USERS BEHAVIOR MODEL IN TASKS OF COMPUTER SYSTEMS SECURITY ANALYSIS

Authors

  • V. P. Shyrochin
  • V. E. Mukhin
  • Hu Zheng Bing

DOI:

https://doi.org/10.47839/ijc.2.2.221

Keywords:

Security, computer systems, user identification and authentication

Abstract

Security of computer systems of various purpose and the appropriate information technologies appreciably depends on tools of user identification and authentication, and also on tools of the analysis of their behavior and behavior of their programs during reception of access to those or other information resources. This article is devoted to a substantiation of a method of use of a known formalism - state machine for modeling users behavior and to testing of protection tools on detection of attempts of the non-authorized access to information resources, including at early stages of preparation for such actions.

References

В.Г. Олифер, Н.А. Олифер Сетевые операционные системы. СП-б: Питер. 2001. 546 с.

M. Chung, N. Puketza, R. Olsson, B. Mukherjee. Simulating concurrent intrusions for testing intrusion detection systems. Paralleling intrusions. In Proceeding of the 1995 National Information Systems Security Conference, pages 173-183, Baltimore, Maryland, October 10-13 1995.

H. Debar, M. Dacier, A. Wespi, S. Lampart. An experimentation workbench for intrusion detection systems. Technical Report RZ2998, IBM Research Division. Zurich Research Laboratory. Zurich, Switzerland. March 1998.

В.П. Широчин, В.Е. Мухин, А.В. Кулик. Вопросы проектирования средств защиты информации в компьютерных системах и сетях. К: "Век". 1999.- 112 с.

В.П. Широчин, В.Е. Мухин . Формализация и целевая адаптация средств аутентификации в компьютерных сетях. Управляющие системы и машины. Тематический выпуск: Интеллектуальные и корпоративные сети. N 5/6, 2000. с. 59-65.

Downloads

Published

2014-08-01

How to Cite

Shyrochin, V. P., Mukhin, V. E., & Bing, H. Z. (2014). USERS BEHAVIOR MODEL IN TASKS OF COMPUTER SYSTEMS SECURITY ANALYSIS. International Journal of Computing, 2(2), 151-156. https://doi.org/10.47839/ijc.2.2.221

Issue

Section

Articles