<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Estimation of Security of Objects of Informatization on the Basis of Mathematical Simulation as an Alternative to Certification Testing</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Artem M. Sychov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nadezhda A. Sukhorukova</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Denis A. Kholod</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Information Protection Department (IU10) Bauman Moscow State Technical University Moscow</institution>
          ,
          <addr-line>Russian Federation</addr-line>
        </aff>
      </contrib-group>
      <fpage>127</fpage>
      <lpage>130</lpage>
      <abstract>
        <p>Constant perfection of methods of unauthorized access to information, as well as significant damage to this kind of action resulted in a focused and systematic improvement of technologies of information security and mechanisms for responding to security threat information. One of the main areas of improvement is to ensure the compliance of the characteristics of these mechanisms demands adequate responses to threats and, consequently, adequate evaluation of the effectiveness of response measures. The basic concept is implemented in practice evaluation of the security of objects of informatization, is the concept of certification tests. Under this concept implies the assessment of the protection of informatization objects certification path used means of information protection from unauthorized access. One of the most promising alternative solutions to the problem of adequate evaluation of the security of objects of informatization is a synthesis of characteristics of processes of information security on the object of informatization within the corresponding target function. This article shows the possibility of obtaining a numerical evaluation of the security of information objects with the use of mathematical modeling of information security threats, caused by illegal actions, and processes for responding to such actions. This approach will allow to evaluate the effectiveness of the various responses and on the basis of these assessments to justify the most effective system for ensuring security of objects of informatization.</p>
      </abstract>
      <kwd-group>
        <kwd>information security</kwd>
        <kwd>threats</kwd>
        <kwd>informatization objects</kwd>
        <kwd>protected information systems</kwd>
        <kwd>mathematical modeling</kwd>
        <kwd>conformity assessment</kwd>
        <kwd>security compliance</kwd>
        <kwd>certification tests</kwd>
        <kwd>attestation test</kwd>
        <kwd>Orange book</kwd>
        <kwd>e-banking</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>INTRODUCTION</title>
      <p>
        Constant perfection of methods of unauthorized access to
information, and significant damage to this kind of action
resulted in a focused and systematic improvement of
technologies of information security and mechanisms to
address threats to information security. One of the main areas
of improvement is to ensure the compliance of the
characteristics of these mechanisms demands adequate
responses to threats and, consequently, adequate evaluation of
the effectiveness of response measures [
        <xref ref-type="bibr" rid="ref1 ref2">1-3</xref>
        ].
      </p>
      <p>
        Obviously, such an assessment should be carried out
systematically [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], on the basis of a comprehensive study of
ways to protect the objects of informatization (information
systems).
      </p>
      <p>In accordance with the system approach investigation of
mechanisms in responding to threats to the security of
information of the objects of informatization (IО) connected
with the security assessment of the IO, i.e., the capacity of
these mechanisms to adequately respond to information
security threats the IO.</p>
      <p>II. THE EXISTING CONCEPT OF EVALUATION OF THE
SECURITY OF THE IO ON THE BASIS OF CERTIFICATION TESTS</p>
      <p>
        The basic concept is implemented in practice evaluation of
the security of the IO is the concept of certification tests.
Under this concept implies the security assessment of the IO
certification path used means of information protection from
unauthorized access. In accordance with the Governing
document "Protection from unauthorized access to
information. Terms and definitions" under the certification of
information security means activities for confirmation of
conformity of possibilities of means of information protection
requirements of state standards, normative documents
approved by Federal certification bodies within the
competence of those bodies [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. It should be noted that, in
accordance with document certification study limited to
description of the functions performed by protection
mechanisms from unauthorized access to information, and
qualitative characteristic of the contents of these functions
corresponding to a certain class of security of information
systems and computer technology, as well as a list of
normative documents on this issue. Implemented in the
methods of certification are to verify the claimed capabilities
with the requirements (Tab.1). In accordance with the
Governing document "Automated system. Protection against
unauthorized access to information. Classification of
automated systems and requirements on information
protection" the conclusion about the ineffectiveness of the
mechanism of protection of information in General is done in
the case that at least one of the claimed functionalities (the
document is similar to the Orange book).
      </p>
      <p>The obvious advantage of this concept for assessing the
security of the IO is the ease of estimation procedures.
Shortcomings that limit its use are:</p>
      <p>
        1) the lack of a formal interpretation of characteristics of
threats to information security;
2) lack of formalized representation of the dynamics of the
impact of threats to information security and processes for
responding to such threats;
3) lack of a formalized model of security information,
taking into account the peculiarities of the offender's actions as
a source of threats [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>
        These shortcomings lead to many errors in the justification
of the ways and means of information security [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ], which in
turn necessitates the search for such approaches to the security
assessment of the IО, which would provide the required
adequacy assessment.
