Digital Library NAES of Ukraine

Analysis of the results of simulative modelling of the information security system in the corporate networks of higher education institutions

- Gasimov, Vagif (orcid.org/0000-0003-3192-4225) and Ismailov, Balami (orcid.org/0009-0002-3013-9161) (2024) Analysis of the results of simulative modelling of the information security system in the corporate networks of higher education institutions Information Technologies and Learning Tools, 4 (102). pp. 211-223. ISSN 2076-8184

[thumbnail of Vagif Gasimov.pdf] Text
Vagif Gasimov.pdf - Published Version

Download (1MB)

Abstract

The analysis shows that the insufficient level of information security in service networks is the main cause of huge losses for enterprises. Despite the appearance of a number of works to solve this problem, there is currently no unified system for assessing information security. This shows that this problem has not yet been sufficiently studied and relevant. This work is one of the steps towards creating a system for assessing information security in service networks. The purpose of the work is to develop an algorithm and simulation model, analyze the results of the simulation model to determine the main characteristics of the information security system (ISS), providing the ability to completely close all possible channels of threats by controlling all unauthorized access (UA) requests through the protection mechanism (PM). To solve the problem, a simulation method was applied using the principles of queuing systems (QS). This method makes it possible to obtain the main characteristics of the ISS from the UA with an unlimited amount of buffer memory (BM). Models, an algorithm and a methodology for the development of ISS from UA are proposed, which is considered as a single-phase multi-channel QS with an unlimited volume of BM. The process of obtaining simulation results was implemented in the GPSS World modeling system and comparative analyzes of the main characteristics of the ISS were carried out for various laws of distribution of output parameters. At the same time, UA requests were the simplest flows, and the service time was subject to exponential, constant and Erlang distribution laws. Conducted experiments based on the proposed models and algorithm for analyzing the characteristics of the ISS from the UA as a single-phase multi-channel QS with unlimited waiting time for requests in the queue confirmed the expected results. The results obtained can be used to build new or modify existing ISS in corporate networks for servicing objects for various purposes. This work is one of the approaches to generalizing the problems under consideration for systems with an unlimited volume of BM. Prospects for further research include research and development of the principles of hardware and software implementation of ISS in service networks.

Item Type: Article
Keywords: unauthorized access (UA); information security systems (ISS); information security;queuing systems (QS); protection mechanism (PM); simulation modeling.
Subjects: Science and knowledge. Organization. Computer science. Information. Documentation. Librarianship. Institutions. Publications > 00 Prolegomena. Fundamentals of knowledge and culture. Propaedeutics > 004 Computer science and technology. Computing. Data processing > 004.4 Software > 004.49 Computer infections
Science and knowledge. Organization. Computer science. Information. Documentation. Librarianship. Institutions. Publications > 00 Prolegomena. Fundamentals of knowledge and culture. Propaedeutics > 004 Computer science and technology. Computing. Data processing > 004.7 Computer communication. Computer networks
Science and knowledge. Organization. Computer science. Information. Documentation. Librarianship. Institutions. Publications > 3 Social Sciences > 37 Education > 378 Higher education. Universities. Academic study
Divisions: Institute for Digitalisation of Education > Generic resouse
Depositing User: Алла 1 Алла Почтарьова
Date Deposited: 18 Dec 2024 17:32
Last Modified: 18 Dec 2024 17:32
URI: https://lib.iitta.gov.ua/id/eprint/743601

Downloads

Downloads per month over past year

Loading...

Actions (login required)

View Item View Item