2019
DOI: 10.3390/sym11121506
|View full text |Cite
|
Sign up to set email alerts
|

Model of Threats to Computer Network Software

Abstract: This article highlights the issue of identifying information security threats to computer networks. The aim of the study is to increase the number of identified threats. Firstly, it was carried out the analysis of computer network models used to identify threats, as well as in approaches to building computer network threat models. The shortcomings that need to be corrected are highlighted. On the basis of the mathematical apparatus of attributive metagraphs, a computer network model is developed that allows to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
5
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 10 publications
(6 citation statements)
references
References 31 publications
0
5
0
Order By: Relevance
“…Brief Description [128] The article highlights the problem of identifying threats to the information security of computer networks. The analysis of computer network models used to identify threats, as well as approaches to the construction of such models, was carried out.…”
Section: Publicationmentioning
confidence: 99%
See 2 more Smart Citations
“…Brief Description [128] The article highlights the problem of identifying threats to the information security of computer networks. The analysis of computer network models used to identify threats, as well as approaches to the construction of such models, was carried out.…”
Section: Publicationmentioning
confidence: 99%
“…in the OS, what parameters it has and what functions it performs, and this is a necessary measure for threat analysis. The authors of [120,126,128,129] described, in detail, the models of the system and threats in both verbal and mathematical forms, which allows them to be used as a basis for further scientific research in this field.…”
Section: Publicationmentioning
confidence: 99%
See 1 more Smart Citation
“…As previously stated, we are addressing a novel task when establishing a categorization for manipulation techniques; our position is to keep it as simple as possible, and following this approach, we can subdivide manipulation techniques into three families: fabrication, modification, and cancellation, as stated in [67,68]. These three families are capable of including different threats classification, for example, those presented in [69] against integrity, which refer to substitution, change (both considered inside modification), removal (cancellation), and addition (fabrication).…”
Section: Manipulationmentioning
confidence: 99%
“…The possibility of implementing threats and countermeasures to them with the use of methods of information security of telecommunication networks (these criteria are described in more detail in the works [1,2]); • Using the maximum number of possible layers of the data communication protocol stack.…”
mentioning
confidence: 99%