Abstract

Purpose of reseach is to develop a model of the system for effective collection of information about the network access object based on modern information protection methods as well as to create a kind of the reconfiguration environment in the event of a failure of computer network elements or the need to redistribute the server load. Methods. A flexible, controlled version of developing a system has been proposed for the process of collecting information about the object under study; it makes it possible to automatically identify potential vulnerabilities in the field of information security [1]. It is proposed to use the analysis of the state of an object based on the black box technique, since it makes it possible to reproduce the actions of an external intruder who does not have any information about the object at the initial stage of preparation (which is the most common scenario when adding new services) and conduct typical attacks with subsequent security evaluation [2]. A mathematical model that improves system fault-tolerance and real-time load balancing is proposed. Results. The result of the research is the development of an effective construction of a system for assessing the state of object security. A mathematical model that makes it possible to reconfigure the environment of computing modules in real time has been developed. Experimental studies confirming the completeness and correctness of the proposed solutions have been carried out. Conclusion. The proposed system is designed to analyze the compliance of the protection object with the requirements of an information security policy; it includes the stages of system analysis using the black box technique and performs the tasks of an automated testing process, system components distributions, system modules interchangeability. Together with the developed mathematical model for improving fault-tolerance and redistributing the load on computational power in the event of equipment malfunctions and bypasses in the case of complete load of the elements, the system demonstrated a decrease in the time for conducting a comprehensive assessment of the information security state of the network access object.

Highlights

  • Conflict of interest: The Authors declare the absence of obvious and potential conflicts of interest related to the publication of this article

  • Purpose of reseach is to develop a model of the system for effective collection of information about the network access object based on modern information protection methods as well as to create a kind of the reconfiguration environment in the event of a failure of computer network elements or the need to redistribute the server load

  • It is proposed to use the analysis of the state of an object based on the black box technique, since it makes it possible to reproduce the actions of an external intruder who does not have any information about the object at the initial stage of preparation and conduct typical attacks with subsequent security evaluation [2]

Read more

Summary

Оригинальные статьи

Организация системы сетевого мониторинга и оценки состояния информационной безопасности объекта. Цель исследования заключается в построении модели системы для эффективного сбора информации об объекте сетевого доступа на базе современных методов защиты информации, а также в создании варианта среды реконфигурации в случае возникновения отказа элементов вычислительной сети или необходимости перераспределения серверной нагрузки. Предложена математическая модель, обеспечивающая повышение отказоустойчивости системы и балансирование нагрузки в масштабе реального времени. Итогом проведенных исследований является разработка эффективного построения системы для оценки состояния защищенности объекта. В совокупности с разработанной математической моделью по повышению отказоустойчивости и перераспределения нагрузки на вычислительные мощности в случае сбоев работы оборудования и обходов, в случае полной загруженности элементов показала снижение времени на проведение комплексной оценки состояния информационной безопасности сетевого объекта доступа. Для цитирования: Организация системы сетевого мониторинга и оценки состояния информационной безопасности объекта / А.Л.

Methods
Results
Conclusion
Материалы и методы решения задачи
Результаты и их обсуждение
Список литературы

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.