Modeling network computer systems with vulnerabilities
Prikladnaâ diskretnaâ matematika, no. 3 (2009), pp. 91-99.

Voir la notice de l'article provenant de la source Math-Net.Ru

In the paper, a model for discretionary network computer systems with vulnerabilities is proposed. The model is based on the DP-model with functionally or parametrically associated with subjects entities. It is shown how to apply this model for finding all the possible paths to violate the security policy, for representating other models designed for the same purposes by its means, and for developing it in order to verify if an untrusted entity could take the rights of a trusted entity.
@article{PDM_2009_3_a9,
     author = {D. N. Kolegov},
     title = {Modeling network computer systems with vulnerabilities},
     journal = {Prikladna\^a diskretna\^a matematika},
     pages = {91--99},
     publisher = {mathdoc},
     number = {3},
     year = {2009},
     language = {ru},
     url = {http://geodesic.mathdoc.fr/item/PDM_2009_3_a9/}
}
TY  - JOUR
AU  - D. N. Kolegov
TI  - Modeling network computer systems with vulnerabilities
JO  - Prikladnaâ diskretnaâ matematika
PY  - 2009
SP  - 91
EP  - 99
IS  - 3
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/PDM_2009_3_a9/
LA  - ru
ID  - PDM_2009_3_a9
ER  - 
%0 Journal Article
%A D. N. Kolegov
%T Modeling network computer systems with vulnerabilities
%J Prikladnaâ diskretnaâ matematika
%D 2009
%P 91-99
%N 3
%I mathdoc
%U http://geodesic.mathdoc.fr/item/PDM_2009_3_a9/
%G ru
%F PDM_2009_3_a9
D. N. Kolegov. Modeling network computer systems with vulnerabilities. Prikladnaâ diskretnaâ matematika, no. 3 (2009), pp. 91-99. http://geodesic.mathdoc.fr/item/PDM_2009_3_a9/

[1] Artz M., NETspa, A Network Security Planning Architecture, M. S. Thesis, Massachusetts Institute of Technology, Cambridge, 2002

[2] Shahriary H. R. et al., “Network Vulnerability Analysis Thorough Vulnerability Take-Grant Model”, Proc. of 7th International Conference on Information and Communications Security, 2005

[3] Danforth M., Models for Threat Assessment in Networks, Ph. D. dissertation, University of California, Davis, 2006

[4] Jajodia S., “Topological Analysis of Network Attack Vulnerability”, Managing Cyber Threats: Issues, Approaches and Challenges, 2003

[5] Sheyner O., Scenario Graphs and Attack Graphs, Ph. D. dissertation, Carnegie Mellon University, Pittsburgh, 2004

[6] Devyanin P. N., Analiz bezopasnosti upravleniya dostupom i informatsionnymi potokami v kompyuternykh sistemakh, Radio i svyaz, M., 2006, 176 pp.

[7] Kolegov D. N., “DP-model kompyuternoi sistemy s funktsionalno i parametricheski assotsiirovannymi s sub'ektami suschnostyami”, Vestnik Sibirskogo gosudarstvennogo aerokosmicheskogo universiteta imeni akademika M. F. Reshetneva, 2009, no. 1(22), Chast 1, 49–54

[8] Kolegov D. N., “Analiz bezopasnosti informatsionnykh potokov po pamyati v kompyuternykh sistemakh s funktsionalno i parametricheski assotsiirovannymi suschnostyami”, Prikladnaya diskretnaya matematika, 2009, no. 1(3), 117–125

[9] Souppaya M. et al., Technical Guide to Information Security Testing and Assessment, Recommendations of the National Institute of Standards and Technology, 2008

[10] Bezopasnost informatsionnykh tekhnologii. Kontseptsiya otsenki sootvetstviya avtomatizirovannykh sistem trebovaniyam bezopasnosti informatsii, FSTEK Rossii. Rukovodyaschii dokument, M., 2004

[11] Burenin P. V., “Podkhody k postroeniyu DP-modeli failovykh sistem”, Prikladnaya diskretnaya matematika, 2009, no. 1(3), 93–112

[12] Kasperskii K., Tekhnika setevykh atak. T. 1: Priemy protivodeistviya, SOLON-press, M., 2001, 400 pp.

[13] Koziol Dzh., Lichfild D., Eitel D. i dr., Iskusstvo vzloma i zaschity sistem, Piter, SPb., 2006, 416 pp.

[14] Proskurin V. G., Krutov S. V., Matskevich I. V., Zaschita v operatsionnykh sistemakh, Ucheb. posobie dlya vuzov, Radio i svyaz, M., 2000, 168 pp.

[15] McNab C., Network Security Assessment, second edition, ISBN-10:0-596-51030-6, 2007, 478 pp.

[16] Baza uyazvimostei SecurityFocus, [Elektronnyi resurs]. Rezhim dostupa: http://www.securityfocus.com/bid

[17] Baza uyazvimostei NVD, [Elektronnyi resurs]. Rezhim dostupa: http://nvd.nist.gov

[18] Kolegov D. N., “Primenenie DP-modelei dlya analiza zaschischennosti setei”, Prikladnaya diskretnaya matematika, 2008, no. 1, 71–87