Voir la notice de l'article provenant de la source Math-Net.Ru
@article{MAIS_2017_24_4_a4, author = {A. A. Magazev and V. F. Tsyrulnik}, title = {Investigation of a {Markov} model for computer system security threats}, journal = {Modelirovanie i analiz informacionnyh sistem}, pages = {445--458}, publisher = {mathdoc}, volume = {24}, number = {4}, year = {2017}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/MAIS_2017_24_4_a4/} }
TY - JOUR AU - A. A. Magazev AU - V. F. Tsyrulnik TI - Investigation of a Markov model for computer system security threats JO - Modelirovanie i analiz informacionnyh sistem PY - 2017 SP - 445 EP - 458 VL - 24 IS - 4 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/MAIS_2017_24_4_a4/ LA - ru ID - MAIS_2017_24_4_a4 ER -
A. A. Magazev; V. F. Tsyrulnik. Investigation of a Markov model for computer system security threats. Modelirovanie i analiz informacionnyh sistem, Tome 24 (2017) no. 4, pp. 445-458. http://geodesic.mathdoc.fr/item/MAIS_2017_24_4_a4/
[1] Ye N. et al., “Robustness of the Markov-Chain Model for Cyber-Attack Detection”, IEEE Transactions on Reliability, 53:1 (2004), 116–123 | DOI | Zbl
[2] Fava D. et al., “Projecting Cyberattacks through Variable-Length Markov Models”, IEEE Transactions on Information Forensics and Security, 3:3 (2008), 359–369 | DOI
[3] Piétre-Cambacédès L., Bouissou M., “Beyond Attack Trees: Dynamic Security Modeling with Boolean Logic Driven Markov Processes (BDMP)”, Proceedings of the 2010 European Dependable Computing Conference, IEEE Computer Society, 2010, 199–208 | DOI
[4] Dalinger Ya. M. et al., “The mathematical models of the spreading of viruses in computer networks with the diferent structures”, Information Science and Control Systems, 2011, no. 4, 3–11 (in Russian)
[5] Ye N., “A Markov Chain Model of Temporal Behavior for Anomaly Detection”, Proceeding on the 2000 IEEE Systems, Man, and Cybern. Information Assurance and Security Workshop, IEEE Computer Society, 2000, 171–174
[6] Kovalev S. M., Sukhanov A. V., “Anomaly detection based on Markov chain model with production rules”, Software and Systems, 107:3 (2014), 40–43 | DOI
[7] Bogatyrev V. A. et al., “Intervals optimization of systems information security inspection”, Scientific and Technical Journal of Information Technologies, Mechanics and Optics, 2014, no. 5 (93), 119–125 (in Russian)
[8] Shcheglov K. A. et al., “Mathematical models of operational information security”, Information security questions, 2014, no. 3, 52–65 (in Russian)
[9] Vobbilisetty R. et al., “Classic Cryptanalysis Using Hidden Markov Models”, Cryptologia, 41:1, 1–28 | DOI
[10] Austin T. H. et al., “Exploring Hidden Markov Models for Virus Analysis: a Semantic Approach”, Proceedings of the 2013 46th Hawaii International Conference on System Sciences, IEEE Computer Society, 2013, 5039–5048 | DOI
[11] Klimenko E. S., Rosenko A. P., “Markovskaya model otsenki vliyaniya vnutrennikh ugroz na bezopasnost konfidentsialnoy informatsii”, Izvestiya SFedU. Engineering Sciences, 2007, no. 4(76), 123–126 (in Russian)
[12] Rosenko A. P., “Mathematical Modelling of Internal Threats on Safety of the Confidential Information Circulating in Automated Information System Availability”, Izvestiya SFedU. Engineering Sciences, 2008, no. 8(85), 71–81 (in Russian)
[13] Shcheglov K. A., Shcheglov A. Yu., “Markov models for informational system security threat”, Izvestiya Vysshikh Uchebnykh Zavedeniy. Priborostroenie, 58:12 (2015), 957–965 (in Russian)
[14] Shcheglov K. A., Shcheglov A. Yu., “Modeling of information system security threat using approximating functions”, Izvestiya Vysshikh Uchebnykh Zavedeniy. Priborostroenie, 59:1 (2016), 50–59 (in Russian)
[15] Gnedenko B. V. et al., Mathematical Methods of Reliability Theory, Academic Press, 1969, 503 pp. | MR | Zbl
[16] Rausand M, Hoyland A., System Reliability Theory: Models, Statistical Methods, and Applications, John Wiley Sons, 2004, 664 pp. | MR | Zbl
[17] Ovchinnikov A. I. et al., “Mathematical Model of Optimal Selection of Aids of Protection Against Threats for Safety of Enterprise Computer Network”, Herald of the Bauman Moscow State Technical University. Series Instrument Engineering, 2007, no. 3, 115–121 (in Russian)
[18] Zavgorodniy V. I., “System management of information risks: choice of mechanisms for protection against information risks”, Problemy Upravleniya, 2009, no. 1, 53–58 (in Russian)
[19] Yudin D. B., Gol'shteyn E. G., Lineynoe programmirovanie. Teoriya, metody i prilozheniya, Nauka, 1969, 424 pp. (in Russian) | MR