TO THE QUESTION OF THE PROBABILITY OF THE ATTACKMENT OF DAMAGE AS A RESULT OF ATTACK ON THE INFORMATION RESOURCE OF INFORMATION AND TECHNICAL SYSTEMS OF INTERNAL AFFAIRS TYPE "REFUSAL IN SERVICE"
https://doi.org/10.21822/2073-6185-2018-45-4-68-77
Abstract
Objectives In order to improve the security of departmental information technology systems and the rationality of the financial costs of hardware solutions in such systems, it is advisable to develop a simulation model of the information technology system of an internal affairs authority (ITS ATS) connected to the Internet to determine the likelihood of damage occurring denial of service attacks. Lead and clarify for the ITS ATS a classification of modern-time complex ITS, which will allow identifying possible threats to the ITS information resource ATS based on open federal and departmental regulatory documents in connection with Internet connection. Further development of the ATS ITS model was done in the Anylogic simulation environment, which makes it possible to simulate a denial of service attack on a departmental resource and investigate the likelihood of damage occurring. The expressions from the apparatus of queuing systems are given, which allow modeling the attack and calculating the probability of damage occurrence, which is advisable to use when designing such systems in ATS. Method. Analytical and mathematical modeling using the apparatus of queuing systems. Result. A simulation model of ITS ATS is proposed, which allows to determine the probability of a destructive impact on the departmental resources of such systems. Conclusion. The direction of this study is relevant and requires further development in order to develop a methodology for assessing
the occurrence of damage in ITS ATS.
About the Authors
I. V. AlekhinRussian Federation
Adjunct, Dr. Sci. (Technical), Prof., Department of Automated Information Systems of Internal Affairs
53 Patriotov Str.,Voronezh 394065, Russia
O. I. Bokova
Russian Federation
Dr.Sci. (Technical), Prof., Deputy Head of the Voronezh Institute of the Ministry of Internal Affairs of Russia for Scientific Work
53 Patriotov Str.,Voronezh 394065, Russia
D. I. Korobkin
Russian Federation
Cand.Sci., Assoc. Prof., Head of the Research Department (Information Technology)
54A Starykh Bolshevikov Str.,Voronezh 394064, Russia
E. A. Rogozin
Russian Federation
Dr.Sci. (Technical), Prof., Dr. Sci. (Technical), Prof., Department of Automated Information Systems of Internal Affairs
53 Patriotov Str.,Voronezh 394065, Russia
References
1. Federal'nyy zakon "O politsii" ot 7 fevralya 2011 g. N 3-FZ. [The Federal Law "On Police" of February 7, 2011 N 3-FZ. (In Russ.)]
2. Federal'nyy zakon «Ob informatsii, informatsionnykh tekhnologiyakh i o zashchite informatsii». [Federal Law “On Information, Information Technologies and Information Protection” (In Russ.)]
3. Prikaz MVD RF ot 14.03.2012 g. №169 «Ob utverzhdenii Kontseptsii obespecheniya informatsionnoy bezopasnosti organov vnutrennikh del Rossiyskoy Federatsii do 2020 goda». Ob utverzhdenii Pravil organizatsii dostupa k informatsionno-telekommunikatsionnoy seti «Internet» v organakh vnutrennikh del Rossiyskoy Federatsii ».Prikaz MVD Rossii ot 24.12.2015 № 1228. [Order of the Ministry of Internal Affairs of the Russian Federation of March 14, 2012 No. 169 “On approval of the Concept for ensuring information security of the internal affairs bodies of the Russian Federation until 2020”. On approval of the Rules for organizing access to the information and telecommunication network “Internet” in the internal affairs bodies of the Russian Federation. ”Order of the Ministry of Internal Affairs of Russia of December 24, 2015 No. 1228. (In Russ.)]
4. Zelenskiy V.A. Proyektirovaniye slozhnykh sistem. Uchebnoye posobiye. — Samara: Samarskiy gosudarstvennyy aerokosmicheskiy universitet, 2012. — 96 s. [Zelensky V.A. Designing complex systems. Tutorial. - Samara: Samara State Aerospace University, 2012. - 96 p. (In Russ.)]
5. KabanovA.S. Model' otsenki riska narusheniya informatsionnoy bezopasnosti / A.S.Kabanov, A.B. Los', V.I. Truntsev// Doklady Tomskogo gosudarstvennogo universiteta sistem upravleniya i ra-dioelektroniki. 2012. T. 1. № 25. S. 87-91. [KabanovA.S. Model for assessing the risk of breach of information security / A.S.Kabanov, A.B. Los, V.I. Truncev // Reports of Tomsk State University of Control Systems and Radio Electronics. 2012. V. 1. Number 25. P. 87-91. (In Russ.)]
6. https://bdu.fstec.ru/threat. (In Russ.)
7. Trub I. I. Ob"yektno-oriyentirovannoye modelirovaniye na S++ / I. I. Trub. – SPb.: Piter, 2006. –411 s. [Trub I. I. Object-Oriented Modeling in C ++ / I. I. Trub. - SPb .: Peter, 2006. –411 p. (In Russ.)]
8. Vishnevskiy V. M. Teoreticheskiye osnovy proyektirovaniya komp'yuternykh setey / V.M. Vish-nevskiy. — M.: Tekhnosfera, 2003.— 506 s [Vishnevsky V. М. Theoretical bases of computer networks design / V.M. Wish Nevsky. - M .: Technosphere, 2003. 506 p. (In Russ.)]
