Abstract:
The paper is intended to analyses of attack modeling problems in large computer networks using different models, methods and tools. Based on the characteristics of large networks as information security related objects and objects of attack, the famous models, as well as methods and tools for attack modelling are examined in detail and directions for further development are provided. The role of information security requirements in attack modeling iterations is shown. Examples of attack modeling problems associated with different types of NOT-factors are presented.