Advertisement

Estimation of the Degree of Reliability and Safety of Software Systems

  • Askar BoranbayevEmail author
  • Seilkhan Boranbayev
  • Askar Nurbekov
Conference paper
  • 84 Downloads
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 1129)

Abstract

The tasks of ensuring the reliability and security of a software system, managing risk and organizing risks are important. The purpose of the developed software system was to identify, evaluate and neutralize the risks of information and automated systems. Ensuring the confidentiality of the information stored in the system, including historical data on errors and risks of the systems, plays an important role. Considering the importance of protecting this system from risks of information security, studies have been conducted using the method of protection from DDoS attacks and management of risks. Approaches are based on the adaptation of certain methods to assess the risks of software systems, help reduce risks by using risk mitigation and assessment strategies based on collected historical data on risk reduction. The study assembled a network of virtual machines. Machines performed various tasks. The first machine was a server analyzing the amount of incoming traffic. The second machine - served as the target server. The third machine performed the task of the attacker and it attacked the second machine. The main purpose of the article is to present the results of reducing information security risks, namely, distributed attacks on the developed software system.

Keywords

Distributed attack Software system Reliability Security Risk Method 

References

  1. 1.
    Boranbayev, S., Goranin, N., Nurusheva, A.: The methods and technologies of reliability and security of information systems and information and communication infrastructures. J. Theoret. Appl. Inf. Technol. 96(18), 6172–6188 (2018)Google Scholar
  2. 2.
    Boranbayev, A., Boranbayev, S., Nurusheva, A.: Development of a software system to ensure the reliability and fault tolerance in information systems based on expert estimates. Adv. Intell. Syst. Comput. 869, 924–935 (2018)Google Scholar
  3. 3.
    Grantham Lough, K., Stone, R.B., Tumer, I.: Prescribing and implementing the risk in early design (RED) method. In: Proceedings of DETC 2006, Number DETC2006-99374, Philadelphia, PA, September 2006Google Scholar
  4. 4.
    Grantham Lough, K., Stone, R.B., Tumer, I.: The risk in early design (RED) method: likelihood and consequence formulations. In: Proceedings of DETC 2006, Number DETC2006-99375, Philadelphia, PA, September 2006Google Scholar
  5. 5.
    Krus, D.A.: The risk mitigation strategy taxonomy and generated risk event effect neutralization method, Doctoral dissertations (2012)Google Scholar
  6. 6.
    Lough, K.G., Stone, R., Turner, I.: The risk in early design method. J. Eng. Des. 20(2), 155–173 (2009)CrossRefGoogle Scholar
  7. 7.
    Boranbayev, A., Boranbayev, S., Yersakhanov, K., Nurusheva, A., Taberkhan, R.: Methods of ensuring the reliability and fault tolerance of information systems. In: 15th International Conference of Information Technology, Information Technology – New Generations, pp. 729–730 (2018)Google Scholar
  8. 8.
    Krus, D.A., Grantham Lough, K.: Risk due to function failure propagation. In: International Conference on Engineering Design, ICED 2007, pp. 787–788 (2007)Google Scholar
  9. 9.
    Krus, D.A., Grantham Lough, K.: Function-based failure propagation for conceptual design. In: Artificial Intelligence for Engineering Design, Analysis and Manufacturing, pp. 409–426. Cambridge University Press (2009)Google Scholar
  10. 10.
    Krus, D., Grantham, K.: Failure prevention through the cataloging of successful risk mitigation strategies. J. Fail. Anal. Prev. 13, 712–721 (2013)CrossRefGoogle Scholar
  11. 11.
    Krus, D., Grantham, K.: Generated risk event effect neutralization: identifying and evaluating risk mitigation strategies during conceptual design. In: INCOSE 2012, Rome, pp. 1225–1237 (2012)Google Scholar
