SIMULATION MODEL OF THE GENERATION AND IMPLEMENTATION OF THE MEANS OF «PENETRATION TESTING»
Journal Title: Телекомунікаційні та інформаційні технології - Year 2018, Vol 123, Issue 2
Abstract
During simulation of the process generation of cyberattacks of various formats was performed using the specialized IxChariot 9 package and software developed during the research. The collection of incoming information about the download of the network device was carried out using the standard software traffic analyzer ("Wireshark"). As a result of the simulation, the hypothesis has been tested for the possibility of using the Pearson Xi-square criterion and studies of the reliability of the results of mathematical formalization have been carried out. It is shown that the use of only the principles of secure architectures in the development of secure software is not enough. Must use templates. The main templates of safe programs are considered in which the developed complex of mathematical models of technologies of generation and realization of "penetration test" methods and the method of allocation of the algorithm from binary code for software security analysis can be used. Two main variants of use and improvement of the developed model are considered. The first option has a single centralized security element, which becomes the middle of the queries for all resources in the system. The second option shares the security element's responsibilities, so that there is a separate instance of the security element for each individual resource type. The security of software in the modern world is becoming more and more difficult and difficult, since the value of information resources is constantly increasing. Ensuring the quality of software is a complex matter. The changing one of the characteristics of a computer system or software can easily lead to changes or create a need for change in other parts of the system. Practical recommendations on the use of methods and tools for testing software security of the temporary computer system are given.
Authors and Affiliations
Serhiy Kozelkov, Dmytro Lysytsia, Serhii Semenov, Alina Lysytsia
DEVELOPMENT OF ALGORITHM FOR OPTIMAL RECEPTION OF MULTIPOSITION SIGNALS AT UNKNOWN A PRIORI DATA
The article deals with the questions and possibilities of interpreting incoming data, which arrive as an array of sample values, and the possibility of developing an algorithm for forming these messages depending on the...
INTERPOLATION MODELS FOR SIGNAL RESTORATION IN TECHNOLOGIES INTERNET OF THINGS
An approach is proposed concerning signal processing in technologies Internet of Things (IoT). Microprocessor technologies are used in these technologies, when creating information and measuring systems. The use of such...
COMPUTER MULTI-BIOMETRIC IDENTIFICATION SYSTEM BASED ON THE PLURALITY OF BIOMETRIC FEATURES
The task of creating a new system of personal identification based on a set of disparate approaches is considered. A new approach is proposed for the creation of a computer multibiometric identification system based on t...
The detector for fiber optical communication systems with high photosensitivity
The article presents the results of a study of photo detection in barrier modulation of the Au-CdP2 structures. Results of a study of the spectral and frequency characteristics of the photodiode with Schottky barrier are...
DETERMINATION OF THE QUANTITY OF INFORMATION FLOWS IN THE TELECOMMUNICATION NETWORKS MANAGEMENT SYSTEM WITH REGARD TO CORRELATION CONNECTIONS
Issues related to the improvement of the quality of the telecommunications network management system and the main criteria of the functioning of the telecommunication network management system are considered in the artic...