Multilevel Model of Computer Attack Based on Attributive Metagraphs

Abstract

Approaches to recognition of malicious behavior in computer networks and security evaluation of information systems using attributive metagraphs have been considered. Matrices of techniques, tactics, and methods of computer attacks for their simulation have been suggested.

This is a preview of subscription content, access via your institution.

Fig. 1.
Fig. 2.
Fig. 3.

REFERENCES

  1. 1

    The Decree of the Government of the Russian Federation of May 11, 2017 No. 555 “On Amending the Requirements for the Creation, Development, Commissioning, Operation, and Decommissioning of State Information Systems and Further Storage of Information Contained in Their Databases.” https://www.rulaws.ru/goverment/Postanovlenie-Pravitelstva-RF-ot-11.05.2017-N-555/.

  2. 2

    Metodika opredeleniya ugroz bezopasnosti v informatsionnykh sistemakh (Methodology for Determining Security Threats in Information Systems), Moscow: FSTEK, 2015.

  3. 3

    Novokhrestov, A.K. and Konev, A.A., Assessment of the security quality of computer networks, Din. Sist. Mekh. Mash., 2014, no. 4, pp. 85–87.

  4. 4

    Gorodetskii, V.I. and Karasev, O.V., Applied multi-agent systems of group control, Iskustv. Intell. Prinyatie Reshenii, 2009, no. 2, pp. 3–24.

  5. 5

    Zegzhda, D.P., Stepanova, T.V., and Suprun, A.F., Multiagent system controllability evaluation using the multilevel structure of the graph of agent, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 809–812.

    Article  Google Scholar 

  6. 6

    Kotenko, I.V. and Saenko, I.B., Architecture of the system of intelligent information protection services in critical infrastructures, Tr. SPIIRAN, 2013, no. 24, pp. 21–40.

  7. 7

    Kalinin, M.O., Krundyshev, V.M., Rezedinova, E.Y., and Reshetov, D.V., Hierarchical software-defined security management for large-scale dynamic networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 906–911.

    Article  Google Scholar 

  8. 8

    Gorbachev, I.E., Sukhov, A.M., Eremeev, M.A., and Smirnov, S.I., Methodology for implementing a systematic approach in creating the image of the information security system of critical information infrastructure, taking into account economic feasibility, Probl. Inf. Bezop., Komp’yut. Sist., 2018, no. 2, pp. 93–111.

  9. 9

    Konev, A.A. and Davydova, E.M., An approach to the description of the structure of the information security system, Dokl. TUSUR, 2013, vol. 28, no. 2, pp. 107–111.

    Google Scholar 

  10. 10

    Zegzhda, D., Zegzhda, P., Pechenkin, A., and Poltavtseva, M., Modeling of information systems to their security evaluation, ACM International Conference Proceeding Series, 2017, pp. 295–298. https://doi.org/10.1145/3136825.3136857

  11. 11

    Zegzhda, P.D. and Kalinin, M.O., Automatic security management of computer systems, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 665–672.

    Article  Google Scholar 

  12. 12

    Zegzhda, D.P., Zegzhda, P.D., and Kalinin, M.O., Clarifying integrity control at the trusted information environment, Lect. Notes Comput. Sci., 2010, vol. 6258.

  13. 13

    Pavlenko, E., Zegzhda, D., and Shtyrkina, A., Criterion of cyber-physical systems sustainability, CEUR Workshop Proc., 2019, vol. 2603, pp. 60–64.

    Google Scholar 

  14. 14

    Pavlenko, E. and Zegzhda, D., Sustainability of cyber-physical systems in the context of targeted destructive influences, IEEE Industrial Cyber-Physical Systems, 2018, pp. 830–834.

    Google Scholar 

  15. 15

    Konev, A.A., An approach to building a model of threats to protected information, Dokl. TUSUR, 2012, vol. 25, no. 1, pp. 34–39.

    Google Scholar 

  16. 16

    Mallon, S., Strategic Cybersecurity Leader & Executive Consultant, at Black Hat 2016: Extended Cyber Kill Chain. https://www.blackhat.com/docs/us-16/materials/us-16-Malone-Using-An-Expanded-Cyber-Kill-Chain-Model-To-Increase-Attack-Resiliency.pdf. Accessed May 19, 2020.

  17. 17

    Mesarovic, M., Macko, D., and Takahara, Y., Theory of Hierarchical, Multilevel, Systems, Elsevier, 2000.

    Google Scholar 

  18. 18

    Astanin, S.V., Dragnysh, N.V., and Zhukovskaya, N.K., Nested metagraphs as models of complex objects. http://ivdon.ru/magazine/archive/n4p2y2012/1434. Accessed May 19, 2020.

Download references

Author information

Affiliations

Authors

Corresponding authors

Correspondence to I. T. Latypov or M. A. Eremeev.

Ethics declarations

The authors declare that they have no conflicts of interest.

Additional information

Translated by A. Muravev

About this article

Verify currency and authenticity via CrossMark

Cite this article

Latypov, I.T., Eremeev, M.A. Multilevel Model of Computer Attack Based on Attributive Metagraphs. Aut. Control Comp. Sci. 54, 944–948 (2020). https://doi.org/10.3103/S0146411620080192

Download citation

Keywords:

  • computer attack
  • security evaluation
  • malicious software
  • metagraph