<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Security Estimation of the Simulation Polygon for the Protection of Critical Information Resources</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Bogdan</forename><surname>Korniyenko</surname></persName>
							<email>bogdanko@i.ua</email>
							<affiliation key="aff0">
								<orgName type="institution">National Technical University of Ukraine &quot;Igor Sikorsky Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Liliya</forename><surname>Galata</surname></persName>
							<email>galataliliya@gmail.com</email>
							<affiliation key="aff1">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Lesya</forename><surname>Ladieva</surname></persName>
							<affiliation key="aff2">
								<orgName type="institution">National Technical University of Ukraine &quot;Igor Sikorsky Kyiv Polytechnic Institute&quot;</orgName>
								<address>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Security Estimation of the Simulation Polygon for the Protection of Critical Information Resources</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">8F4138B24CD94A2519FDC68ECAF469E2</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T02:56+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Simulation Polygon</term>
					<term>Critical Information Resources</term>
					<term>Security</term>
					<term>Vulnerability</term>
					<term>Threat</term>
					<term>Control</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>In the article the question of Security estimation of information system protection through risk analysis is considered. An analysis of information risks is conducted for testing information security system, which allows to identify threats to information security. At present, different methods of analyzing information risks exist and are used, the main difference of which is in the scale of risk assessment: quantitative or qualitative. Based on analyzed existing methods of testing and assessing the vulnerabilities of the automated system, their advantages and disadvantages, for the possibility of further comparing the spent resources and information system security, a conclusion is made for the definition of an optimal method of testing the information security system method in the context of a constructed simulation polygon for the protection of critical information resources. The simulation polygon for the protection of critical information resources was developed and implemented based on the GNS3 application software. It is also concluded that the assessment of network security with mixed (complex) methods is not feasible. The optimal iRisk methodology for testing the information security system based on the simulation polygon for protection of critical information resources has been identified, among the considered methods for testing and analysis of automated system risks. The quantitative method iRisk is considered for Security estimation of information system protection. The general risk assessment iRisk is calculated considering the following parameters: Vulnerability Assessment, Threat Assessment, assessment of security tools. The methodology contains the general CVSS v3 vulnerability assessment system, which allows you to use constantly relevant coefficients to calculate vulnerabilities, and also have a list of all the major vulnerabilities that are associated with all modern software products that can be used in the automated system. The known vulnerabilities of used software and hardware are considered and the stability of the built simulation polygon for the protection of critical information resources to specific threats is calculated by iRisk method.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Periodic analysis of information risks is conducted for the research of information security system, it allows to identify threats to information security and in turn use and implement appropriate measures for their neutralization <ref type="bibr" target="#b0">[1]</ref>.</p><p>Based on the research and development of the simulation polygon for the protection of critical information resources by GNS3 application software, we can conclude that testing and evaluation of the constructed a secure network should be considered in the context of testing performance, impacting settings on the automated system security level, and in the context of used information protection tools <ref type="bibr" target="#b1">[2]</ref>. This is due to the fact that in this case the emphasis is on the technical part, practically not considering organizational measures related to information security in the AS. Given that the emphasis is on hardware, software and network level of information protection, so network security evaluation by mixed (complex) methods is not appropriate.</p><p>Based on the fact that quantitative methods in conducting a risk analysis at software and technical protection level and if not consider organizational and technical component, are more effective, it should choose a quantitative evaluation method of protection <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4]</ref>.</p><p>Among the main quantitative methods for analyzing information risks RiskWatch, Digital Security, ISRAM and iRisk, the iRisk method is more acceptable. The reason for this is, first of all, that this technique is free, informative enough, includes another CVSS v3 vulnerability assessment method, which is actively supported by the National Institute of Standards and Technology, and contains up-to-date information about the critical vulnerabilities of software and hardware, which in turn allows for an effective assessment of the level of network security.