| 
 | ||||||||||
| 
 | 
 V. V. Karganov, Senior Research Assistant, Candidate Of Technical Sciences, Associate  Professor, e-mail: vitalik210277@mail.ru, In  article describes adaptive management, which is a separate type of management,  namely, flexible and innovative. It accumulates knowledge about condition and  development of the control system, methods and tools of its application in  system objects. The solution tool is a method of adaptive control of  informatively — computer network security (IAS), which differs from the known  ones, in that the analysis results of the dynamics violator's actions are  applied. The method contains: monitoring of the situation, operational control,  recognition of the sequence of actions of the violator, modeling the strategy  of influence of the violator, the process of determining the situational parameters  with a reliable forecast of the invasion strategy. In the process of analysis,  the network administrator receives information about the priority goals of the  offender, the means used by him and the vulnerabilities of various elements,  which makes it possible to quickly take measures to improve the security of the  network and avoid compromising it. The situational parameters control algorithm  in the mutual opposing situation at stochastic uncertainty is provided. The  architecture of the prototype of this system is presented, as well as scenarios  of experiments conducted with the prototype. The current state and the  procedure for analyzing the dynamics of the violator's actions are considered.  The results of calculations in tabular form are presented, namely:  probabilities of readability of possible events time of transition from one  event to another; the timing of the realization of the threat of information  theft X on the way Px1 using methods of adaptive management and the  traditional protection of the IVS. Presented the calculation results of dependence probability of threats: from time to time, the probability of  protection IVS for implementation of the proposed method based on the analysis  of the dynamics offender's actions. The conclusions, the essence of which lies  in the fact that the use of the method allows to maintain the efficiency of IVS  at the required level with the dynamics of changing the threats set, taking  into account the scaling in the planning and making changes to it in the conditions  of information confrontation. | |||||||||