Abstract

One of the leading areas of cybersecurity of communication networks is considered – the introduction of preventive mechanisms, among which the most promising are the methods of active security analysis. These methods allow, in addition to timely detection of vulnerabilities of the target system (analyzed system), to confirm the possibility of their implementation, that is, to validate vulnerabilities by simulating the real actions of a potential attacker. The urgent need to validate vulnerabilities out of the many identified is caused by the fact that some of them can only be theoretical, while others are exploited using malicious scripts (exploits). At the same time, the process of validating vulnerabilities is practically not studied. That is why the work carried out an experimental study of the functioning of modern tools for exploiting vulnerabilities. Based on the observations, general quantitative characteristics of the vulnerability validation process were identified. A mathematical model for the analysis of the above characteristics based on Bernstein polynomials has been developed. It is the polynomial representation of the procedure for confirming the possibility of implementing the identified vulnerabilities that makes it possible to describe the dynamics of this process, taking into account the complex and volatile nature of the environment. Analytical dependencies are obtained for the number of cases of successful and negative confirmation of vulnerabilities. In particular, negative validation cases include simply failed attempts to validate vulnerabilities, as well as attempts that resulted in critical errors on the target system during the rational cycle of validating the identified vulnerabilities. The proposed dependencies make it possible to construct the probability distribution laws for the above characteristics of the vulnerability testing process.

Highlights

  • Based on the latest published data regarding the cybersecurity of companies, it is possible to determine how effective measures are taken by companies to protect their corporate networks

  • The most promising are the methods of active analysis of the security of corporate networks. These methods allow, in addition to the timely detection of vulnerabilities of the target system, to check them, that is, to confirm the possibility of implementing specific vulnerabilities by simulating the real actions of a potential attacker. It is the verification of identified vulnerabilities that is a key element of active security analysis, since some vulnerabilities are purely theoretical in nature, while others can be implemented using known exploits

  • In the course of an experimental study of the functioning of modern means of exploiting vulnerabilities, generalized characteristics of the vulnerability verification process were identified. This is the number of successfully tested vulnerabilities of the target system – qs, as well as the number of negative confirmations of vulnerabilities

Read more

Summary

Introduction

Based on the latest published data regarding the cybersecurity of companies, it is possible to determine how effective measures are taken by companies to protect their corporate networks. The most promising are the methods of active analysis of the security of corporate networks These methods allow, in addition to the timely detection of vulnerabilities of the target system (the analyzed system), to check them, that is, to confirm the possibility of implementing specific vulnerabilities by simulating the real actions of a potential attacker. It is the verification of identified vulnerabilities that is a key element of active security analysis, since some vulnerabilities are purely theoretical in nature, while others can be implemented using known exploits. The improvement of Eastern-European Journal of Enterprise Technologies ISSN 1729-3774

Objectives
Methods
Findings
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call