</p><p>The task that needs to be solved is to research of the simulation polygon for the protection of critical information resources by iRisk method for effectively assess the level of network security, considering the fact that the emphasis is on the hardwaresoftware and network levels of information security.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">iRisk Method</head><p>The iRisk method is formally one of the simplest estimates of information security quantitative risks for automated system. In general, it is calculated by the following equation:</p><formula xml:id="formula_0">( ) iRisk Vulnerability Threat Controls   <label>(1)</label></formula><p>where Vulnerability -vulnerability assessment, Threat -threat assessment, Control -assessment of security tools. This technique uses a different Common Vulnerability Scoring System v3.0 (CVSS V3) methodology for vulnerability assessment.</p><p>When assessing the threat, the probability of realization of the threat and the degree of its influence are being assessed. The degree of impact of the threat is estimated through the indicators of losses. To assess the probability of implementing a specific threat, there are two indicators: ARO is the expected number of threats during the year, and the level of knowledge and the offender's access level in the AS.</p><p>Formally, the calculation is not a complicated equation, but this methodology contains a general CVSS vulnerability assessment system, which is supported by market leaders in the field of information security in practice, that allows you to use constantly relevant coefficients for calculating vulnerabilities, and also have a list of all the major vulnerabilities associated with all modern software products that can be used in an automated system <ref type="bibr" target="#b4">[5]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1">Vulnerability</head><p>First of all, we have calculated Vulnerability, by using the standard CVSS v3. The calculation takes place according to the scheme presented in Fig. <ref type="figure" target="#fig_0">1</ref>. During the calculation, a large number of coefficients are used, so for convenience we will use the software of the National Institute of Standards and Technologies, then correct parameters setting will allow to get the result of calculations in the form of a scale from 1 to 10, where 1 it's a low level (no vulnerability), and the value 10 it's the critical vulnerability that needs to be eliminated. The standard includes three groups of metrics required for calculation: base, temporal and environmental. The value of the metric is accepted as a pair of vector (specific values of individual indicators) and a numerical value, which is calculated basing on all indicators and using the equation defined in the standard. Fig. <ref type="figure" target="#fig_1">2</ref> shows all the necessary parameters for calculating the environmental metric of the polygon for the protection of critical information resources. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2">Threat Assessment</head><p>According to this standard, the threat is explained as a negative event that may result of the vulnerability benefits. In order to make the equation as simple as possible, the iRisk method focuses on two main components: impact and likelihood. Fig. <ref type="figure" target="#fig_2">3</ref> is presented the scheme of threats estimation in iRisk method. Impact is the amount of damage that this incident will bring to the organization. Within the iRisk SecureState equation, today the following criteria are used to determine the impact. By default, the following values are assigned, but they can be changed according to the needs of the evaluated object:</p><p> financial (25) -whether threats destroy the organization financial flows;  strategic (15) -whether threats lead to long-term strategic losses;  operational (25) -whether threats influence on the work continuity;</p><p> law compliance (25) -whether threats affect the ability to keep to the standards;  reputation (10) -whether threats affect the relationship with customers.</p><p>Likelihood is another major component of the threat. The iRisk method uses two factors to estimate the probability: the annual expected number of threat implementations and the attacker's level of knowledge and access (correlation table between the level of knowledge/access and the annual number of threat implementations ARO (annualized rate of occurrence) <ref type="bibr" target="#b5">[6]</ref>).</p><p>The threat is calculated by the Eq. ( <ref type="formula">2</ref>), where Likelihood (correlation from table ARO <ref type="bibr" target="#b5">[6]</ref>). If the threat is on a scale from 100 to 50 -the level of risk is high, from 50 to 10 -medium, from 1 to 10 -low.</p><formula xml:id="formula_1">Threat Impact LikeLihood   (2)</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.3">Control (Assessment of Security Tools)</head><p>Based on the definition of the ISACA organization, preventive, detection, correction or deterrence means for security may be used in iRisk. The structure of the Control parameter (assessment of security tools) is presented on Fig. <ref type="figure" target="#fig_3">4</ref>. According to the standard, the tools have the following ratings: preventive -5, detection -4, correction -3, deterrence -3.