      </p>
      <p>III.</p>
      <p>
        THE PROPOSED CONCEPT FOR ASSESSING THE SECURITY
OF THE IO ON THE BASIS OF MATHEMATICAL MODELING
As the practice of conducting research in this direction,
one of the most promising solutions to the problem of
adequate evaluation of the security of the IO is a synthesis of
characteristics of processes of information security for the IO
within the corresponding target function (e.g. [
        <xref ref-type="bibr" rid="ref10 ref11 ref6 ref7 ref8 ref9">6-11</xref>
        ]).
      </p>
      <p>
        As an example of such a system consider a system of the
performance characteristics of responses to threats to the
security of e-banking [
        <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
        ].
      </p>
      <p>The basis of the synthesis of this system based on the
principle of the identity of the system structure characteristics
of the effectiveness of such measures hierarchical
representation of the functional model of the processes of
responding to threats to the security of electronic banking. In
turn, the functional model of the processes of responding to
such threats is based on the functional model of illegal actions
concerning the remote banking services (RBS), and that, in
turn, based on the conceptual model of the offender.</p>
      <p>Under these conditions, the model of the intruder is
interpreted as a model of illegal actions in respect of the
services of RBS. The major restrictions on the interpretation
of this model are:</p>
      <p>1) this kind of illegal action is a method of implementation
of security risks of e-banking;</p>
    </sec>
    <sec id="sec-2">
      <title>2) the source of the threats is an attacker;</title>
      <p>3) for this kind of source is characterized by a single
(during the study period) the impact on the environment of
RBS;</p>
      <p>4) once the impact on the environment of RBS is also done
for reasons of stealth;</p>
      <p>5) breach of security of e-banking is associated with the
operation of illegal actions associated with the following
operations:
– receiving confidential information of the bank clients;
– modification, or destruction of the information;
– blocking of the information security environment of the
RBS in certain circumstances.</p>
      <p>Target motivation are illegal actions on the modification or
destruction of information clients of the bank.</p>
      <p>The correspondence between the compositional
characteristics of the grouping of States of a functional model
of the processes of responding to threats to the security of
electronic banking, the compositional characteristics of the
grouping of States of a functional model of illegal actions in
connection with the services, RBS and classification bases
synthesized system characteristics are listed in Tab. 2, and the
structure of the system in Fig. 1.</p>
      <p>TABLE 2 COMPLIANCE COMPOSITE FUNCTIONAL BASIS OF
MODELS OF STUDIED PROCESSES, BASES FOR CLASSIFICATION OF THE
SYSTEM PERFORMANCE CHARACTERISTICS RESPONSES TO THREATS TO THE</p>
      <p>SECURITY OF OBJECTS OF INFORMATIZATION
1
2
3
4
e
t
iso le
p ev
m l
o
C</p>
      <sec id="sec-2-1">
        <title>Composite base grouping States functional models</title>
        <p>IllrseeegsrapvleiccaetcstoiRfonBthsSein srePiencrsuoperco-iebtnysadsnteihnksrgifenoatgorts
the appearance of identify signs of ability to identify signs of
signs of illegal actions illegal actions illegal actions
ifsSnretarauvgdiecruseelsseopnRfetcBctaSorrpyoeifrnagtioothnuest sadtceatfgiionenistsioonf oiflletghael ialbleilgitayl atcotioidnesntify stages of
Irsleellreavgtiiacolens atoctionspsecifiinc tsseoeestrrsavvebiicccluieesrsshitmyeerxnisptkosseoodff rseoiespstrpkavsobicrltieusshnmeitxieepnsot-soefdsfetoorr-vseicceusrtihotyef
the objective function the objective the effective response to
illegal actions function response security threats in e-banking</p>
      </sec>
      <sec id="sec-2-2">
        <title>Grounds for the classification of the system performance characteristics response</title>
        <p>
          Given the fact that the implementation of the functions
respond to the attacker is a reaction to unlawful acts in the
formation of the characteristics of the timeliness of response to
this kind of threat conditions timely response are [
          <xref ref-type="bibr" rid="ref14 ref15">14, 15</xref>
          ]
t(у) &lt; t(о)
t(о) &lt; t(у) + (у)
t(о) + (о) ≤ t(у) + (у)
(1)
(2)
(3)
where: t(y) is a point in time the onset of the threat, (у) – time
implementation of threat t(о) – time detection of threats, (о) –
time to respond to the threat. The adequacy of the assessment
of the values (у) and (о) is the systemic nature of evaluation
mechanism.
