Visible to the public Modeling of Information Systems to Their Security Evaluation

TitleModeling of Information Systems to Their Security Evaluation
Publication TypeConference Paper
Year of Publication2017
AuthorsZegzhda, D., Zegzhda, P., Pechenkin, A., Poltavtseva, M.
Conference NameProceedings of the 10th International Conference on Security of Information and Networks
PublisherACM
Conference LocationNew York, NY, USA
ISBN Number978-1-4503-5303-8
Keywordscomposability, computer systems security, information security tools, information systems security, Metrics, modeling systems, Networked Control Systems Security, pubcrawl, resilience, Resiliency, security assessment
AbstractIn this paper1 is proposed a graph model, designed to solve security challenges of information systems (IS). The model allows to describe information systems at two levels. The first is the transport layer, represented by the graph, and the second is functional level, represented by the semantic network. Proposed model uses "subject-object" terms to establish a security policy. Based on the proposed model, one can define information system security features location, and choose their deployment in the best way. In addition, it is possible to observe data access control security features inadequacy and calculate security value for the each IS node. Novelty of this paper is that one can get numerical evaluation of IS security according to its nodes communications and network structure.
URLhttp://doi.acm.org/10.1145/3136825.3136857
DOI10.1145/3136825.3136857
Citation Keyzegzhda_modeling_2017