<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Mathematical Modelling of the Process for Impact on Automated Information System Security of Threats Access to Restricted Information</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alexandr P. Rosenko</string-name>
          <email>pmkb.ncfu@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Evgeniya A. Nekrasova</string-name>
          <email>ne-myza@yandex.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of applied mathematics and, computer security, North Caucasus University</institution>
          ,
          <addr-line>Stavropol, Russian Federation</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2013</year>
      </pub-date>
      <abstract>
        <p>This paper presents the results of mathematical modeling of influence of various dependent threats on security of information with restricted access. The article proposes a method and software implementation in relation to the particular case, namely the impact on automated information system (AIS) of two dependent threats. The method is based on application of Markov stochastic processes with discrete states and there are recommendations for optimizing the process of protecting information of restricted access in terms of the stochastic of a successful outcome from the automated information system of internal and external threats in this method in accordance with the results of mathematical modeling.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Introduction
There is much attention to the questions of information security for restricted access from both domestic and
foreign researches in scientific and technical literature. For these purpose, different scientific approaches are used
related to the development of mathematical models and mathematical modeling.</p>
      <p>This is due to the tendency of many researches to describe more accurately the diversity of situations the
impact of restricted information on various threats, taking into account the description of the greatest possible
number of factors influencing safety information.</p>
      <p>However, it should be noted the limitations of these approaches, since most of the them allow to explore the
issue of protecting information on the qualitative level.</p>
      <p>Studies show, that for the quantification of information security of restricted access widely used Markov
random processes with discrete and continuous state.</p>
      <p>Dependence of internal threats can be illustrated by the following example: programmer error in software
product creation process does not depend on the unauthorized removal of restricted access information through
the implementation of the programmed bookmark, but generates it, and vice versa when the unauthorized removal
of information with restricted access through programmatic bookmarks arises regardless of the erroneous actions
of a programmer, but generates it.</p>
      <p>In this paper it is shown that the automated information system refers to complex stochastic man-machine
systems that quantify information security can be restricted through the use of automated information systems
of Markov stochastic processes.
2</p>
      <p>Development of a method for assessing dependent threats on security of
information with restricted access, circulating in an automated information system
Consider a situation, where a system is affected by two dependent threat, as shown in fig. 1, that can be
mutually with probabilities, r12 and r21. Denoted by q1 and q2 the likelihood of the first and second threat
(fig. 1). Parrying first and second threat occurs with probability R1 and R2, probabilities not parrying, with
probabilities, R13 and R23</p>
      <p>P0(2) = 1 − qP</p>
      <p>+ q1R1 + q2R2, P1(2) = 1 − qP q1 + q2r21, P2(2) = 1 − qP q2 + q1r12;
Then the probability of the unfavorable outcome is determined as follows:</p>
      <p>P3(2) = q1R13 + q2R23</p>
      <p>The system can be in the following conditions: condition “0” – internal threats do not appear; condition “1”
– the first threat is manifested with intensity q1 and her parrying becomes with probability R1 as can be seen in
the figure 1. A successful parrying convert automated information system of the condition the “1” in the original
zero condition; condition the “2” – the second threat is manifested with probability q2 and her parrying and
transition zero condition is done with probability R2 condition the “3” – absorbing condition. In this condition
the system can go from a condition of “1” with probability R13 and out of “2” with probability R23 Absorbing
condition characterizes leak the information of restricted access as a result of the implementation of the attacker
dependent threats [Ros10].</p>
      <p>Matrix of probabilities for transitions of systems from condition to condition can be represented as follows as
can be seen in the figure 1:
||Pij|| =
1 − qP</p>
      <p>R1
R2
0
q1
0</p>
      <p>Applying previously proposed methodology [Ros10] for primary source data, the relevant probabilities P1(0) =
P2(0) = P3(0) = 0 after the first step, the probability will be equal conditions:</p>
      <p>P0(2) = 1 − qP</p>
      <p>+ q1R1 + q2R2, P1(2) = 1 − qP q1 + q2r21, P2(2) = 1 − qP q2 + q1r12;
The likelihood of condition after second step:
2
2
(1)
(2)
(3)</p>
      <p>QSO(2) = 1 − PSO(2) = P3(2)orQSO(2) = q01R13 + q02R23.</p>
      <p>The probability of the condition of the system after the third step will be of the form:</p>
      <p>P0(3) =
and the opposite event unsuccessful outcome, i.e. determined by the ratio of</p>
      <p>PBI (3) = P0(3) + P1(3) + P2(3),</p>
      <p>QSO(3) = P3(3).</p>
      <p>Use obtained dependencies for determine the likelihood of a successful outcome taking into account the impact
on automated information system dependent threats.</p>
      <p>It should be noted that the assessment procedure will be continued by increasing the number of moves and,
thus, complicating the assessment algorithm [Lei13].</p>
      <p>This can be clearly point out the obvious pattern that as you increase the number of steps increases and the
probability of the unsuccessful outcome of the from the automated information system dependent threats.
