ANALYSIS OF THE RESULTS OF SIMULATION MODELING OF THE INFORMATION SECURITY SYSTEM AGAINST UNAUTHORIZED ACCESS IN SERVICE NETWORKS

Authors

  • B. G. Ismailov National Aviation Academy, Baku, Azerbaijan, Azerbaijan

DOI:

https://doi.org/10.15588/1607-3274-2024-2-4

Keywords:

unauthorized access, information security systems, information security, queuing systems, defense mechanism, simulation modeling

Abstract

Context. An analysis of the service network shows that insufficient information security in service networks is the cause of huge losses incurred by corporations. Despite the appearance of a number of works and materials on standardization, there is currently no unified system for assessing information security in the field of information security. It should be noted that existing methods, as well as accumulated experience in this area, do not completely overcome these difficulties. This circumstance confirms that this problem has not yet been sufficiently studied and, therefore, remains relevant. The presented work is one of the steps towards creating a unified system for assessing information security in service networks.

Objective. Development of an algorithm and simulation model, analysis of simulation results to determine the key characteristics of the Information Security System, providing the capability for complete closure, through the security system, of all potential threat channels by ensuring control over the passage of all unauthorized access requests through defense mechanisms.

Method. To solve the problem, a simulation method was applied using the principles of queuing system modeling. This method makes it possible to obtain the main characteristics of the Information Security System from the unauthorized access with a limited amount of buffer memory.

Results. Algorithms, models, and methodology have been developed for the development of Information Security System from unauthorized access, considered as a single-phase multi-channel queuing system with a limited volume of buffer memory. The process of obtaining model results was implemented in the General Purpose Simulation System World modelling system, and comparative assessments of the main characteristics of the Information Security System were carried out for various laws of distribution of output parameters, i.e., in this case, unauthorized access requests are the simplest flows, and the service time obeys exponential, constant, and Erlang distribution laws.

Conclusions. The conducted experiments based on the algorithm and model confirmed the expected results when analyzing the characteristics of the Information Security System from the unauthorized access as a single-phase multi-channel queuing system with a limited waiting time for requests in the queue. These results can be used for practical construction of new or modification of existing Information Security System s in service networks of objects of various purposes. This work is one of the approaches to generalizing the problems under consideration for systems with a limited volume of buffer memory. Prospects for further research include research and development of the principles of hardware and software implementation of Information Security System in service networks.

Author Biography

B. G. Ismailov, National Aviation Academy, Baku, Azerbaijan

Dr. Sc., Professor of the Department of Computer Systems and Programming

References

Ismailov B. G. Modelling and analysis of the security system information in service networks, Problemi ínformatizatsíí̈ ta upravlínnya, 2022, Vol. 1, № 69, pp. 46–53. DOI: 10.1 837 2/2073-4751.6 9.16812

Fan L., Wang Y., Cheng X., Li J., Jin S. Privacy theft malware multi-process collaboration analysis, Security and Communication Networks, 2013, No. 8 (1), pp. 51– 67. DOI:10.10 02/sec. 705

Gordon L. A., Loeb M. P. The Economics of Information Security Investment, ACM Transactions on Information and System Security, 2002, No. 5 (4), pp. 438– 457. DOI:10.1145/58 127 1.5812 74. S2CID 1 500 788

Fienberg S. E., Slavković A. B. Data Privacy and Confidentiality, International Encyclopedia of Statistical Science, 2011, pp. 342–345, DOI:10.1007/978-3-642-04898-2_202

Pevnev V. Model Threats and Ensure the Integrity of Information, Systems and Technologies, 2018, No. 2 (56), pp. 80–95. DOI:10.32836/2521-66 43-2018.2-56.6

Loukas G., Oke G. Protection Against Denial of Service Attacks: A Survey, Comput. J., 2012, No. 53 (7), pp. 1020– 1037. Archived from the original on March 24, Retrieved August 28, 2015. DOI: 10.1 093/ com jnl/bxp078

Fowler Kevvie Developing a Computer Security Incident Response Plan, Data Breach Preparation and Response, Elsevier, 2016, pp. 49–77. retrieved June 5, 2021. DOI:10.1016/b978-0-12-803451-4.00003-4

Parker D. B. A Guide to Selecting and Implementing Security Controls, Information Systems Security, 1994, No. 3 (2), pp. 75–86. DOI:10.1080/10658989 4093 42459

Venter H. S., Eloff J. H. P. A taxonomy for information security technologies, Computers & Security, 2003, No.22 (4), pp. 299–307. DOI: 10. 1016/S01674048(03)00406-1

McDermott B. E.,Geer D. Information security is information risk management, In Proceedings of the 2001 Workshop on New Security Paradigms NSPW’01, pp. 97–104. ACM. DOI:10.1 145/ 5081 71. 508187

Authorization and approval program, Internal Controls Policies and Procedures. Hoboken, NJ, US, John Wiley & Sons, Inc., October 23, 2015, pp 69–72, retrieved June1, 2021. DOI:10.1002/9781119 20 39 64.ch10

Almehmadi A., El-Khatib Kh. Authorized! Access denied, unauthorized! Access granted, Proceedings of the 6th International Conference on Security of Information and Networks. Sin '13.US: ACMPress. New York, 2013, pp. 363– 367. DOI:10.1145/2 52 3514.25 23612

Joshi Ch., Singh U. K. Information security risks management framework A step towards mitigating security risks in university network, Journal of Information Security and Applications. August, 2017, No. 35, pp. 128– 137. DOI:10.1016/ j.jisa.2017.06.006

Randall A. Harm, risk and threat, Risk and Precaution. Cambridge, Cambridge University Press, 2011, pp. 31– 42, retrieved May29, 2021. DOİ:1 0.1017/ cbo97805 1197455 7.0 03

Boritz J. E. IS Practitioners’ Views on Core Concepts of Information Integrity, International Journal of Accounting Information Systems. Elsevier, 2005, No. 6 (4), pp. 260– 279. DOI:10.1016/j.accinf. 2005. 07.001

Keyser T. Security policy, The Information Governance Toolkit. CRC Press, April 19, 2018, pp. 57–62, retrieved May 28, 2021. DOI:10.1 201/978 1315385488-13

Downloads

Published

2024-06-12

How to Cite

Ismailov, B. G. (2024). ANALYSIS OF THE RESULTS OF SIMULATION MODELING OF THE INFORMATION SECURITY SYSTEM AGAINST UNAUTHORIZED ACCESS IN SERVICE NETWORKS . Radio Electronics, Computer Science, Control, (2), 34. https://doi.org/10.15588/1607-3274-2024-2-4

Issue

Section

Mathematical and computer modelling