СИСТЕМА АВТОМАТИЗОВАНОГО НАЛАШТУВАННЯ КОНФІГУРАЦІЇ БЕЗПЕКИ МЕРЕЖЕВОГО ОБЛАДНАННЯ

А. М. Капітон, О.В. Скакаліна, Д.О. Тищенко, Т.М. Франчук

Èlektron. model. 2023, 45(3):28-42

https://doi.org/10.15407/emodel.45.03.028

АНОТАЦІЯ

Запропоновано модель системи автоматизованого налаштування конфігурації безпеки мережевого обладнання. Для удосконалення налаштування конфігурації безпеки мере­же­вого обладнання проаналізовано сукупність існуючих загроз безпеки в інформаційно-комунікаційних мережах сучасності. Визначено, що із зростанням рівня впровадження інформаційних технологій у життя особистості, суспільства і держави зростає рівень небезпеки у кібернетичному просторі. Розглянуто загальні тенденції забезпечення кібер­безпеки на всіх рівнях. Систематизовано типи загроз для користувачів та розглянуто їх властивості. За результатами дослідження визначено, що хмарний підхід є найдоціль­ні­шим для розгортання інфраструктури. Розглянуто хмарні сервіси та визначено підходи до автоматизації розгортання інфраструктури, які надають можливість мінімізувати по­милки в конфігурації архітектури.

КЛЮЧОВІ СЛОВА:

інформаційні сервіси, інформаційно-комунікаційні мережи, пара­метри безпеки, конфігурації мережевих пристроїв, кібербезпека.

СПИСОК ЛІТЕРАТУРИ

  1. Bohush, V., Dovydkov, O. & Kryvutsa, V. (2010). Theoretical foundations of protected information technologies. DUIKT.
  2. Information and cyber security (2015).
  3. Buriachok, V., Korchenko, L. & Buriachok, O. (2012). Social engineering as a method of reconnaissance of information and telecommunication systems. Zakhyst informatsii, 4(57), pp. 5–12.
  4. Hryshchuk, R.& Danyk, Yu. (2016). Fundamentals of cyber security: a monograph.
  5. Haivoronskyi, M.& Novikov, O. (2009). Security of information and communication systems.
  6. Chumachenko, O. & Horbatiuk, S. (2018). A new model of an artificial neuron for building neural networks in the approximation problem. Mizhnarodna naukovo-praktychna konferentsiia «Informatsiini tekhnolohii ta kompiuterne modeliuvannia», pp. 296-299.
  7. Snigurov, A. & Chakryan, V. (2013). Approach of routing metrics formation based on information security risk. Experience of Designing and Application of CAD Systems in Microelectronics (CADSM). IEEE, pp. 339-340.
  8. Kraemer, S. & Carayon, P. (2017). Human errors and violations in computer and information security: The viewpoint of network administrators and security specialists. Applied Ergonomics., 38, 2, pp. 143-154.
  9. McCallister, E., Grance, T. & Scarfone, K. (2020). Guide to Protecting the Confidentiality of Personally Identifiable Information, PII, 59 p.
  10. Danylenko, D., Smirnov, O. & Meleshko, Ye. (2012). Research on methods of detecting intrusions into telecommunication systems and networks. Systemy ozbroiennia i viiskova tekhnika, 1, 92-100.
  11. Subach, I. (2014). Ways of improving cybernetic attack detection systems. Vseukr. nauk-prakt. konf. Aktualni problemy zabezpechennia informatsiinoi bezpeky derzhavy.
  12. Kazakova, N. (2010). Monitoring of information resources in protected information networks World of information and telecommunications. VII mizhnar. nauk.-tekhn. konf. studentstva ta molodi, 165-168.
  13. Baranov, A. (2016). POCO: ‘Perpetual’ operation of CO wireless sensor node with hybrid power supply. Sensors and Actuators, 112-121.
  14. Pavlysh, V.& Hlinenko, L. (2022). Basics of information technologies and systems: Study guide, BIKT.
  15. Liapandra, A. (2022). An approach to generalized evaluation of resources of programmable logic integrated circuits. Elektrotekhnichni ta kompiuterni systemy,7, pp. 92-96.
  16. Suhoniak, I. (2017). Model of the decision-making support system for optimal management of the life cycle of innovative enterprise projects. Seriia: tekhnichni nauky, 43 (4), 91-99.
  17. Tabunshchyk, H., Kudermetov, R. & Prytula, A. (2021). Design, modeling and analysis of information systems. Study guide.
  18. Dovhan, O. & Khlan, V. (2011). Cyberterrorism as a threat to information sovereignty of the state, Informatsiina bezpeka liudyny, suspilstva, derzhavy, 3 (7), 49–53.
  19. Stine, K., Kissel, R. & Barker, W. (2008). Volume I: Guide for Mapping Types of Information and Information Systems to Security Categories; Volume II: Appendices to Guide for Mapping Types of Information and Information Systems to Security Categories.
  20. Snegurov, A., Chakryan, V. & Mamedov. (2013). A The approach for selection of a routing metric in special-purpose wireless networks under the influence of radio-electronic investigation. Microwave and Telecommunication Technology (CriMiCo), 23rd International Crimean Conference, pp. 470-471.
  21. Lemeshko, A. (2017). Probabilistic-temporal model of QoS-routing with precomputation of routes under the terms of non-ideal reliability of telecommunication network. Telecommunications and Radio Engineering, 66, 13, pp. 1151-1166.

KAPITON Alla Myroslavivna, doctor of pedagogical sciences, professor of the department of computer and information technologies and systems of the National University “Yuri Kondratyuk Poltava Politechnics”. In 1998, she graduated from the Poltava State Pedagogical Institute named after V.G. Korolenko. The field of scientific research is information technology in education, informatization of the economy, ERP systems, algorithms and calculation methods, computer systems and networks. Development of information system using relevant search ISSN.

SKAKALINA Olena Viktorivna, candidate of technical sciences, associate professor of the department of computer and information technologies and systems of National University “Yuri Kondratyuk Poltava Politechnics". In 1978, she graduated from the Kharkiv Institute of Radio Electronics. Field of scientific research — genetic algorithms, knowledge engineering, software product management, parallel and distributed computing, elements of fuzzy set theory, GRID computing technologies.

TYSHCHENKO Dmytro Oleksandrovych, candidate of economic sciences, associate professor at the Department of Software Engineering and Cybersecurity of the State University of Trade and Economics. In 2005, he graduated from the Kyiv National Economic University; in 2010 he graduated from the Kyiv National University of Internal Affairs and the National Academy of Public Administration under the President of Ukraine, in 2021 he graduated from the Kyiv National University of Trade and Economics. The field of scientific research is computer architecture, cybersecurity, security of computer systems and networks, Web design, Web programming, information technologies, electronic document management at the enterprise, cyber security.

FRANCHUK Tamara Mykhailivna, candidate of economic sciences, senior lecturer at the Department of Software Engineering and Cybersecurity of the State University of Trade and Economics. In 2009, she graduated from the Kyiv National University of Trade and Economics; graduated from the National Academy of Internal Affairs in 2018; in 2021 she graduated from the Kyiv National University of Trade and Economics. The field of scientific research is electronic document management, Web-design, Web-programming, information technologies in education, electronic document management at the enterprise.

Повний текст: PDF