3</p>
      <p>Mathematical modelling of the process of impact two dependent threats on
automated information system
Modeling of impact on automated information system two dependent threats in accordance with figure 1 and a
matrix of condition (1).</p>
      <p>Basic data for the calculation:</p>
      <p>P0(0) = 1; P1(0) = P2(0) = P3(0) = 0;
the likelihood of the first threat varies from q1 = 0, 0 to q1 = 0.8 the probability of the second internal threat
q2 = 0.2;</p>
      <p>the likelihood of parrying second internal threat R2 = 0.2, the likelihood of mutual spawn internal threats
r12 = r21 = 0.2.</p>
      <p>Parrying chance by internal threats R1 = 0.2.</p>
      <p>Since the condition from figures should be: the system may be in absorbing condition after the second and
subsequent steps; with the increase in the probability of the internal threat the probability of a transition system
in absorbing condition increases. However, on the nature of the changes specified probability significant influence
has the likelihood of parrying emerging threats.</p>
      <p>So, for example, on the fifth step of calculation for R1 = 0.2 the probability that the system reaches the
absorbing condition, provided that the probability of q1 = 0.0 to q1 = 0.08, respectively: 0.43; 0.63; 0.83; 0.88
and 0.91, whereas if you increase these probabilities up 0.6 R1 for similar probabilities of q1 respectively, have
the following meanings: 0.4; 0.48; 0.55; 0.59 and 0.62.</p>
      <p>Also shows that with increasing probability of 0.2 to 0.6 R1 steady degeneration charts built for values
between q1 = 0.2 to q1 = 0.8 with the timetable for q1 = 0.0; simulation results show that the graph for q1 = 0.8</p>
      <p>
        After the third step of transformation the likelihood of a successful outcome from the impact on the system
is equal to the
(5)
(6)
(7)
(8)
(9)
(
        <xref ref-type="bibr" rid="ref1">10</xref>
        )
(
        <xref ref-type="bibr" rid="ref1">10</xref>
        )
practically does not change their situation with rising R1 (loosely pronounced growth trend); It can be shown
that if R1 → 1.0 graphics when you change the setting of the schedule if q1 = 0.0.
