RUS  ENG
Full version
JOURNALS // Informatika i Ee Primeneniya [Informatics and its Applications] // Archive

Inform. Primen., 2018 Volume 12, Issue 4, Pages 39–43 (Mi ia561)

This article is cited in 3 papers

Methods of identification of host capture in a distributed information system which is protected on the basis of meta data

A. A. Grusho, N. A. Grusho, M. V. Levykin, E. E. Timonina

Institute of Informatics Problems, Federal Research Center “Computer Sciences and Control” of the Russian Academy of Sciences, 44-2 Vavilov Str., Moscow 119133, Russian Federation

Abstract: The model of a distributed information system in which permissions on network connections are based on meta data is considered. Meta data are simplification of business process models. It is proved that the adversary of information security who captured a host and accurately attacked a system by means of changes of output data of tasks solved on this host cannot be detected at the level of meta data. The problem is connected with the fact that a business process model and, therefore, meta data operate with variables for which changes of specific values are not reflected in their description. Exceptions are output cases on forbidden values, for example, out of limits of definition ranges and a set of values of functions of which information technologies are constructed. Additional variants of information security measures which consider “invisibility” of similar violations of information security at the level of meta data are suggested.

Keywords: information security, information technologies, distributed information system, meta data, ban, threat of host capture.

Received: 24.09.2018

DOI: 10.14357/19922264180406



Bibliographic databases:


© Steklov Math. Inst. of RAS, 2024