Preview

Issues of Risk Analysis

Advanced search
Open Access Open Access  Restricted Access Subscription or Fee Access

Risk Assessment Methodology for the Software Architecture under Development

EDN: ANXXUB

Abstract

The paper discusses Markov models of attacks on the information system, which are based on the interpretation of the threat of an attack by a parallel vulnerability backup scheme. These models are suitable for describing attacks on any information or physical systems and allow you to evaluate each attack step according to certain criteria. The article discusses this process for analyzing the information flows of a commercial bank, taking into account the types of attacks specific to this institution.

About the Authors

T. Y. Mogilnaya
Moscow State Linguistic University named after Maurice Thorez,
Russian Federation

Tatiana Y. Mogilnaya

Ostozhenka str., 38, bld. 1, Moscow, 119034



M. Y. Gorozheev
Moscow Aviation Institute (National Research University)
Russian Federation

Maxim Y. Gorozheev

Volokolamsk Highway, 4, Moscow, 125993



A. P. Chizhik
Moscow Aviation Institute (National Research University)
Russian Federation

Artyom P. Chizhik

Volokolamsk Highway, 4, Moscow, 125993



References

1. Badyukov V. F., Sych G. L. Software development risk classification and analysis // Bulletin of the Khabarovsk State University of Economics and Law. 2016;(3):9–16. (In Russ.)

2. Vasilyeva T.N., Lvova A.V. Using risk evaluation methods in information security management // Journal of Applied Informatics. 2009;(5):68–76. (In Russ.)

3. Shcheglov A. Yu. Mathematical models and methods of formal design of information systems protection systems: Textbook/A.Yu. Shcheglov, K.A. Shcheglov. St. Petersburg: ITMO University. 2015. 93 p. (In Russ.) — EDN ZUZBXP

4. Pleskunov M.A. Theory of mass service: Textbook for university students studying at the USN01.00.00 «Mathematics and Mechanics» / M.A. Pleskunov; Ministry of Science and Higher Education of the Russian Federation, Ural Federal University named after the first President of Russia B.N. Yeltsin. Yekaterinburg: Ural University Publishing House, 2022. 2022. 264 p. ISBN 978-5-7996-3539-8. (In Russ.) — EDN RSQUKA

5. Drobotun E. B. Theoretical foundations of building protection systems against computer attacks for automated control systems: monograph. St. Petersburg: High-tech technologies, 2017. 120 p. ISBN 978-5-9909412-2-9. (In Russ.)

6. Drobotun E. B., Tsvetkov O. V. Modeling information security threats in the automated control system for crucial objects on the basis of attack scenarios // Software & Systems. 2016;(3):42–50. (In Russ.). https://doi.org/10.15827/0236-235X.115.042-050

7. Anferov, V.N. Reliability of technical systems / V.N. Anferov, S.I. Vasiliev, S.M. Kuznetsov. MoscowBerlin: Direct Media, 2018. - 108 p. (In Russ.) ISBN 978-5-4475-9701-6. – EDN YNNRUD

8. Kofman A., Crewon R. Mass service. Theory and applications /trans. with French. V. Neimana/ M.: Mir. 1965. 302 p.

9. Saati T. Elements of queuing theory and its applications. M. Ed. «SOVIET RADIO,» 1965. 511 p. (In Russ.)

10. Methods and models of teletraffic theory / V.T. Eremenko, A.P. Fisun, I.A. Saitov [et al.. Oryol: Oryol State University named after I. S. Turgenev, 2019. 244 p. ISBN 978-5-9929-0650-9. (In Russ.) — EDN OJQMSU

11. Rosenko A.P. Markov Models of confidential information security assessment taking into account impact on the automated information system of internal threats // Bulletin of Stavropol State University. 2005;(43):34–40. (In Russ.)

12. Sokolov A.V., Shangin V.F. Information protection in distributed corporate networks and systems. M. DMK Press, 2002–656 p. (In Russ.)


Review

For citations:


Mogilnaya T.Y., Gorozheev M.Y., Chizhik A.P. Risk Assessment Methodology for the Software Architecture under Development. Issues of Risk Analysis. 2025;22(5):64-73. (In Russ.) EDN: ANXXUB

Views: 20


ISSN 1812-5220 (Print)
ISSN 2658-7882 (Online)