        </p>
        <p>
          With the random nature of the values that make up the
conditions (1) to (3), the expression for E characteristics
timeliness in responding to threats to the security of electronic
banking can be represented as a probability [
          <xref ref-type="bibr" rid="ref14">14</xref>
          ]:
        </p>
        <p>E = P(t(у) &lt; t(о), t(о) &lt; t(у) + (у), t(о) + (о) ≤ t(у) + (у))
(4)</p>
        <p>Thus, it is clear that the method of evaluation of security of
IO by organizing and modeling the characteristics of the
processes of information security on these objects and devoid
of the shortcomings to the assessment of security of IO on the
basis of certification tests.</p>
        <sec id="sec-2-2-1">
          <title>Level 4</title>
        </sec>
        <sec id="sec-2-2-2">
          <title>Level 3</title>
        </sec>
        <sec id="sec-2-2-3">
          <title>Level 2</title>
        </sec>
        <sec id="sec-2-2-4">
          <title>Level 1</title>
          <p>Timely response to security threats in
ebanking
timeliness of response to the actions
of the attacker in relation to the
service payment systems
timeliness of response to the actions
of the attacker in relation to the</p>
          <p>service "Client-Bank"</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>IV. CONCLUSION</title>
      <p>A method of evaluating the security of objects of
Informatization on the basis of certification tests has a
number of drawbacks that can be eliminated when using the
proposed approach to this evaluation through mathematical
modeling. This method allows to obtain an adequate
assessment of the effectiveness of information security at
the Olympics in a wide range of parameters of the security
threat information and apply the protection mechanisms.</p>
      <p>Modeling in System</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Benslimane</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yang</surname>
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bahli</surname>
            <given-names>B</given-names>
          </string-name>
          .
          <article-title>Information Security between Standards, Certifications and Technologies: An Empirical Study</article-title>
          .
          <source>In Proc. of the 2016 International Conference on Information Science and Security (ICISS)</source>
          , IEEE,
          <year>2016</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>5</lpage>
          . DOI:
          <volume>10</volume>
          .1109/ICISSEC.
          <year>2016</year>
          .
          <volume>7885859</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Sedinić</surname>
            <given-names>I.</given-names>
          </string-name>
          , Lovrić Z.
          <article-title>Influence of established information security governance and infrastructure on future security certifications</article-title>
          .
          <source>In proc. of the 2013 36th International Convention on Information and Communication Technology</source>
          ,
          <article-title>Electronics and Microelectronics (MIPRO)</article-title>
          . IEEE, Opatija, Croatia,
          <year>2013</year>
          , pp.
          <fpage>1111</fpage>
          -
          <lpage>1115</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>Wargo C.A.</given-names>
            ,
            <surname>Frye</surname>
          </string-name>
          <string-name>
            <given-names>G.E.</given-names>
            ,
            <surname>Robinson</surname>
          </string-name>
          <string-name>
            <given-names>D.W. Security</given-names>
            <surname>Certification</surname>
          </string-name>
          and
          <article-title>Accreditation analysis for UAS Control and Communications</article-title>
          .
          <source>In Proc. of the 2009 Integrated Communications, Navigation and Surveillance Conference</source>
          , IEEE,
          <year>2009</year>
          Pages:
          <fpage>1</fpage>
          -
          <lpage>12</lpage>
          DOI: 10.1109/ICNSURV.
          <year>2009</year>
          .
          <volume>5172850</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Barabanov</surname>
            <given-names>A.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Markov</surname>
            <given-names>A.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsirlov</surname>
            <given-names>V.L. Methodological</given-names>
          </string-name>
          <article-title>Framework for Analysis and Synthesis of a Set of Secure Software Development Controls</article-title>
          ,
          <source>Journal of Theoretical and Applied Information Technology</source>
          ,
          <year>2016</year>
          , vol.
          <volume>88</volume>
          , No 1, pp.
          <fpage>77</fpage>
          -
          <lpage>88</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Hambolu</surname>
            <given-names>Q.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yu</surname>
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Oakley</surname>
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Brooks</surname>
            <given-names>R.R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mukhopadhyay</surname>
            <given-names>U.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Skjellum</surname>
            <given-names>A</given-names>
          </string-name>
          .
          <article-title>Provenance threat modeling</article-title>
          .
          <source>In Proc. of the 2016 14th Annual Conference on Privacy, Security and Trust (PST)</source>
          , IEEE,
          <year>2016</year>
          , pp.
          <fpage>384</fpage>
          -
          <lpage>387</lpage>
          . DOI:
          <volume>10</volume>
          .1109/PST.
          <year>2016</year>
          .
          <volume>7906960</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>Ekanem</surname>
            <given-names>B.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Essien</surname>
            <given-names>N.</given-names>
          </string-name>
          <article-title>Identifying fault-prone modules in software for diagnosis and treatment using eeporters classification tree</article-title>
          .
          <source>Computer Sciences and Telecommunications</source>
          .