</p><p>The next step is to define the Controls (efficiency), it has a five-point scale by the standard: 5 -if the information security tools in the network significantly exceed the goal, 4 -exceed the goal, 3 -the implementation corresponds to the goal, 2 -the implementation is not fully satisfying its goal, 1 -slightly up to its goal.</p><p>Adding indicators by CVSS we will get the following values:  optimized (801 -1000) -the tool can't be developed or implemented better;  managed (601 -800) -the tool continues to improve;</p><p> defined (401 -600) -the security tools are clearly defined and reduce the risk to medium;  initial / Ad-Hoc (1 -200) -the tool provides only some protection value. Thus, the three main components, which appears in the method iRisk, balance each other. The highest possible score for the threat is 100, which is multiplied by the maximum vulnerability <ref type="bibr" target="#b9">(10)</ref>. That is 1000 points potential, which is compensated by the potentially perfectly implemented protection, at the end will leave zero risk. In practice, this is almost not achievable and, in any case, left a part of the residual risk. That is, the risk varies in values from 0 to 1000, in this case the smaller value means the more secure automated system.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>3</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Software and Hardware Vulnerabilities</head><p>The designed simulation cybersecurity polygon hasn't so many vulnerabilities due to the high-quality equipment, the access control that divides the network into the demilitarized zone, the internal and external network, and the network settings, that limit access to the network from the outside, limit number of half-connections, which reduces the effectiveness of DdoS attacks, network scan, etc. <ref type="bibr" target="#b1">[2]</ref>. And still, the vulnerabilities remain on the software and hardware level. Next, we will look at some of them, the calculation of the security of the polygon for the protection of critical information resources will be done using iRisk <ref type="bibr" target="#b6">[7]</ref><ref type="bibr" target="#b7">[8]</ref><ref type="bibr" target="#b8">[9]</ref><ref type="bibr" target="#b9">[10]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1">Cisco IOS Arbitrary Command Execution Vulnerability (CVE-2012-0384)</head><p>The vulnerability occurs due to error in HTTP/HTTPS authorization that allows an authenticated user to execute any Cisco IOS software commands configured for user privilege levels.</p><p>We will calculate the base metric for Vulnerability calculation, and for more correctness, according to the security of the cybersecurity polygon we will calculate the temporal and environmental metric, as described above <ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b12">[13]</ref><ref type="bibr" target="#b13">[14]</ref>.</p><p>Base The resulting calculation of the base level Vulnerability assessment equal 7.8 out of 10, which is shown on Fig. <ref type="figure" target="#fig_5">5</ref>.</p><p>Considering that the threat should be realized from inside and first of all is oriented to a normal user without administrator rights and the expected number of threats is estimated as high, then from the ARO table <ref type="bibr" target="#b5">[6]</ref> we choose the correlation value Impact = 0.9. So, according to the Eq. ( <ref type="formula">2</ref>): Threat = 0.9 • 100 = 90. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2">Cisco Access Control Bypass Vulnerability (CVE-2012-1342)</head><p>The vulnerability of Cisco routers allows remote attacks to bypass the Access Control List (ACL) and send network traffic that should be rejected. Implementation of vulnerability leads to a violation of the automated system integrity.</p><p>In the same way as for the CVE-2012-0384 vulnerability, we will calculate the iRisk value.</p><p>Base Score Metrics {Attack Vector = Network; Attack Complexity = Low; Privileges Required = None; User Interaction = None; Scope= Changed; Confidentiality Impact = None; Integrity Impact = Low; Availability Impact = Impact None}</p><p>The value Vulnerability = 5.8, by the CVSS v3.0 calculator (Fig. <ref type="figure" target="#fig_6">6</ref>).</p><p>The calculation of the value Threat = 1.4 • 0.72 • 100 = 108, so the value iRisk = (5.8 • 108) -610 = 16.4, which means that the vulnerability will be approximately equal to zero, that is we can conclude that this vulnerability can be exploited by an attacker with little probability. Since the attack is conducted from the outside and its' probability is very high, the attacker should be an hacking expert, according to the iRisk method in this case, the value Impact = 100, and the value Likelihood = 0.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.4">Meltdown Vulnerability (CVE-2017-5754)</head><p>Vulnerability exploits the effect of out-of-order execution in modern processors. Attack doesn't depend on the operating system and doesn't exploit software vulnerabilities. Meltdown actually breaks down the entire security system based on the isolation of the address area, including the virtual one. Meltdown allows you to read part of the memory of other processes and virtual machines. The KAISER patch excludes this vulnerability, but reduces CPU performance. Calculate the iRisk value for a cybersecurity polygon, without KAISER patch. Calculate the base metric for Meltdown vulnerability (CVE-2017-5754), the result is shown in Fig. <ref type="figure" target="#fig_9">8</ref>.