9. Kleynrok L. Vychislitel'nyye sistemy s ocheredyami / L. Kleynrok: Per. s angl. – M.: Mir, 1979. – 600s. [Kleinrock L. Computing systems with queues / L. Kleinrock: Trans. from English - M .: Mir, 1979. - 600s. (In Russ.)]
10. Remezova Ye. M. Imitatsionnoye modelirovaniye v srede AnyLogic : lab. praktikum / Ye. M. Remezova ; Vladim. gos. un-t im. A. G. i N. G. Stoletovykh. Vladimir : Izd-vo VlGU, 2017. 87 s. [Remezova EM. AnyLogic simulation modeling: lab. workshop / E.M. Remezova; We hold. state un-t them. G. G. and N. G. Stoletovs. Vladimir: VlSU Publishing House, 2017. 87 p. (In Russ.)]
11. Syed R.A. Next generation and advanced network reliability analysis / R.A.Syed - Springer, 2018. 311 p.
12. Stel'mashonok Ye.V. Vozmozhnosti imitatsionnogo modelirovaniya dlya issledovaniya funktsioniro-vaniya sistemy zashchity informatsii / Ye.V. Stel'mashonok, V.L. Stel'mashonok // Peterburgskiy ekonomicheskiy zhurnal. — 2017. — №4. — S. 57–68. [ Stelmashonok E.V. Possibilities of simulation modeling for the study of the functioning of an information protection system / E.V. Stelmashonok, V.L. Stelmashonok // Petersburg Economic Journal. - 2017. - №4. - pp. 57–68. (In Russ.)]
13. Algoritm imitatsionnoy modeli protivodeystviya nesanktsionirovannomu dostupu k avtomatiziro-vannoy informatsionnoy sisteme spetsial'nogo naznacheniya sredstvami zashchity informatsii / S.S. Kochedykov [i dr.] // Matematicheskiye metody i informatsionnyye tekhnologii upravleniya v nauke, obrazovanii i pravookhranitel'noy sfere. — 2017. — S. 98–103. [Algorithm of a simulation model of countering unauthorized access to a specialpurpose automated information system by means of information protection / S.S. Kochedykov [et al.] // Mathematical methods and information technology management in science, education and law enforcement. - 2017. - pp. 98–103. (In Russ.)]
14. Bugrov YU.G. Povysheniye kachestva imitatsionnoy modeli sistemy zashchity informatsii / YU.G. Bug-rov, V.V. Miroshnikov, D.V. Kochergin // Informatsiya i bezopasnost'. — 2008. — T. 11. — № 1. — S. 69–73. [ Bugrov Yu.G. Improving the quality of the simulation model of information security systems / Yu.G. Bug-ditch, V.V. Miroshnikov, D.V. Kochergin // Information and Security. - 2008. - V. 11. - № 1. - P. 69–73. (In Russ.)]
15. Rogozin Ye.A. Model' funktsionirovaniya tipovoy sistemy zashchity informatsii ot nesanktsioniro-vannogo dostupa v avtomatizirovannykh informatsionnykh sistemakh OVD / Ye.A. Rogozin, A.D. Popov // Vestnik Voronezhskogo instituta MVD Rossii. — 2016. — № 4. — S. 122–132. [Rogozin E.A. Model of functioning of a typical system of information protection from unauthorized access in automated information systems of ATS / Ye.A. Rogozin, A.D. Popov // Bulletin of the Voronezh Institute of the Ministry of Internal Affairs of Russia. - 2016. - № 4. - P. 122–132. (In Russ.)]
16. Sinegubov S.V. Modelirovaniye sistem i setey telekommunikatsiy / S.V. Sinegubov. — Voronezh: Voronezh. in-t MVD Rossii, 2016. — 336 s. [Sinegubov S.V. Simulation of telecommunication systems and networks / S.V. Sinegubov. - Voronezh: Voronezh. Institute of the Ministry of Internal Affairs of Russia, 2016. - 336 p. (In Russ.)]
17. Modelirovaniye mnogourovnevykh sistem zashchity informatsii REDS / A.V. Volod'ko [i dr.] // Telekommunikatsionnyye ustroystva i sistemy. — 2014. — S. 423–426. [Modeling of multi-level information security systems REDS / А.V. Volodko [et al.] // Tele-communication devices and systems. - 2014. - p. 423–426. (In Russ.)]
18. Klimov S.M. Imitatsionnyye modeli ispytaniy kriticheski vazhnykh informatsionnykh ob"yektov v usloviyakh komp'yuternykh atak / S.M. Klimov // Izvestiya YUFU. Tekhnicheskiye nauki. — 2016. — № 8 (181). — S. 27–36.[ Klimov S.M. Simulation models of testing critical information objects in the conditions of computer attacks / S.M. Klimov // News SFU. Technical science. - 2016. - № 8 (181). - p. 27–36. (In Russ.)]
Review
For citations:
Alekhin I.V., Bokova O.I., Korobkin D.I., Rogozin E.A. TO THE QUESTION OF THE PROBABILITY OF THE ATTACKMENT OF DAMAGE AS A RESULT OF ATTACK ON THE INFORMATION RESOURCE OF INFORMATION AND TECHNICAL SYSTEMS OF INTERNAL AFFAIRS TYPE "REFUSAL IN SERVICE". Herald of Dagestan State Technical University. Technical Sciences. 2018;45(4):68-77. (In Russ.) https://doi.org/10.21822/2073-6185-2018-45-4-68-77