METODIKA OCENIVANIYA ZASCHISCHENNOSTI INFORMACIONNO- TELEKOMMUNIKACIONNYH UZLOV
Rubrics: ARTICLES
Abstract and keywords
Abstract (English):
V rabote rassmatrivayutsya perspektivnye napravleniya issledovaniy v oblasti analiza zaschischennosti informacionno-telekommunikacionnyh setey i vvodyatsya osnovnye pokazateli dlya rascheta ih zaschischennosti. Predlagaetsya mnogourovnevyy podhod k ocenivaniyu zaschischennosti, osnovannyy na derev'yah atak i zavisimostyah servisov.

Keywords:
pokazateli zaschischennosti, derevo atak, ocenka riskov, uyazvimost'
References

1. GOST R 52653-Informacionno-kommunika cionnye tehnologii v obrazovanii. Terminy i opredeleniya. – M. : Standartinform, – 11 s.

2.

3. Kotenko I. V. Perspektivnye napravleniya issledovaniy v oblasti komp'yuternoy bezopasnosti / I. V. Kotenko, R. M. Yusupov // Zaschita informacii. Insayd. – – No – S. 46–57.

4.

5. Blakely B. A. Cyberprints Identifying cyber attackers by feature analysis : Doctoral Diss. – Iowa State Univ. 2012.

6.

7. Kumar S. An Application of Pattern Matching in Intrusion Detection / S. Kumar, E. H. Spafford // Tech. Rep. CSDTR 94 The COAST Project. Department of Comput. Sci. Purdue Univ. – West Lafayette, 1994.

8.

9. Iglun K. State Transition Analysis: A Rule-Based Intrusion Detection System / K. Iglun, R. A. Kemmerer, P. A. Porras // IEEE Trans. Software Eng. – – No. 21 (3).

10.

11. Cohen F. Simulating Cyber Attacks, Defenses, and Consequences / F. Cohen // IEEE Symp. Security and Privacy. – Berkeley, CA. 1999.

12.

13. Yuill J. Intrusion-detection for incident-response, using a military battlefield-intelligence process / J. Yuill, F. Wu, J. Settle, F. Gong, R. Forno, M. Huang, J. Asbery // Comput. Networks. – – No. 34.

14.

15. Huang M.-Y. A Large-scale Distributed Intrusion Detection Framework Based on Attack Strategy Analysis / M.-Y. Huang, T. M. Wicks // First Int. Workshop on the Recent Advances in Intrusion Detection, Raid’– Louvain-la-Neuve, Belgium, 1998.

16.

17. Schneier B. Attack Trees / B. Schneier // Dr. Dobb’s J. – –Vol. 12.

18.

19. Kotenko I. V. Primenenie grafov atak dlya ocenki zaschischennosti komp'yuternyh setey i analiza sobytiy bezopasnosti / I. V. Kotenko, A. A. Chechulin // Sistemy vysokoy dostupnosti. – – T. 9, No – S. 103–110.

20.

21. Abramov E. S. Primenenie grafov atak dlya modelirovaniya vredonosnyh setevyh vozdeystviy / E. S. Abramov, A. V. Andreev, D. V. Mordvin // Izv. YuFU. Tehnicheskie nauki. – – No – S. 165–174.

22.

23. Moitra S. D. A Simulation Model for Managing Survivability of Networked Information Systems / S. D. Moitra, S. L. Konda // Tech. Rep. CMU/SEI-2000-TR-020 ESC-TR-2000-– – 47 p.

24.

25. Chi S.-D. Network Security Modeling and Cyber Attack Simulation Methodology / S.-D. Chi, J. S. Park, K.-C. Jung, J.-S. Lee // Lecture Notes in Computer Sci. – Carnegie Mellon Univ., – Vol. 2119.

26.

27. Templeton S. J. A Requires/Provides Model for Computer Attack / S. J. Templeton, K. Levitt // NSPW 2000 : Proc. of the 2000 Workshop on New Security Paradigms. – NY : ACM, – P. 31–38.

28.

29. Morin B. M2d2 : A formal data model for ids alert correlation / B. Morin, L. Me, H. Debar, M. Ducasse // Lecture Notes in Comput. Sci. – Berlin : Springer-Verlag, – Vol. – P. 115–137.

30.

31. Mery zaschity informacii v gosudarstvennyh informacionnyh sistemah : metodicheskiy dokument (utv. FSTEK RF 11.02.2014).

32.

33. Peltier T. R. How to complete a risk assessment in 5 days or less / T. R. Peltier // Auerbach publ. – – P. 1–55.

34.

35. http://cve.mitre.org (data obrascheniya 25.11.2015).

36.

37. Bank dannyh ugroz bezopasnosti informacii FSTEK RF – URL : http://bdu.fstec.ru/threat (data obrascheniya 25.11.2015).

38.

39. http://capec.mitre.org (data obrascheniya 25.11.2015).

40.

41. http://bdu.fstec.ru/calc (data obrascheniya 25.11.2015)

Login or Create
* Forgot password?