Model verification is a very important step in the methodology for modeling the security systems antagonistic agents behavior in general and system dynamics in particular. By verifying the behavior model of antagonistic agents we mean a process that includes both formal/quantitative tools and informal/qualitative ones. The article presents the process of creating a model of antagonistic agents behavior. The assumptions underlying the model and the limitations of the created model are preliminarily formed. The components of the model are distinguished: a defender submodel, an attacker submodel and a confrontation environment submodel. For each of the submodels, the processes and relationships in models are described, the variables used for modeling are defined. Processes and relations between variables are presented in the form of a system of linear and differential equations. Based on the given system of equations of the mathematical model, a system-dynamic model of the interaction of antagonistic agents is constructed. It is shown that for the practical use of the software implementation of the behavior model, the verification procedure is mandatory. The main groups of tests that need to be performed using the model are listed to confirm its adequacy to the conditions of use and the goals for which it was developed. The results of testing the system-dynamic behavior model for the main group of verification tests at each of the three main stages of model verification are presented: structural tests, structure-oriented behavior tests and behavior model tests. Based on the results obtained, the special importance of structurally oriented behavioral tests is emphasized. These are powerful behavioral tests that can provide information about potential structural weaknesses. These tests seem to be the most promising area for research on model verification.
The modern development of high technologies and computer technology has had a significant impact on the development of business process management systems, covering all areas of the state economic activity. However, in parallel with this, the era of high technologies has significantly expanded the range of threats aimed at the contour of business processes, and, first of all, on information resources that ensure the functioning of the business process circuit. At the same time, threats have acquired signs of hybridity and synergy. In these conditions, the urgent issue in the formation of the information security management system of the business process circuit is the timely detection and subsequent analysis of modern threats. In order to generalize the approach of classifying hybrid cyber threats into security components: information security (IS), cybersecurity (CS), security of information (SI) of the business process circuit and their information resources, an advanced classifier of threats to the business process circuit and its information resources is proposed, including cost estimates of the threats implementation and estimates of losses associated with threats. The proposed extensions to the threat classifier allow to give probabilistic assessments of the implementation of certain threats. Based on the analysis of approaches, estimates of indicators of the intruders danger degree and the degree of protective measures implementation under the conditions of modern hybrid cyber threats are proposed.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.