          <year>2010</year>
          . N 3. P.
          <volume>88</volume>
          -
          <fpage>98</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Fay</surname>
            <given-names>J. Contemporary Security</given-names>
          </string-name>
          <string-name>
            <surname>Management</surname>
          </string-name>
          .3th ed.
          <source>ButterworthHeinemann</source>
          ,
          <year>2010</year>
          . 480 p.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Iskhakov</surname>
            <given-names>S.Yu.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shelupanov</surname>
            <given-names>A.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Meshcheryakov R</surname>
          </string-name>
          .V.
          <article-title>Simulation modelling as a tool to diagnose the complex networks of security systems</article-title>
          .
          <source>Journal of Physics: Conference Series</source>
          .
          <year>2017</year>
          . V. 803. N 1. P.
          <volume>012057</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Kostogryzov</surname>
            <given-names>A</given-names>
          </string-name>
          .
          <article-title>Modeling software tools complex for evaluation of information systems operation quality (CEISOQ)</article-title>
          .
          <source>Lecture Notes in Computer Science</source>
          .
          <year>2001</year>
          ;
          <year>2052</year>
          ;
          <fpage>90</fpage>
          -
          <lpage>101</lpage>
          . DOI:
          <volume>10</volume>
          .1007/3-540-45116- 1_
          <fpage>12</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Kostogryzov</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krylov</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nistratov</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Popov</surname>
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stepanov</surname>
            <given-names>P</given-names>
          </string-name>
          .
          <article-title>Mathematical models and applicable technologies to forecast, analyze, and optimize quality and risks for complex systems</article-title>
          .
          <source>In: The ICTIS</source>
          <year>2011</year>
          :
          <article-title>Multimodal Approach to Sustained Transportation System Development - Information</article-title>
          , Technology,
          <source>Implementation - Proceedings of the 1st Int. Conf. on Transportation Information and Safety</source>
          ,
          <string-name>
            <surname>ASCE</surname>
          </string-name>
          ,
          <year>2011</year>
          , pp.
          <fpage>845</fpage>
          -
          <lpage>854</lpage>
          . DOI:
          <volume>10</volume>
          .1061/41177(
          <issue>415</issue>
          )
          <fpage>107</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Kostogryzov</surname>
            <given-names>A.. editor. Probabilistic</given-names>
          </string-name>
          <string-name>
            <surname>Engineering</surname>
          </string-name>
          . InTech,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Sychev</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Revenkov</surname>
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dudka</surname>
            <given-names>A</given-names>
          </string-name>
          .
          <article-title>Bezopasnost ehlektronnogo bankinga [Security of e-banking]</article-title>
          . M.: Alpina Pablisher,
          <year>2017</year>
          . 320 p.
          <article-title>(In Russ)</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Revenkov</surname>
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Berdyugin</surname>
            <given-names>A</given-names>
          </string-name>
          .
          <article-title>Expansion of the Operational Risk Profile in Banks Under Increase of DDoS-threats</article-title>
          .
          <source>Voprosy kiberbezopasnosti [Cybersecurity issues]</source>
          .
          <source>2017. N</source>
          <volume>3</volume>
          (
          <issue>21</issue>
          ). P.
          <volume>16</volume>
          -
          <fpage>23</fpage>
          . DOI:
          <volume>10</volume>
          .21681/
          <fpage>2311</fpage>
          -3456-2017-2-
          <fpage>16</fpage>
          -23.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Skryl</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sychev</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Afonin</surname>
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Barkalov</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Karpychev</surname>
            <given-names>V</given-names>
          </string-name>
          .
          <article-title>Ocenka ehffektivnosti mer reagirovaniya na ugrozy bezopasnosti ehlektronnogo bankinga: koncepciya i vozmozhnosti realizacii</article-title>
          .
          <source>Pribory i sistemy. Upravlenie</source>
          , kontrol,
          <source>diagnostika [Instruments and Systems: Monitoring</source>
          , Control, and Diagnostics].
          <year>2017</year>
          . N 12. P.
          <volume>33</volume>
          -
          <fpage>40</fpage>
          . (In Russ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Skryl</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sychev</surname>
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Gromov</surname>
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Meshcheryakova</surname>
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Arutyunova</surname>
            <given-names>V</given-names>
          </string-name>
          .
          <article-title>Matematicheskoe predstavlenie pokazatelya svoevremennosti reagirovaniya na ugrozy bezopasnosti kompyuternoj informacii v usloviyah prostejshej modeli narushitelya</article-title>
          .
          <source>Inzhenernaya fizika [Engineering Physics]</source>
          .
          <year>2016</year>
          . N 4. P.
          <volume>29</volume>
          -
          <fpage>35</fpage>
          . (In Russ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>