MATHEMATICAL MODEL OF THE PHYSICAL PROCESS OF HACKING TECHNICAL PROTECTION OF INFORMATION
DOI:
https://doi.org/10.18372/2410-7840.23.16405Keywords:
technical protection of information, distribution of the probability of breaking, distribution of the maximum probability of breaking the security, Poisson distribution, distribution of the probability of possible breaking, real breaking process, direction line of projected breaking, line of direction of real breakingAbstract
This paper presents a mathematical model of the physical process of breaking technical information security (TIS). The mathematical model is based on the works of B. Zhurylenko, which use: the funding invested in protection, the coefficient of protection efficiency and the direction of hacking. The mathematical model was built taking into account the Poisson distribution used in the theory of queuing. The Poisson distribution allows us to take into account the probability of a particular attempt and its time of breaking information security. Studies have shown that, in the absence of funding for protection, the probability of breaking will be determined only by the Poisson distribution and the probability of breaking the applied protection. In the presence of funding for information protection, there are differences between the distributions of the probability and the maximum probability of hacking, with the distribution of the probability of hacking having a maximum value at a certain point, and the distribution of the maximum probabilities of hacking is exponential. In addition, these distributions have a highly directional character with the maximum probability value in the direction of the break line. The values of probabilities decrease with distance from the line of the burglary direction, increasing the burglary coordinates and time. If the real direction of hacking differs from the projected one, the probability of the maximum value of a possible hacking of the TIS changes. It is shown that in this case the probability of possible hacking decreases, since the area of intersecting surfaces of probabilities of real and possible hacking decreases. An expression has been introduced into the mathematical model of the physical process of breaking TIS, which determines the probability of breaking the alleged protection. Thus, as a result of the work performed, we obtained a mathematical model of the physical process of hacking TIS, which is described by the following parameters: the funding invested in the protection, the effectiveness of the funding invested in the protection, the direction of the hacking attempts and their intensity, the probability of a particular hacking attempt and the probability of hacking the alleged TIS.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).