Affiliation:
1. Taras Shevchenko National University of Kyiv
2. Khmelnytskyi National University
Abstract
The article proposes an approach to defining a security model for the dissemination of prohibited information in information and telecommunication networks.
The most effective prediction of the spread of the prohibited information threat is carried out by modeling this process. Information and telecommunication networks are large-scale networks with an ever-growing number of subscribers. With the rapid growth in the number of ITKS users, there are problems of information security and information protection in them.
The analysis of information security problems proved that apart from the problems associated with the use of the global Internet as a distributed information and telecommunication system, it is well known and can be solved, there is a poorly studied problem of prohibited content.
Creation of models and algorithms for the spread of the threat of prohibited information is one of the key approaches to solving this problem. The analysis of publications on this topic shows that existing solutions are ineffective. Usually, when modeling the propagation of a threat of prohibited information, the ITKS topology (the network model is a fully connected graph) is not taken into account. When modeling the threat of the spread of prohibited information, it is important to have a topology that reflects the structure of connections in a real network, as well as to use an adequate model of information interaction between nodes. Another important problem is the large-scale ITCS, which makes it difficult to obtain data from the simulation model in a reasonable time. The solution to this problem is to create an analytical model of the threat of the spread of prohibited information in the ITCS.
An algorithm has been developed for the implementation of TSPI (threat of the spread of prohibited information) in the ITKS, based on the nature of the processes occurring in real conditions.
The simulation model of TSPI in ITKS has been proposed, which takes into account the topological characteristics of the network, as well as the features of information interaction of subscribers as man-machine systems. With its help, experiments have been carried out, the results of which have shown the dependence of the implementation of the RFID on the topological vulnerability of the network.
An analytical model of the TSPI has been developed, taking into account the topological vulnerability of the network. The relevance of the results of the analytical solution was confirmed by a series of experiments on the topology of a real network using simulation modeling. In this case, the error for the protection process was no more than 10%, for the attack process - no more than 15%.
Publisher
Taras Shevchenko National University of Kyiv
Subject
General Earth and Planetary Sciences,General Environmental Science
Reference19 articles.
1. Kryminalʹnyy kodeks Ukrayiny vid [The Crimean Code of Ukraine from] 05.04.2001 No2341-III. Data onovlennya: 25.09.2020. URL: http://zakon2.rada.gov.ua/laws/show/2341-14/page(data zvernennya: 02.09.2020).
2. Pro informatsiyu : Zakon Ukrayiny vid [About information : Law of Ukraine from] 02.10.1992 No2657-XII. Data onovlennya: 16.07.2020. URL: http://zakon2.rada.gov.ua/laws/main/2657-12(data zvernennya: 02.09.2020).
3. Pro naukovo-tekhnichnu informatsiyu : Zakon Ukrayiny vid [About scientific and technical information : Law of Ukraine from] 25.06.1993 No 3322-ХІІ. Data onovlennya: 19.04.2014. URL: http://zakon5.rada.gov.ua/laws/main/3322-12(data zvernennya: 02.09.2020).
4. Pro zakhyst informatsiyi v informatsiyno-telekomunikatsiynykh systemakh : Zakon Ukrayiny vid [On information protection in information and telecommunication systems : Law of Ukraine from] 05.07.1994 No 80/94-VR. Data onovlennya: 04.07.2020. URL: http://zakon5.rada.gov.ua/laws/show/80/94-вр(data zvernennya: 02.09.2020).
5. Pro elektronni dovirchi posluhy : Zakon Ukrayiny vid [About electronic trust services : Law of Ukraine from] 05.10.2017 No 2155-VIII. Data onovlennya: 13.02.2020. URL: https://zakon.rada.gov.ua/laws/show/2155-19#Text(data zvernennya: 02.09.2020).
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. INFORMATION AND ANALYTICAL FORECASTING SYSTEMS INFORMATION SECURITY VULNERABILITIES AND THREATS;Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University;2023
2. METHOD OF FORECASTING INFORMATION SECURITY VULNERABILITIES BASED ON DATA ANALYSIS OF THEMATIC INTERNET RESOURCES;Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University;2023
3. METHOD OF COUNTERACTION AND DETECTION OF HARMFUL INFORMATION IN SOCIAL NETWORKS;Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University;2022
4. STUDY OF PROBLEMS OF CONSTRUCTION OF SAFE SENSOR NETWORKS;Collection of scientific works of the Military Institute of Kyiv National Taras Shevchenko University;2022