Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Monitoring the effectiveness of the use of means of protection in information protection systems. / Kolomoitcev, V. S.; Kolomoytseva, K. R.
2021 Wave Electronics and its Application in Information and Telecommunication Systems, WECONF 2021 : Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., 2021. 9470637.Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
}
TY - GEN
T1 - Monitoring the effectiveness of the use of means of protection in information protection systems
AU - Kolomoitcev, V. S.
AU - Kolomoytseva, K. R.
N1 - V. S. Kolomoitcev and K. R. Kolomoytseva, "Monitoring the Effectiveness of the Use of Means of Protection in Information Protection Systems," 2021 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF), 2021, pp. 1-5, doi: 10.1109/WECONF51603.2021.9470637.
PY - 2021/5/31
Y1 - 2021/5/31
N2 - The work is devoted to the study of methods for improving the quality of designing effective information protection systems. The paper proposes a method for monitoring the correct use of means of information protection available to the information protection system. To implement the method, an algorithm for calculating hash sums is used. A comparison of the performance of information protection systems using the proposed method and without it in the issue of introduced service delays for systems with phased servicing of incoming requests to the system is made. It is shown that the systems using this method are inferior in the introduced service delays. At the same time, it allows you to increase the degree of protection of the system from sophisticated information attacks by controlling the order of application of means of protection.
AB - The work is devoted to the study of methods for improving the quality of designing effective information protection systems. The paper proposes a method for monitoring the correct use of means of information protection available to the information protection system. To implement the method, an algorithm for calculating hash sums is used. A comparison of the performance of information protection systems using the proposed method and without it in the issue of introduced service delays for systems with phased servicing of incoming requests to the system is made. It is shown that the systems using this method are inferior in the introduced service delays. At the same time, it allows you to increase the degree of protection of the system from sophisticated information attacks by controlling the order of application of means of protection.
KW - Computer systems
KW - Information security
KW - Means of information protection
KW - Monitoring of operation
KW - Pattern of secure access
UR - http://www.scopus.com/inward/record.url?scp=85114122584&partnerID=8YFLogxK
U2 - 10.1109/WECONF51603.2021.9470637
DO - 10.1109/WECONF51603.2021.9470637
M3 - Conference contribution
AN - SCOPUS:85114122584
SN - 978-1-7281-7731-1
BT - 2021 Wave Electronics and its Application in Information and Telecommunication Systems, WECONF 2021
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2021 Wave Electronics and its Application in Information and Telecommunication Systems, WECONF 2021
Y2 - 31 May 2021 through 4 June 2021
ER -
ID: 99772112