</p><p>Base Score Metrics {Attack Vector = Local; Attack Complexity = High; Privileges Required = Low; User Interaction = None; Scope= Changed; Confidentiality Impact = High; Integrity Impact = None; Availability Impact = Impact None} Considering that the attacker can act both from the outside and inside and the attack can be executed frequently, and the attacker can have just an advanced level of skills and the attack code is shown in large numbers of articles, all of this will give a correlation value of Impact = 0.9, and the value of Threat will be equal to 100 • 0.9 = 90.</p><p>The resulting value of iRisk for Meltdown (CVE-2017-5754) will be equal to iRisk = (5.6 • 90) -0 = 504, because without the KAISER patch this Vulnerability doesn't show itself, and is included in the architecture of most modern processors. This vulnerability is assigned two identifiers CVE-2017-5753, CVE-2017-5715. By its nature, it is similar to Meltdown, but with some differences, in particular, by during a speculative code execution, the processor can execute instructions that it would not perform under strictly consistent (non-speculative) calculations, and although in the future the result of their performance is discarded, its imprint remains in the processor cache and can be used. The Specter vulnerability is not easy to implement -however, it can be implemented, under the condition of attack on a specific software, known to the attacker and, if possible, available in an open source code in the same version and on the same system, which provides an attack.</p><p>Another way for Specter implementing is to "predict branching" -the processor has a similar transition prediction block, it predicts the transition address for the next instruction of the indirect transition (Meltdown, but here they play a different role).</p><p>For simplicity, this unit does not broadcast between virtual and real addresses, which means it can be trained in the address space of the attacker on certain actions.</p><p>After some time, the real transition address will be deducted, the processor identifies the error and rejects the results of the speculative execution, however, as in all other instances of the use of Meltdown and Specter, most performance results remain in the cache.</p><p>Calculate the iRisk value for the Specter vulnerability. The base metric in both versions of the vulnerabilities implementation is the same, the results of the calculation are presented in Fig. <ref type="figure" target="#fig_10">9</ref>.</p><p>Base In both cases with Spectre, we are concerned with the fact that the processor learns fast to execute one process by using as an example another process, thereby actually allowing the second process to control the progress of the first one. There are no universal patches to fix Specter, and ways of protection from CVE-2017-5715 are the permanently clearing the cache and cleaning the code from the core.</p><p>Calculate the iRisk value for CVE-2017-5715, given the complexity of the exact implementation and the impact only on the information confidentiality. So the value of Impact = 50 (including financial, reputational and strategic impact). Given that the vulnerability will be try to use mainly from the outside and the attacker must have advanced technical skills, the correlation value Likelihood = 0.64. These parameters are typical for both CVE-2017-5753 and CVE-2017-5715.</p><p>However, the Controls parameters in this case need to be evaluated in different ways. There are patches for CVE-2017-5715 vulnerability, which partially solve this problem only in some cases, so value Controls can be considered Initial/Ad-Hoc = 100, but it's provides only some protection value. As to CVE-2017-5753 vulnerability, value Controls can be considered as 0, as this problem is not resolved at this time.</p><p>So, for CVE-2017-5715 iRisk = (5. The higher the value iRisk the vulnerability is the more critical and has a higher priority for automated system protection.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. General scheme of vulnerability calculation in CVSS v3</figDesc><graphic coords="3,172.32,413.36,261.84,163.44" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Fig. 2 .</head><label>2</label><figDesc>Fig. 2. The environmental metric of the polygon for the protection of critical information resources</figDesc><graphic coords="4,147.12,147.44,312.24,132.48" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Fig. 3 .</head><label>3</label><figDesc>Fig. 3. Scheme for threats estimating in the iRisk method</figDesc><graphic coords="4,191.04,387.92,213.12,188.88" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>Fig. 4 .