2025-02-22T21:02:27-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: Query fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22drspiprikievua-article-199268%22&qt=morelikethis&rows=5
2025-02-22T21:02:27-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: => GET http://localhost:8983/solr/biblio/select?fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22drspiprikievua-article-199268%22&qt=morelikethis&rows=5
2025-02-22T21:02:27-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: <= 200 OK
2025-02-22T21:02:27-05:00 DEBUG: Deserialized SOLR response
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
It is impossible to imagine modern life without the use of computer networks, which offer many opportunities for their users. However, computer networks and their resources are constantly at risk of being infected by malware or from various types of network attacks. Therefore, for the proper functio...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | Ukrainian |
Published: |
Інститут проблем реєстрації інформації НАН України
2019
|
Subjects: | |
Online Access: | http://drsp.ipri.kiev.ua/article/view/199268 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
drspiprikievua-article-199268 |
---|---|
record_format |
ojs |
spelling |
drspiprikievua-article-1992682020-03-31T09:01:58Z Development of a cognitive model for analysis of the impact of threats on the security level of a computer network Розробка когнітивної моделі для аналізу впливу загроз на рівень захищеності комп’ютерної мережі Saliieva, O. V. Yaremchuk, Yu. E. інформаційна безпека загрози безпеці комп’ютерна мережа когнітивне моделювання нечітка когнітивна карта information security security threats computer network cognitive modeling fuzzy cognitive map It is impossible to imagine modern life without the use of computer networks, which offer many opportunities for their users. However, computer networks and their resources are constantly at risk of being infected by malware or from various types of network attacks. Therefore, for the proper functioning of the network and the provision of quality services, special attention is paid to the organization of network security. To solve problems related to the protection of computer networks, it is convenient to apply a cognitive approach based on the creation and analysis of a fuzzy cognitive map that reflects the status of the situation under study. Considering the importance of this issue, a cognitive model has been developed that reflects the security level of a computer network when exposed to potential threats. A matrix of interaction of concepts is formed and on the basis of it the basic system indicators are calculated, such as: consonance, dissonance and influence of concepts on the system. The analysis of these indicators revealed the most dangerous threats to network security such as: malware, physical impact on the network by the attacker, unintentional actions and errors of network users. Increasing the impact of these concepts on the network, various scenarios have been simulated, resulting in a relative change in the security level of the network. It is revealed that with increased influence of the concept of «unintentional actions, mistakes of network users» the security will be reduced the most, and with the increase of the concept of «physical influence on the network by the attacker» the fault tolerance of network operation will worsen as much as possible. The results of this study will contribute to the implementation of the necessary mechanisms to prevent, protect and control access at the appropriate levels of network infrastructure. Tabl.: 2. Fig.: 5. Refs: 13 titles. Розроблено когнітивну модель, яка відображає рівень захищеності комп’ютерної мережі при впливі на неї потенційних загроз. Сформовано матрицю взаємовпливів концептів нечіткої когнітивної карти та розраховано основні системні показники, такі як: консонанс, дисонанс і вплив концептів на систему. Аналіз даних показників дозволив виявити найбільш небезпечні загрози мережевій безпеці, що, у свою чергу, надає можливість вчасно провести відповідні заходи для послаблення ступеню негативних наслідків або ж запобігти їм. Інститут проблем реєстрації інформації НАН України 2019-12-24 Article Article application/pdf http://drsp.ipri.kiev.ua/article/view/199268 10.35681/1560-9189.2019.21.4.199268 Data Recording, Storage & Processing; Vol. 21 No. 4 (2019); 28-39 Регистрация, хранение и обработка данных; Том 21 № 4 (2019); 28-39 Реєстрація, зберігання і обробка даних; Том 21 № 4 (2019); 28-39 1560-9189 uk http://drsp.ipri.kiev.ua/article/view/199268/199718 Авторське право (c) 2021 Реєстрація, зберігання і обробка даних |
institution |
Data Recording, Storage & Processing |
collection |
OJS |
language |
Ukrainian |
topic |
інформаційна безпека загрози безпеці комп’ютерна мережа когнітивне моделювання нечітка когнітивна карта information security security threats computer network cognitive modeling fuzzy cognitive map |
spellingShingle |
інформаційна безпека загрози безпеці комп’ютерна мережа когнітивне моделювання нечітка когнітивна карта information security security threats computer network cognitive modeling fuzzy cognitive map Saliieva, O. V. Yaremchuk, Yu. E. Development of a cognitive model for analysis of the impact of threats on the security level of a computer network |
topic_facet |
інформаційна безпека загрози безпеці комп’ютерна мережа когнітивне моделювання нечітка когнітивна карта information security security threats computer network cognitive modeling fuzzy cognitive map |
format |
Article |
author |
Saliieva, O. V. Yaremchuk, Yu. E. |
author_facet |
Saliieva, O. V. Yaremchuk, Yu. E. |
author_sort |
Saliieva, O. V. |
title |
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network |
title_short |
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network |
title_full |
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network |
title_fullStr |
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network |
title_full_unstemmed |
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network |
title_sort |
development of a cognitive model for analysis of the impact of threats on the security level of a computer network |
title_alt |
Розробка когнітивної моделі для аналізу впливу загроз на рівень захищеності комп’ютерної мережі |
description |
It is impossible to imagine modern life without the use of computer networks, which offer many opportunities for their users. However, computer networks and their resources are constantly at risk of being infected by malware or from various types of network attacks. Therefore, for the proper functioning of the network and the provision of quality services, special attention is paid to the organization of network security. To solve problems related to the protection of computer networks, it is convenient to apply a cognitive approach based on the creation and analysis of a fuzzy cognitive map that reflects the status of the situation under study. Considering the importance of this issue, a cognitive model has been developed that reflects the security level of a computer network when exposed to potential threats. A matrix of interaction of concepts is formed and on the basis of it the basic system indicators are calculated, such as: consonance, dissonance and influence of concepts on the system. The analysis of these indicators revealed the most dangerous threats to network security such as: malware, physical impact on the network by the attacker, unintentional actions and errors of network users. Increasing the impact of these concepts on the network, various scenarios have been simulated, resulting in a relative change in the security level of the network. It is revealed that with increased influence of the concept of «unintentional actions, mistakes of network users» the security will be reduced the most, and with the increase of the concept of «physical influence on the network by the attacker» the fault tolerance of network operation will worsen as much as possible. The results of this study will contribute to the implementation of the necessary mechanisms to prevent, protect and control access at the appropriate levels of network infrastructure. Tabl.: 2. Fig.: 5. Refs: 13 titles. |
publisher |
Інститут проблем реєстрації інформації НАН України |
publishDate |
2019 |
url |
http://drsp.ipri.kiev.ua/article/view/199268 |
work_keys_str_mv |
AT saliievaov developmentofacognitivemodelforanalysisoftheimpactofthreatsonthesecuritylevelofacomputernetwork AT yaremchukyue developmentofacognitivemodelforanalysisoftheimpactofthreatsonthesecuritylevelofacomputernetwork AT saliievaov rozrobkakognítivnoímodelídlâanalízuvplivuzagroznarívenʹzahiŝenostíkompûternoímereží AT yaremchukyue rozrobkakognítivnoímodelídlâanalízuvplivuzagroznarívenʹzahiŝenostíkompûternoímereží |
first_indexed |
2024-04-21T19:34:09Z |
last_indexed |
2024-04-21T19:34:09Z |
_version_ |
1796974103624679424 |