Skip to main content
Log in

Adaptive reflexivity threat protection

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

A confrontation between a security administrator and an intruder is presented as a conflict of information security. The formalization of the conflict with the use of Lefebvre’s algebra of conflicts is proposed. The effective behavior policies of the parties to the conflict in terms of protection have been analyzed. An approach to implementing these policies using deceptive systems has been suggested.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Zegzhda, D.P. and Stepanova, T.V., The approach to solving the problem of security of industrial control systems from cyber threats, Probl. Inf. Bezop., Komp’yut. Sist., 2013, no. 4, pp. 32–39.

    Google Scholar 

  2. Eremeev, M.A., Gorbachev, I.E., Poterpeev, G.Yu, and Kravchuk, A.V., Concealment of information resources with the use of deceptive systems, Sbornik trudov konferentsii “Teoreticheskiye i prikladnyye problemy razvitiya i sovershenstvovaniya avtomatizirovannykh sistem upravleniya voyennogo naznacheniya” (Proc. Conf. Theoretical and Applied Problems of Development and Improvement of Automated Control Systems for Military Purposes), St. Petersburg, 2013, vol. 1, pp. 140–147.

    Google Scholar 

  3. Lefevr, V.A. and Smolyan, G.A., Algebra konfliktov (Algebra of Conflict), Moscow: URSS, 2011, 4th ed.

    Google Scholar 

  4. Kotenko, I.V. and Stepashkin, M.V., Deception systems for protection of information resources in computer networks, Tr. SPIIRAN, 2004, vol. 1, no. 2, pp. 211–230.

    Google Scholar 

  5. Davis, W.S. and Yen, D.C., The Information System Consultant’s Handbook. Systems Analysis and Design, CRC Press, 1998.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to D. S. Lavrova.

Additional information

Original Russian Text © D.S. Lavrova, A.I. Pechenkin, 2015, published in Problemy Informatsionnoi Bezopasnosti. Komp’yuternye Sistemy.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lavrova, D.S., Pechenkin, A.I. Adaptive reflexivity threat protection. Aut. Control Comp. Sci. 49, 727–734 (2015). https://doi.org/10.3103/S0146411615080106

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411615080106

Keywords

Navigation