</head><label>4</label><figDesc>Fig. 4. Structure of the Control parameter of the iRisk method</figDesc><graphic coords="5,214.08,366.80,178.32,174.96" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head></head><label></label><figDesc>Score Metrics {Attack Complexity = Low; Privileges Required = Low; User Interaction = None; Scope= Unchanged; Confidentiality Impact = High; Integrity Impact = High; Availability Impact = High} Temporal Score Metrics Score Metrics {Exploitability = Functional exploit exist} Environmental Score Metrics {Base Modifiers {Attack Vector = Local; Attack Complexity = Low; Privileges Required = Low; User Interaction = None} {Scope = Unchanged} {Impact Metrics {Confidentiality Impact = Low; Integrity Impact = Low; Availability Impact = High}} {Impact Subscore Modifiers {Confidentiality Requirement = Low; Integrity Requirement = Low; Availability Requirement = Low}}}</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Fig. 5 .</head><label>5</label><figDesc>Fig. 5. The Base CVE-2012-0384 vulnerability metric for the cybersecurity polygon</figDesc><graphic coords="7,243.36,148.64,123.84,106.80" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Fig. 6 .</head><label>6</label><figDesc>Fig. 6. The Base CVE-2012-1342 vulnerability metric for the cybersecurity polygon</figDesc><graphic coords="7,235.92,538.64,134.64,102.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head></head><label></label><figDesc>7 and the value Threat =70, So, you can calculate the iRisk value for CVE-2017-0144, without the security patch from March 14, 2017: iRisk = (8.1 × 70) -0 = 567.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head>Fig. 7 .</head><label>7</label><figDesc>Fig. 7. The Base CVE-2017-0144 EternalBlue vulnerability metric for the cybersecurity polygon</figDesc><graphic coords="8,235.44,365.12,135.60,86.40" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_9"><head>Fig. 8 .</head><label>8</label><figDesc>Fig. 8. The Base CVE-2017-5754 Meltdown vulnerability metric for the cybersecurity polygon</figDesc><graphic coords="9,222.72,237.20,161.28,102.00" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_10"><head>Fig. 9 .</head><label>9</label><figDesc>Fig. 9. The Base Spectre CVE-2017-5753 і CVE-2017-5715 vulnerability metric for the cybersecurity polygon</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 .</head><label>1</label><figDesc>The iRisk method was chosen for the research, first of all because this technique is free, enough informative, includes another CVSS v3 vulnerability assessment method, which is actively supported by the National Institute of Standards and Technology. Automated system has been tested for the following vulnerabilities: Cisco IOS Arbitrary Command Execution Vulnerability (CVE-2012-0384), Cisco Access Control Bypass Vulnerability (CVE-2012-1342), EternalBlue (CVE-2017-0144), Meltdown (CVE-2017-5754), Specter (CVE-2017-5753) (CVE-2017-5715). Conclusions have been shown about the stability of the designed network to specific threats by the iRisk method. It uses the values from 0 to 1000 scope, where 0 corresponds to automated system, in which it is possible to neglect this vulnerability, whereas at the maximum value, if it exceeds 100, it is necessary to solve this vulnerability. The results of calculations are given in Table1. Table of iRisk values for a builted cybersecurity polygon</figDesc><table><row><cell>Vulnerability</cell><cell>Value iRisk</cell></row><row><cell>Cisco IOS Arbitrary Command Execution Vulnerability (CVE-2012-0384)</cell><cell>50</cell></row><row><cell>Cisco Access Control Bypass Vulnerability (CVE-2012-1342)</cell><cell>16.4</cell></row><row><cell>EternalBlue (CVE-2017-0144)</cell><cell>567</cell></row><row><cell>Meltdown (CVE-2017-5754)</cell><cell>504</cell></row><row><cell>Spectre (CVE-2017-5715)</cell><cell>79.2</cell></row><row><cell>Spectre (CVE-2017-5753)</cell><cell>179.2</cell></row></table><note>6 • 50 • 0.64) -100 = 79.2. For CVE-2017-5753 iRisk = (5.6 • 50 • 0.64) -0 = 179.2 4 Conclusions</note></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<title level="m" type="main">Modeling and Tools for Network Simulation</title>
		<author>
			<persName><forename type="first">Klaus</forename><surname>Wehrle</surname></persName>
		</author>
		<author>
			<persName><forename type="first">James</forename><surname>Gross</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2010">2010</date>
			<publisher>Hardcover</publisher>
			<biblScope unit="page">256</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">Model of Open Systems Interconnection terms of information security</title>
		<author>
			<persName><forename type="first">B</forename><surname>Korniyenko</surname></persName>
		</author>
		<idno type="DOI">.org/10.18372/2310-5461.15.5120</idno>
	</analytic>
	<monogr>
		<title level="j">Science intensive technology</title>
		<imprint>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="83" to="89" />
			<date type="published" when="2012">2012</date>
		</imprint>
	</monogr>
	<note>ukr)</note>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Open systems interconnection model investigation from the viewpoint of information security</title>
		<author>
			<persName><forename type="first">B</forename><surname>Korniyenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Yudin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Novizki</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The Advanced Science Journal</title>
		<imprint>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="53" to="56" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Research of the Simulation Polygon for the Protection of Critical Information Resources</title>
		<author>
