Abstract
Purpose of reseach is to develop a model of the system for effective collection of information about the network access object based on modern information protection methods as well as to create a kind of the reconfiguration environment in the event of a failure of computer network elements or the need to redistribute the server load. Methods. A flexible, controlled version of developing a system has been proposed for the process of collecting information about the object under study; it makes it possible to automatically identify potential vulnerabilities in the field of information security [1]. It is proposed to use the analysis of the state of an object based on the black box technique, since it makes it possible to reproduce the actions of an external intruder who does not have any information about the object at the initial stage of preparation (which is the most common scenario when adding new services) and conduct typical attacks with subsequent security evaluation [2]. A mathematical model that improves system fault-tolerance and real-time load balancing is proposed. Results. The result of the research is the development of an effective construction of a system for assessing the state of object security. A mathematical model that makes it possible to reconfigure the environment of computing modules in real time has been developed. Experimental studies confirming the completeness and correctness of the proposed solutions have been carried out. Conclusion. The proposed system is designed to analyze the compliance of the protection object with the requirements of an information security policy; it includes the stages of system analysis using the black box technique and performs the tasks of an automated testing process, system components distributions, system modules interchangeability. Together with the developed mathematical model for improving fault-tolerance and redistributing the load on computational power in the event of equipment malfunctions and bypasses in the case of complete load of the elements, the system demonstrated a decrease in the time for conducting a comprehensive assessment of the information security state of the network access object.
Highlights
Conflict of interest: The Authors declare the absence of obvious and potential conflicts of interest related to the publication of this article
Purpose of reseach is to develop a model of the system for effective collection of information about the network access object based on modern information protection methods as well as to create a kind of the reconfiguration environment in the event of a failure of computer network elements or the need to redistribute the server load
It is proposed to use the analysis of the state of an object based on the black box technique, since it makes it possible to reproduce the actions of an external intruder who does not have any information about the object at the initial stage of preparation and conduct typical attacks with subsequent security evaluation [2]
Summary
Организация системы сетевого мониторинга и оценки состояния информационной безопасности объекта. Цель исследования заключается в построении модели системы для эффективного сбора информации об объекте сетевого доступа на базе современных методов защиты информации, а также в создании варианта среды реконфигурации в случае возникновения отказа элементов вычислительной сети или необходимости перераспределения серверной нагрузки. Предложена математическая модель, обеспечивающая повышение отказоустойчивости системы и балансирование нагрузки в масштабе реального времени. Итогом проведенных исследований является разработка эффективного построения системы для оценки состояния защищенности объекта. В совокупности с разработанной математической моделью по повышению отказоустойчивости и перераспределения нагрузки на вычислительные мощности в случае сбоев работы оборудования и обходов, в случае полной загруженности элементов показала снижение времени на проведение комплексной оценки состояния информационной безопасности сетевого объекта доступа. Для цитирования: Организация системы сетевого мониторинга и оценки состояния информационной безопасности объекта / А.Л.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.