2025-02-23T21:14:56-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: Query fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22journaliasakpiua-article-45842%22&qt=morelikethis&rows=5
2025-02-23T21:14:56-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: => GET http://localhost:8983/solr/biblio/select?fl=%2A&wt=json&json.nl=arrarr&q=id%3A%22journaliasakpiua-article-45842%22&qt=morelikethis&rows=5
2025-02-23T21:14:56-05:00 DEBUG: VuFindSearch\Backend\Solr\Connector: <= 200 OK
2025-02-23T21:14:56-05:00 DEBUG: Deserialized SOLR response
Синтез структури системи захисту інформації з використанням позиційної гри захисника та зловмисника
The approach to solving tasks on creation of information protection system under the conditions of the attacker’s attacks of complex nature and the limited resources of the defender for the construction of information protection system is proposed. In terms of the game theory the model based on the...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | Ukrainian |
Published: |
The National Technical University of Ukraine "Igor Sikorsky Kyiv Polytechnic Institute"
2013
|
Online Access: | http://journal.iasa.kpi.ua/article/view/45842 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | The approach to solving tasks on creation of information protection system under the conditions of the attacker’s attacks of complex nature and the limited resources of the defender for the construction of information protection system is proposed. In terms of the game theory the model based on the formula of information security risk and conflicting relationship between the attacker and the defender, is built. An optimization problem on minimizing the cost for protection system construction, if there are information about the attacker and the system vulnerabilities, is formed on the basis of developed model. The algorithm of problem solution on the basis of methods of the expert evaluation to get basic data, game theory, mathematical programming is developed. The result of solution of this problem is the optimal set of protection mechanisms, which will provide the maximum level of security (minimum value of information security risk) at the established limitations. On the distributed information and communication system, the calculation of the optimal allocation of protection mechanisms for reaching the minimum value of risk is carried out and practical suitability of the developed approach is proved. |
---|