      </p>
      <p>The specified probability is defined for the source data, discussed in the first and second task except that in
this case changed the probability parrying a second displayed threats from R2 = 0.4 to R2 = 0.6 and R1 is fixed
to the value R1 = 0.2.</p>
      <p>Analysis of the results of the simulation allows the following conclusions to be drawn: with the increasing
likelihood of R2 is observed slight increase the likelihood of successful outcome from exposure to the automated
information system of internal threats throughout the range of changes to the parameter q1 , i.e. if you change
the q1 = 0.0/0.8;</p>
      <p>The analysis also shows the absence of degeneration of the graphs if you are changing the settings for q1 and
R2, that reflects the positive impact of parameter R2 on the likelihood of successful outcome across the whole
range of changes to the parameter q1</p>
      <p>Thus, the simulation results show that for similar source data with the increasing likelihood of parrying
manifested first threat i.e. R1 all graphics are approaching to graph, obtained for q1 = 0.0</p>
      <p>With increased R2 all graphics smoothly move in the direction of increasing the likelihood of a successful
outcome from the effects of internal threats to the automated information system.</p>
      <p>This suggests that the owner information of restricted access can realize different ways to use safeguard
mechanisms. Depending on the available material resources he can realize those gives best effect positive. The
system may be in absorbing condition after the second and subsequent steps. The probability of a transition
system in absorbing condition increases with increasing probability of the internal threat. However, on the nature
of the changes the specified probability significant influence has the likelihood of parrying emerging threats.</p>
      <p>So, for example, on the fifth step of calculation for R1 = 0.2 the probability that the system reaches the
absorbing State, provided that the probability of q1 = 0.0 to q1 = 0.08, respectively: 0.43; 0.63; 0.83; 0.88 and
0.91, while if you increase these probabilities up R1 to 0.6 for similar probabilities of q1 respectively, have the
following meanings: 0.4; 0.48; 0.55; 0.59 and 0.62. Also shows that with increasing probability R1 of 0.2 to 0.6
steady convergence graphs constructed from values q1 = 0.2 to q1 = 0.8 with the graph for q1 = 0.0;</p>
      <p>Simulation results show that the graph for q1 = 0.0, practically does not change their situation with rising R1
(loosely pronounced growth trend);</p>
      <p>It can be shown that when R1 → 1.0 graphics when you change a parameter q1 = 0.2/0.8 merge with the
timetable if q1 = 0.0</p>
      <p>The specified probability is defined for the source data, discussed in the first and second task, except that in
this case changed the likelihood of parrying second manifested threats from R2 = 0.4 to R2 = 0.6, and R1 is
fixed with value R2 = 0.2. Simulation results are presented in figure 2. a) (R2 = 0.4) and b) (R2 = 0.6)</p>
      <p>Analysis of modelling results presented in figure 2 a) and b) leads to the following conclusions:
With the increased probability R2 of slight growth probability successful outcome from exposure on the
automated information system internal threats throughout the range of changes to the parameter q1 i.e. at
change q1 = 0.0/0.8</p>
      <p>The analysis also shows the lack of convergence graphs when you change the parameters q1 and R2, indicating
the positive effect of parameter on the likelihood of a successful outcome of the R2 in all range of parameter
changes q1.</p>
      <p>Thus, the simulation results show that for similar source data with increase the probability parrying of the
first threat like R1, all graphics are approaching the graphics obtained for q1 = 0.0 With increased R2 all graphics
smoothly move in the direction of increasing the likelihood of a successful outcome from the effects of internal
threats to the automated information system. This suggests that the owner information of restricted access may
apply are different ways to use safeguard mechanisms. Depending on the available material resources he can
realize those of them, that give best effect positive.
3.1</p>
      <p>Study of the influence of parrying settings threats by the likelihood of a successful outcome
Let carry out a simulation of a quantitative assessment of information security, limited access to the research
of influence of parrying settings threats by the likelihood of a successful outcome. Consider one set of inputs,
which would change the magnitude of probabilities parrying threats.</p>
      <p>Prepare the table tests:
Matrix of transition
probabilities
graph of dependence of successful outcome
PSO of the number of steps the algorithm</p>
    </sec>
    <sec id="sec-2">
      <title>Probabilities parrying threats,</title>
      <p>R
1
2
0.1
0.2
0.3
0.95</p>
      <p>Based on data of table 1, build graph modeling outcomes with different probabilities Parrying threats, the
results are presented in figure 3.</p>
      <p>In conclusion with the results of figure 1:</p>
      <p>Probability of PSO successful outcome from exposure to automated information system dependent threats
largely depends on the probabilities parrying dependent threats. The more likelihood of parrying dependent
threats, the slower the PSO decreases, and therefore the automated information system containing restricted
information is more secure;</p>
      <p>With the increase in the probability of the dependent threats the likelihood of an automated information
system in the absorbing state is increased. Nature changes the specified probability depends on the probabilities
Parrying discovered dependent threats;</p>
      <p>Mathematical simulation results indicate that the owner information of restricted access, there are different
ways to use protective equipment. Depending on the available material resources, it can implement the ones
that give a positive result.
