USERS BEHAVIOR MODEL IN TASKS OF COMPUTER SYSTEMS SECURITY ANALYSIS
DOI:
https://doi.org/10.47839/ijc.2.2.221Keywords:
Security, computer systems, user identification and authenticationAbstract
Security of computer systems of various purpose and the appropriate information technologies appreciably depends on tools of user identification and authentication, and also on tools of the analysis of their behavior and behavior of their programs during reception of access to those or other information resources. This article is devoted to a substantiation of a method of use of a known formalism - state machine for modeling users behavior and to testing of protection tools on detection of attempts of the non-authorized access to information resources, including at early stages of preparation for such actions.References
В.Г. Олифер, Н.А. Олифер Сетевые операционные системы. СП-б: Питер. 2001. 546 с.
M. Chung, N. Puketza, R. Olsson, B. Mukherjee. Simulating concurrent intrusions for testing intrusion detection systems. Paralleling intrusions. In Proceeding of the 1995 National Information Systems Security Conference, pages 173-183, Baltimore, Maryland, October 10-13 1995.
H. Debar, M. Dacier, A. Wespi, S. Lampart. An experimentation workbench for intrusion detection systems. Technical Report RZ2998, IBM Research Division. Zurich Research Laboratory. Zurich, Switzerland. March 1998.
В.П. Широчин, В.Е. Мухин, А.В. Кулик. Вопросы проектирования средств защиты информации в компьютерных системах и сетях. К: "Век". 1999.- 112 с.
В.П. Широчин, В.Е. Мухин . Формализация и целевая адаптация средств аутентификации в компьютерных сетях. Управляющие системы и машины. Тематический выпуск: Интеллектуальные и корпоративные сети. N 5/6, 2000. с. 59-65.
Downloads
Published
How to Cite
Issue
Section
License
International Journal of Computing is an open access journal. Authors who publish with this journal agree to the following terms:• Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
• Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
• Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.