  12. 12.
    Raghavan, S., Dawson, E.: An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. Springer, Heidelberg (2011)Google Scholar
  13. 13.
    Boranbayev, A., Boranbayev, S., Nurusheva, A., Yersakhanov, K.: The modern state and the further development prospects of information security in the Republic of Kazakhstan. In: 15th International Conference of Information Technology, Information Technology – New Generations, pp. 33–38 (2018)Google Scholar
  14. 14.
    Boranbayev, A.S.: Defining methodologies for developing J2EE web-based information systems. J. Nonlin. Anal. Theory Methods Appl. 71(12), 1633–1637 (2009)Google Scholar
  15. 15.
    Boranbayev, A., Mazhitov, M., Kakhanov, Z.: Implementation of security systems for prevention of loss of information at organizations of higher education. In: Proceedings of the 12th International Conference on Information Technology: New Generations (ITNG 2015), 13–15 April 2015, Las Vegas, Nevada, USA, pp. 802–804 (2015)Google Scholar
  16. 16.
    Boranbayev, S., Boranbayev, A., Altayev, S., Seitkulov, Y.: Application of diversity method for reliability of cloud computing. In: Proceedings of the 2014 IEEE 8th International Conference on Application of Information and Communication Technologies-AICT2014, Astana, Kazakhstan, 15–17 October 2014, pp. 244–248 (2014)Google Scholar
  17. 17.
    Turskis, Z., Goranin, N., Nurusheva, A., Boranbayev, S.: A fuzzy WASPAS-based approach to determine critical information infrastructures of EU sustainable development. Sustainability (Switzerland) 11(2), 424 (2019)CrossRefGoogle Scholar
  18. 18.
    Turskis, Z., Goranin, N., Nurusheva, A., Boranbayev, S.: Information security risk assessment in critical infrastructure: a hybrid MCDM approach. Informatica (Netherlands) 30(1), 187–211 (2019)CrossRefGoogle Scholar
  19. 19.
    Boranbayev, A., Boranbayev, S., Nurusheva, A.: Analyzing methods of recognition, classification and development of a software system. Adv. Intell. Syst. Comput. 869, 690–702 (2018)Google Scholar
  20. 20.
    Boranbayev, A., Shuitenov, G., Boranbayev, S.: The method of data analysis from social networks using apache Hadoop. Adv. Intell. Syst. Comput. 558, 281–288 (2018)Google Scholar
  21. 21.
    Boranbayev, A., Boranbayev, S., Nurusheva, A., Yersakhanov, K.: Development of a software system to ensure the reliability and fault tolerance in information systems. J. Eng. Appl. Sci. 13(23), 10080–10085 (2018)Google Scholar
  22. 22.
    Boranbayev, S., Nurkas, A., Tulebayev, Y., Tashtai, B.: Method of processing big data. Adv. Intell. Syst. Comput. 738, 757–758 (2018)Google Scholar
  23. 23.
    Akhmetova, Z., Boranbayev, S., Zhuzbayev, S.: The visual representation of numerical solution for a non-stationary deformation in a solid body. Adv. Intell. Syst. Comput. 448, 473–482 (2016)Google Scholar
  24. 24.
    Boranbayev, S.N., Nurbekov, A.B.: Development of the methods and technologies for the information system designing and implementation. J. Theoret. Appl. Inf. Technol. 82(2), 212–220 (2015)Google Scholar
  25. 25.
    Hritonenko, N., Yatsenko, Y., Boranbayev, S.: Environmentally sustainable industrial modernization and resource consumption: is the Hotelling’s rule too steep? Appl. Math. Model. 39(15), 4365–4377 (2015)MathSciNetCrossRefGoogle Scholar
  26. 26.
    Akhmetova, Z., Zhuzbayev, S., Boranbayev, S., Sarsenov, B.: Development of the system with component for the numerical calculation and visualization of non-stationary waves propagation in solids. Front. Artif. Intell. Appl. 293, 353–359 (2016)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  • Askar Boranbayev
    • 1
    Email author
  • Seilkhan Boranbayev
    • 2
  • Askar Nurbekov
    • 2
  1. 1.Nazarbayev UniversityAstanaKazakhstan
  2. 2.L.N. Gumilyov Eurasian National UniversityAstanaKazakhstan

Personalised recommendations