			<persName><forename type="first">B</forename><surname>Korniyenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Yudin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Galata</surname></persName>
		</author>
		<idno>nbn:de:0074-2067-8</idno>
	</analytic>
	<monogr>
		<title level="m">CEUR Workshop Proceedings, Information Technologies and Security, Selected Papers of the XVII International Scientific and Practical Conference on Information Technologies and Security (ITS 2017)</title>
				<meeting><address><addrLine>Kyiv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2017-11-30">November 30, 2017. 2017</date>
			<biblScope unit="volume">2067</biblScope>
			<biblScope unit="page" from="23" to="31" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<author>
			<persName><forename type="first">Chris</forename><surname>Clymer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Ken</forename><surname>Stasiak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Matt</forename><surname>Neely</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Stephen</forename><surname>Marchewitz</surname></persName>
		</author>
		<ptr target="https://securestate.en/iRisk-Equation-Whitepaper.pdf" />
		<title level="m">IRisk Equatuion Available via</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<ptr target="https://www.first.org/cvss/user-guide" />
		<title level="m">Common Vulnerability Scoring System v3.0: User Guide</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Implementation of information security a model of open systems interconnection</title>
		<author>
			<persName><forename type="first">B</forename><surname>Korniyenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Yudin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Abstracts of the VI International Scientific Conference &quot;Computer systems and network technologies</title>
				<meeting><address><addrLine>CSNT-</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2013">2013. 2013</date>
			<biblScope unit="page">73</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<title level="m" type="main">Information security and computer network technologies: monograph</title>
		<author>
			<persName><forename type="first">B</forename><surname>Korniyenko</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2016">2016</date>
			<publisher>LAMBERT Academic Publishing</publisher>
			<biblScope unit="page">102</biblScope>
			<pubPlace>Saarbrucken, Deutschland</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Modeling of security and risk assessment in information and communication system</title>
		<author>
			<persName><forename type="first">B</forename><surname>Korniyenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Galata</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Kozuberda</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Sciences of Europe, V</title>
		<imprint>
			<biblScope unit="volume">2</biblScope>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="61" to="63" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">The classification of information technologies and control systems</title>
		<author>
			<persName><forename type="first">B</forename><surname>Korniyenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International scientific journal</title>
		<imprint>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="78" to="81" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Risk estimation of information system</title>
		<author>
			<persName><forename type="first">B</forename><surname>Korniyenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Yudin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Galata</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Wschodnioeuropejskie Czasopismo Naukowe</title>
		<imprint>
			<biblScope unit="volume">5</biblScope>
			<biblScope unit="page" from="35" to="40" />
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Simulation of information security of computer networks. Intellectual decision making systems and computing intelligence problems (ISDMCI</title>
		<author>
			<persName><forename type="first">B</forename><surname>Korniyenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Galata</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Udowenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Collection of scientific papers of the international scientific conference</title>
				<meeting><address><addrLine>Kherson, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2016">2016. 2016</date>
			<biblScope unit="page" from="77" to="79" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title level="m" type="main">Cyber security -operating systems and protocols</title>
		<author>
			<persName><forename type="first">B</forename><surname>Korniyenko</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2017">2017</date>
			<publisher>LAMBERT Academic Publishing</publisher>
			<biblScope unit="page">122</biblScope>
			<pubPlace>Saarbrucken, Deutschland</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Design and research of mathematical model for information security system in computer network</title>
		<author>
			<persName><forename type="first">B</forename><surname>Korniyenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Galata</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Science intensive technology</title>
		<imprint>
			<biblScope unit="issue">2</biblScope>
			<biblScope unit="page" from="114" to="118" />
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
