Preview

Dependability

Advanced search

Method for risk evaluation of functional instability of hardware and software systems under external information technology interference

https://doi.org/10.21683/1729-2646-2017-17-1-32-39

Abstract

The aim of the article is to develop a method that would allow for a quantitative evaluation of stability risks of hardware and software systems under simulated information technology interference and simulation of real management process cycle. The article shows the relevance and importance of the methods for risk evaluation of hardware and software systems stability in the context of targeted and coordinated information technology interference. Information technology interference is understood as targeted and coordinated hardware and software, as well as software actions aimed at temporary disruption of operation or logical defeat of hardware and software systems. Successful information technology interference is conditioned by the presence of vulnerabilities in the hardware and software systems that include IP and MAC addresses and communication equipment ports available to the intruder. The method presented in the article is based on the following: risk evaluation is performed using a test bed or active facilities with the involvement of respectively a fixed and portable information technology measures simulation system. The risk of destabilization of hardware and software systems is evaluated experimentally as the combination of frequency and consequences of successful information technology interference. The preliminary risk evaluation allows choosing the solution for information protection in order to eliminate potential vulnerabilities. The residual risk is evaluated based on the ability of hardware and software systems to eliminate the consequences of information technology interference through various inbuilt resilience features. The research resulted in the proposed method of evaluation hardware and software system security risks under information technology interference as a logical sequence of steps: risk analysis of information technology interference; identification of vulnerabilities, simulation of system operation processes under information technology interference at the trial facility; selection of the best information protection and system fault tolerance facilities; preliminary an final evaluation of system stability risks. As part of the method, probability and temporal indicators of hardware and software systems stability risk evaluation were developed that enable analysis of recovery from threats of combined information technology interference, selection of rational information protection and fault tolerance measures. As part of the method, it is proposed to use a cubic analysis scheme of elimination of vulnerabilities of critical elements of hardware and software systems that allows identifying the levels of tolerable risk and levels of reference model of interaction of open systems required for elimination of vulnerability subject to the frequency of information technology interference. Additionally, a certificate of evaluation of stability risks of hardware and software systems subject to the frequency of successful interferences was developed. In the conclusion it is noted that the developed method allows using the knowledge regarding potential vulnerabilities and experimental studies to identify the probabilistic values of security risks in order to determine the most hazardous threats and adoption of respective information protection measures.

About the Authors

S. G. Antonov
4th Central Research and Design Institute of the Ministry of Defence of Russia
Russian Federation

Head of unit, 4th Central Research and Design Institute of the Ministry of Defence of Russia. 38/2 M.K. Tikhonravova Str., app. 176, 141092 mkr. Yubileyny, Korolyov, Moscow Oblast, Russia, phone: +7 (916) 788-57-92



S. M. Klimov
4th Central Research and Design Institute of the Ministry of Defence of Russia
Russian Federation

Doctor of Engineering, Professor, Head of Division, 4th Central Research and Design Institute of the Ministry of Defence of Russia. 12 B. Komitetskaya Str., app. 105, 141092 mkr. Yubileyny, Korolyov, Moscow Oblast, Russia, phone: +7 (985) 928-13-55



References

1. Klimov SM, Astrakhov АV, Sychiov МP. Tekhnologicheskiye osnovy protivodeystvia kompiuternim atakam. Elektronnoe ouchebnoe izdanie [Basic processes of computer attack reaction. Electronic study guide]. Moscow: Bauman MSTU; 2013. Russian.

2. Klimov SM., Astrakhov АV, Sychiov МP. Metodicheskie osnovy protivodeystvia kompiuternim atakam. Elektronnoe ouchebnoe izdanie [Basic methods of computer attack reaction. Electronic study guide]. Moscow, Bauman MSTU; 2013. Russian.

3. Klimov SM, Astrakhov АV, Sychiov МP. Eksperimentalnaia otsenka protivodeystvia kompiuternim atakam. Elektronnoe ouchebnoe izdanie [Experimental evaluation of computer attack reaction. Electronic study guide]. Moscow: Bauman MSTU; 2013. Russian.

4. Ovchinsky VS. Novaya strategia kiberbezopasnosti SShA [The new US cyber security strategy]. Mezhdunarodny nauchno-analitichesky zhurnal Strategicheskie prioritety [Strategic Priorities International Scientific and Analytical Journal]. 2015; 4 (8): 41 – 48. Russian

5. Shubinsky IB. Strukturnaya nadiozhnost informatsionnykh system. Metody analiza [Structural dependability of information systems. Analysis methods]. Ulianovsk: Oblastnaya tipografia Pechatny dvor; 2012. Russian.

6. Shubinsky IB. Funktsionalnaia nadiozhnost informatsionnykh system. Metody analiza [Functional reliability of information systems. Analysis methods]. Ulianovsk: Oblastnaya tipografia Pechatny dvor; 2012. Russian.

7. Shubinsky IB. Nadiozhnie otkazoustoychivie informatsionnie systemi. Metodi sinteza [Dependable failsafe information systems. Synthesis methods]. Ulianovsk: Oblastnaya tipografia Pechatny dvor; 2016. Russian.


Review

For citations:


Antonov S.G., Klimov S.M. Method for risk evaluation of functional instability of hardware and software systems under external information technology interference. Dependability. 2017;17(1):32-39. https://doi.org/10.21683/1729-2646-2017-17-1-32-39

Views: 2558


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1729-2646 (Print)
ISSN 2500-3909 (Online)