violator can be represented by the triple “graph, agent, rules”. The definition of the basic terms and concepts of the model is given. The basic principles of the model functioning have been developed. The possibility of implementing calculations of the results of agents’ activities and the results of the game in the conditions of information uncertainty is shown. A list of basic values of the model is defined that allow calculating the costs and winnings of the participants of the game. The basic rules for calculating costs and winnings have been developed. The input parameters of the model that are set during its initialization are defined. The role and place of “playing with nature” for calculating the basic values of the model are shown.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call