ADAPTIVE NETWORK ACCESS MANAGEMENT MODEL
Abstract
The conceptual model of adaptive control of a cyber-protected information-computer network (IVS) is described. An example of solving the problem of adaptive management of user access rights using the apparatus of Petri nets is considered. The corresponding model was implemented and simulation was performed in the PIPE v4.3.0 and Petri.Net Simulator packages. 2.017. Like any object of informatization, an ITT requires solving problems of protecting information and cybersecurity (CRL). The general initial task in constructing effective security systems and CIRTs of the OBI IVS remains the task of examining a specific object of protection, forming models of a potential intruder (computer attacker - KZL) and cyber threats. In the opinion of a large number of specialists, the possibility of describing functional models of various security systems of temporary detention facilities in terms of Petri net theory seems quite promising. The implementation of the above steps will ultimately provide adequate requirements for information security systems (SZI) IVS OBI.
About the Authors
B. AkhmetovKazakhstan
D. Kurushbaeva
Kazakhstan
References
1. Gupta, Brij, Dharma P. Agrawal, and Shingo Yamaguchi, eds. Handbook of research on modern cryptographic solutions for computer and cyber security. IGI Global, 2016.
2. Liu, X., Zhu, P., Zhang, Y., & Chen, K. (2015). A collaborative intrusion detection mechanism against false data injection attack in advanced metering infrastructure. IEEE Transactions on Smart Grid, 6 (5), pp. 2435-2443.
3. Jasiul, B., Szpyrka, M., & Śliwa, J. (2014). Detection and modeling of cyber attacks with Petri nets. Entropy, 16 (12), pp. 6602-6623.
4. Liu, X., Zhang, J., & Zhu, P. (2017). Modeling cyber-physical attacks based on probabilistic colored Petri nets and mixed-strategy game theory. International Journal of Critical Infrastructure Protection, 16, pp. 13-25.
5. Jasiul, B., Szpyrka, M., & Śliwa, J. (2015). Formal specification of malware models in the form of colored Petri nets. In Computer Science and its Applications (pp. 475-482). Springer, Berlin, Heidelberg.
6. Akhmetov, B., Lakhno, V., Boiko, Y., & Mishchenko, A. (2017). Designing a decision support system for the weakly formalized problems in the provision of cybersecurity. Eastern-European Journal of Eenterprise Technologies, (1 (2)), pp. 4-15.
7. Arendt, D. L., Burtner, R., Best, D. M., Bos, N. D., Gersh, J. R., Piatko, C. D., & Paul, C. L. (2015, October). Ocelot: user-centered design of a decision support visualization for network quarantine. In Visualization for Cyber Security (VizSec), 2015 IEEE Symposium on (pp. 1-8).
8. Alheeti, K. M. A., Gruebler, A., McDonald-Maier, K. D., & Fernando, A. (2016, January). Prediction of DoS attacks in external communication for self-driving vehicles using a fuzzy petri net model. In Consumer Electronics (ICCE), 2016 IEEE International Conference on (pp. 502-503).
9. de Carvalho, M. A., & Bandiera-Paiva, P. (2017, October). Evaluating ISO 14441 privacy requirements on role based access control (RBAC) restrict mode via Colored Petri Nets (CPN) modeling. In Security Technology (ICCST), 2017 International Carnahan Conference on (pp. 1-8).
10. Appel, M., Konigorski, U., & Walther, M. (2018). A Graph Metric for Model Predictive Control of Petri Nets. IFAC-PapersOnLine, 51 (2), pp. 254-259.
11. Gao, Z., Zhao, C., Shang, C., & Tan, C. (2017, October). The optimal control of mine drainage systems based on hybrid Petri nets. In Chinese Automation Congress (CAC), 2017 (pp. 78-83).
Review
For citations:
Akhmetov B., Kurushbaeva D. ADAPTIVE NETWORK ACCESS MANAGEMENT MODEL. Bulletin of Shakarim University. Technical Sciences. 2020;(4(92)):48-52. (In Russ.)