MODELLING ATTACKER NETWORK RECONNAISSANCE USING THE ENVIRONMENT OF AN INTEGRATED TIME SCALE SYNCHRONIZATION AND DELIVERY SYSTEM
Abstract and keywords
Abstract (English):
To assess the security and vulnerability techniques for a complex system of time scale synchronization and delivery in case of attacker network reconnaissance in the net environment. Methods: Collection, systematization and analysis of scientific and technical information; methods of network and graph theory, mathematical modelling, and probability theory. Results: This paper presents the results of modelling attacker actions during network reconnaissance in communication networks using time-frequency support systems. A semi-Markov and simulation models of attacker behaviour were built reflecting all phases of the confrontation between an organised attacker and an information security system. The semi-Markov and simulation models make it possible to illustrate probability and time characteristics of processes reflecting the confrontation between an organized attacker and an information security system as well as to evaluate these characteristics depending on the content, quantity and quality of the resources available to the attacker and the information security system. The verification of the generated simulation model was carried out using the constructed semi-Markov model. Practical significance: The constructed models can be used to analyze the process of confrontation between information security systems and organized intruders, to assess attacker activities and those of the information security system, as well as to evaluate the time-frequency support systems judging by the results of the confrontation. The simulation results obtained can be used by information security specialists in building, modernizing, and designing security tools for time and frequency reference systems.

Keywords:
Telecommunication system, time-frequency support, network reconnaissance, semi-Markov model, simulation model, attack, attacker
Text
Text (PDF): Read Download
References

1. Ryzhkov A. V. Chastotno-vremennoe obespechenie v setyah elektrosvyazi: uchebnoe posobie dlya vuzov / A. V. Ryzhkov. — M.: Goryachaya liniya — Telekom, 2021. — 270 s.

2. Vanchikov A. S. Sinhronizaciya v sovremennyh setyah operatorskogo klassa / A. S. Vanchikov // Avtomatika, svyaz', informatika. — 2018. — № 8. — S. 19–20.

3. Kanaev A. K. Rekomendacii MSE-T v oblasti sinhronizacii infotelekommunikacionnyh sistem / A. K. Kanaev, A. K. Toschev // Avtomatika, svyaz', informatika. — 2018. — № 10. — S. 8–14.

4. Ryzhkov A. V. Sredstva i sposoby obespecheniya edinogo tochnogo vremeni / A. V. Ryzhkov, E. O. Novozhilov // Avtomatika, svyaz', informatika. — 2018. — № 12. — S. 7‒11.

5. Mazurenko D. K. Aspekty postroeniya sistemy chastotno-vremennoy setevoy sinhronizacii signalov / D. K. Mazurenko // T-Comm — Telekommunikacii i Transport. — 2017. — T. 11. — № 8. — S. 4–8.

6. Dobryshin M. M. Predlozhenie po sovershenstvovaniyu sistem protivodeystviya DDoS-atakam / M. M. Dobryshin // Telekommunikacii. — 2018. — № 10. — S. 32–38.

7. Kanaev A. K. Polumarkovskaya model' deystviy zloumyshlennika pri atake na sistemu upravleniya set'yu taktovoy setevoy sinhronizacii / A. K. Kanaev, E. V. Oparin, M. A. Saharova // Informaciya i kosmos. — 2020. — № 4. — S. 46‒56.

8. Kanaev A. K. Obespechenie informacionnoy bezopasnosti sistemy taktovoy setevoy sinhronizacii na osnove ee entropiynogo analiza / A. K. Kanaev, E. V. Oparin, E. V. Oparina // Izvestiya Peterburgskogo universiteta putey soobscheniya. — 2022. — T. 19. — № 3. — S. 505–514.

9. Shubinskiy I. B. Strukturnaya nadezhnost' informacionnyh sistem. Metody analiza / I. B. Shubinskiy. — Ul'yanovsk: Oblastnaya tipografiya «Pechatnyy dvor», 2012. — 216 s.

10. Efremov M. A. Obzor podhodov k opredeleniyu aktual'nyh ugroz informacii telekommunikacionnym sistemam i predlozheniya po ih sovershenstvovaniyu / M. A. Efremov, I. V. Kaluckiy, M. O. Tanygin i dr. // Telekommunikacii. — 2017. — № 5. — S. 27‒33.

11. Smirnov R. A. Analiz metodik ocenki ugroz bezopasnosti informacii / R. A. Smirnov, S. N. Novikov // Telekommunikacii. — 2023. — № 7. — C. 24–27.

12. Saenko I. B. Model' ugroz resursam ITKS kak klyuchevomu aktivu kriticheski vazhnogo ob'ekta infrastruktury / I. B. Saenko, O. S. Lauta, M. A. Karpov i dr. // Elektrosvyaz'. — 2021. — № 1. — S. 36–44.

13. Kotenko I. V. Metod rannego obnaruzheniya kiberatak na osnove integracii fraktal'nogo analiza i statisticheskih metodov / I. V. Kotenko, I. B. Saenko, O. S. Lauta i dr. // Pervaya milya. — 2021. — № 6. — S. 64–71.

14. Saenko I. B. Modeli komp'yuternyh atak na programmno-konfiguriruemye seti / I. B. Saenko, I. V. Kotenko, O. S. Lauta i dr. // Naukoemkie tehnologii v kosmicheskih issledovaniyah Zemli. — 2023. — T. 15. — № 1. — S. 37–47.

15. Kocynyak M. A. Obespechenie ustoychivosti informacionno-telekommunikacionnyh setey v usloviyah informacionnogo protivoborstva / M. A. Kocynyak, A. I. Osadchiy, M. M. Kocynyak i dr. — SPb.: LO CNIIS, 2014. — 126 s.

Login or Create
* Forgot password?