3.2</p>
      <p>Study of the influence of mutual threats emit parameters by the likelihood of a successful
outcome
Let carry out a simulation of a quantitative assessment of information security of restricted access, for research
on the effect of mutual threats emit parameters on the value of the probability of a successful outcome. Consider
one set of inputs, which would change the magnitude of probabilities of mutual threats emit.</p>
      <p>Prepare the table tests:
Matrix of transition
probabilities
graph of dependence of successful outcome
PSO of the number of steps the algorithm</p>
      <p>The likelihood
of mutual</p>
      <p>threats
0.25
0.3
0.35</p>
      <p>Graph of results can be constructed with the results of table 2 emit the results are presented in figure 4.</p>
      <p>In conclusion with the results of figure 4:</p>
      <p>ProbabilityPSO of successful outcomes for the automated information system, from exposure to the threats
of information with restricted access depends on the probabilities of mutual threats. The more the likelihood
of mutual threats emit, the faster the decreases PSO and therefore the automated information system with high
probabilities of mutual threats will emit less secure</p>
      <p>The presence of the owner information of restricted access results of mathematical modelling allows him to
take science-based activities protection of existing information resources.
1. The algorithm and program realization to quantify the effects of impacts on the automated system of internal
and external dependent threats, not previously used by researchers to obtain a quantitative assessment of
information security of restricted access.
2. Results of mathematical modelling can be characterized as new scientific results in practice data protection
will allow owners of restricted information to develop science-based activities for the protection of information
resources, circulating in computer systems and networks.
3. The results of this work indicate the need to strengthen the researchers on the development of new
techniques and methodologies for evaluating security of information with restricted access, because this helps
to significantly affect the protection available to the owner of the information resources, reduce risks and
losses from the sale of the attacker limited access information security threats.
[Lei13]</p>
      <p>Leite, M.D., Marczal, D. Pimentel, A.R. 2013, ”Multiple external representations in remediation of
math errors”, ICEIS 2013 - Proceedings of the 15th International Conference on Enterprise Information
Systems, pp. 519.
[Yan13] Yang, D. 2013, Empirical analysis of the demand for interpretation system of world cultural heritage
based on optimized selection model and mathematical physics equations.
bezopasnost</p>
    </sec>
    <sec id="sec-3">
      <title>ERP-sistem”</title>
      <p>(URL:
[Sch11]</p>
      <p>Schjolberg S., Ghernaouti-Hlie S. 2011, ”A Global Treaty on Cybersecurity and Cybercrime”, Second
edition. (URL: http://www.cybercrimelaw.net/documents/)</p>
      <p>Summary of responses to the survey on the implementation of the OECD guidelines for
the security of information systems and networks: towards a culture of security 2012. (URL:
http://www.oecd.org/officialdocuments/publicdisplaydocumentpdf/?cote=DSTI/ICCP/REG(2003)8
/FINAL&amp;docLanguage=En)
[OEC12] OECD Cybersecurity policy making at a turning point. Analysing a new generation of national
cybersecurity strategies for the Internet Economy. (URL: http://www.oecd.org/officialdocuments/)</p>
      <p>OECD Digital Security Risk Management for
OECD Recommendation and Companion Document,
(http://dx.doi.org/10.1787/9789264245471-en)</p>
    </sec>
    <sec id="sec-4">
      <title>Economic</title>
      <p>OECD
and Social
Publishing,</p>
    </sec>
    <sec id="sec-5">
      <title>Prosperity: Paris. DOI. [Kor14] Korshunova, O.N., Razumovskaya, E.A. 2014, ”Some information security problems”, pp. 83–91. [Cer13]</title>
      <p>CERT Insider Threat Team. Unintentional Insider Threats: A Foundational Study. – Carnegie-Mellon
University. Software Engineering Institute, CERT Division. – Pittsburg., 2013. – 91 .</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [Ros10]
          <string-name>
            <surname>Rosenko</surname>
            ,
            <given-names>A.P.</given-names>
          </string-name>
          <year>2010</year>
          , ”
          <article-title>Internal threats to the security of confidential information: methodology</article-title>
          and theoretical research”, Monograph, pp.
          <fpage>160</fpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>