|
||||||||||
|
V. V. Karganov, Senior Research Assistant, Candidate Of Technical Sciences, Associate Professor, e-mail: vitalik210277@mail.ru, In article describes adaptive management, which is a separate type of management, namely, flexible and innovative. It accumulates knowledge about condition and development of the control system, methods and tools of its application in system objects. The solution tool is a method of adaptive control of informatively — computer network security (IAS), which differs from the known ones, in that the analysis results of the dynamics violator's actions are applied. The method contains: monitoring of the situation, operational control, recognition of the sequence of actions of the violator, modeling the strategy of influence of the violator, the process of determining the situational parameters with a reliable forecast of the invasion strategy. In the process of analysis, the network administrator receives information about the priority goals of the offender, the means used by him and the vulnerabilities of various elements, which makes it possible to quickly take measures to improve the security of the network and avoid compromising it. The situational parameters control algorithm in the mutual opposing situation at stochastic uncertainty is provided. The architecture of the prototype of this system is presented, as well as scenarios of experiments conducted with the prototype. The current state and the procedure for analyzing the dynamics of the violator's actions are considered. The results of calculations in tabular form are presented, namely: probabilities of readability of possible events time of transition from one event to another; the timing of the realization of the threat of information theft X on the way Px1 using methods of adaptive management and the traditional protection of the IVS. Presented the calculation results of dependence probability of threats: from time to time, the probability of protection IVS for implementation of the proposed method based on the analysis of the dynamics offender's actions. The conclusions, the essence of which lies in the fact that the use of the method allows to maintain the efficiency of IVS at the required level with the dynamics of changing the threats set, taking into account the scaling in the planning and making changes to it in the conditions of information confrontation. |