Approaches to recognition of malicious behavior in computer networks and security evaluation of information systems using attributive metagraphs have been considered. Matrices of techniques, tactics, and methods of computer attacks for their simulation have been suggested.
This is a preview of subscription content, access via your institution.
Buy single article
Instant access to the full article PDF.
Tax calculation will be finalised during checkout.
The Decree of the Government of the Russian Federation of May 11, 2017 No. 555 “On Amending the Requirements for the Creation, Development, Commissioning, Operation, and Decommissioning of State Information Systems and Further Storage of Information Contained in Their Databases.” https://www.rulaws.ru/goverment/Postanovlenie-Pravitelstva-RF-ot-11.05.2017-N-555/.
Metodika opredeleniya ugroz bezopasnosti v informatsionnykh sistemakh (Methodology for Determining Security Threats in Information Systems), Moscow: FSTEK, 2015.
Novokhrestov, A.K. and Konev, A.A., Assessment of the security quality of computer networks, Din. Sist. Mekh. Mash., 2014, no. 4, pp. 85–87.
Gorodetskii, V.I. and Karasev, O.V., Applied multi-agent systems of group control, Iskustv. Intell. Prinyatie Reshenii, 2009, no. 2, pp. 3–24.
Zegzhda, D.P., Stepanova, T.V., and Suprun, A.F., Multiagent system controllability evaluation using the multilevel structure of the graph of agent, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 809–812.
Kotenko, I.V. and Saenko, I.B., Architecture of the system of intelligent information protection services in critical infrastructures, Tr. SPIIRAN, 2013, no. 24, pp. 21–40.
Kalinin, M.O., Krundyshev, V.M., Rezedinova, E.Y., and Reshetov, D.V., Hierarchical software-defined security management for large-scale dynamic networks, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 906–911.
Gorbachev, I.E., Sukhov, A.M., Eremeev, M.A., and Smirnov, S.I., Methodology for implementing a systematic approach in creating the image of the information security system of critical information infrastructure, taking into account economic feasibility, Probl. Inf. Bezop., Komp’yut. Sist., 2018, no. 2, pp. 93–111.
Konev, A.A. and Davydova, E.M., An approach to the description of the structure of the information security system, Dokl. TUSUR, 2013, vol. 28, no. 2, pp. 107–111.
Zegzhda, D., Zegzhda, P., Pechenkin, A., and Poltavtseva, M., Modeling of information systems to their security evaluation, ACM International Conference Proceeding Series, 2017, pp. 295–298. https://doi.org/10.1145/3136825.3136857
Zegzhda, P.D. and Kalinin, M.O., Automatic security management of computer systems, Autom. Control Comput. Sci., 2015, vol. 49, no. 8, pp. 665–672.
Zegzhda, D.P., Zegzhda, P.D., and Kalinin, M.O., Clarifying integrity control at the trusted information environment, Lect. Notes Comput. Sci., 2010, vol. 6258.
Pavlenko, E., Zegzhda, D., and Shtyrkina, A., Criterion of cyber-physical systems sustainability, CEUR Workshop Proc., 2019, vol. 2603, pp. 60–64.
Pavlenko, E. and Zegzhda, D., Sustainability of cyber-physical systems in the context of targeted destructive influences, IEEE Industrial Cyber-Physical Systems, 2018, pp. 830–834.
Konev, A.A., An approach to building a model of threats to protected information, Dokl. TUSUR, 2012, vol. 25, no. 1, pp. 34–39.
Mallon, S., Strategic Cybersecurity Leader & Executive Consultant, at Black Hat 2016: Extended Cyber Kill Chain. https://www.blackhat.com/docs/us-16/materials/us-16-Malone-Using-An-Expanded-Cyber-Kill-Chain-Model-To-Increase-Attack-Resiliency.pdf. Accessed May 19, 2020.
Mesarovic, M., Macko, D., and Takahara, Y., Theory of Hierarchical, Multilevel, Systems, Elsevier, 2000.
Astanin, S.V., Dragnysh, N.V., and Zhukovskaya, N.K., Nested metagraphs as models of complex objects. http://ivdon.ru/magazine/archive/n4p2y2012/1434. Accessed May 19, 2020.
The authors declare that they have no conflicts of interest.
Translated by A. Muravev
About this article
Cite this article
Latypov, I.T., Eremeev, M.A. Multilevel Model of Computer Attack Based on Attributive Metagraphs. Aut. Control Comp. Sci. 54, 944–948 (2020). https://doi.org/10.3103/S0146411620080192
- computer attack
- security evaluation
- malicious software