The functional model of stage access to a separate computer hardware in the process of a virus attack in computer systems
- Autores: Khvorov R.A.1, Skryl' K.S.2, Korchagin I.I.3, Amelina K.E.2, Gayfulin V.V.4, Savel'ev I.V.4
-
Afiliações:
- Military Training and Scientific Center of the Air Force “Air Force Academy named after Professor N.E. Zhukovsky and Yu.A. Gagarin”
- Bauman Moscow State Technical University (National Research University)
- Information Implementation Company JSC
- Krasnodar Higher Military School named after General of the Army S.M. Shtemenko
- Edição: Nº 3 (2025)
- Páginas: 74-85
- Seção: COMPUTER SCIENCE, COMPUTER ENGINEERING AND CONTROL
- URL: https://journals.rcsi.science/2072-3059/article/view/355054
- DOI: https://doi.org/10.21685/2072-3059-2025-3-5
- ID: 355054
Citar
Texto integral
Resumo
Background. Increasing the adequacy of mathematical models of the impact of malicious software (MS), used to substantiate the requirements for the characteristics and directions for improving the anti-virus mechanisms of computer systems (CS), can be achieved by using the methodological apparatus of functional modeling. The purpose of the studyis to substantiate a methodological apparatus for formalizing the threats of MS in order to construct adequate mathematical models for assessing the temporal characteristics of such threats. Materials and methods. The solution to the problem of constructing functional models in computer systems is based on the methodology of functional modeling, systems analysis and graph theory. Rusults. A procedure for constructing mathematical models of the temporal characteristics of threats of MS has been substantiated and implemented, including: a stage of detailing the objective function “Impact of MS”, a stage of establishing the order of execution of its functional components at each level of decomposition, a stage of forming the space of MS features, a stage of presenting the model in the form of graphs and a stage of forming analytical expressions for assessing the temporal characteristics of the threat. Conclusions. The adequacy of mathematical models of the temporal characteristics of threats of such impact, achieved through the functional decomposition of the objective function “Impact of MS”, allows for the validity of requirements for the directions of improvement of anti-virus mechanisms of the CS.
Sobre autores
Ruslan Khvorov
Military Training and Scientific Center of the Air Force “Air Force Academy named after Professor N.E. Zhukovsky and Yu.A. Gagarin”
Autor responsável pela correspondência
Email: khvoroff@rambler.ru
Candidate of engineering sciences, senior lecturer
(54 St. Bolshevikov street, Voronezh, Russia)Kirill Skryl'
Bauman Moscow State Technical University (National Research University)
Email: kskryl@bmstu.ru
Candidate of juridical sciences, associate professor, associate professor of the sub-department of Security in the Digital World
(5 Vtoraya Baumanskaya street, Moscow, Russia)Igor' Korchagin
Information Implementation Company JSC
Email: korchagin@ivk.ru
Head of the Information Security Group
(75 Butyrskaya street, Moscow, Russia)Kseniya Amelina
Bauman Moscow State Technical University (National Research University)
Email: amelina@bmstu.ru
Candidate of juridical sciences, associate professor, associate professor of the sub-department of Security in the Digital World
(5 Vtoraya Baumanskaya street, Moscow, Russia)Viktor Gayfulin
Krasnodar Higher Military School named after General of the Army S.M. Shtemenko
Email: gayfulin2007@yandex.ru
Candidate of engineering sciences, associate professor of the sub-department No. 34
(4 Krasina street, Krasnodar, Russia)Igor' Savel'ev
Krasnodar Higher Military School named after General of the Army S.M. Shtemenko
Email: kvvu@mil.ru
Candidate of engineering sciences, associate
professor of the sub-department No. 34
Bibliografia
- Mazin A.V., Gayfulin V.V. et al. Information theory as a methodological basis for solving problems of adequate assessment of capabilities to ensure information security. Izvestiya Instituta inzhenernoy fiziki = Proceedings of Institute of Engineering Physics. 2022;(2):64‒68. (In Russ.)
- Skryl' S.V., Khokhlov N.S. et al. Informatika: uchebnik dlya vysshikh uchebnykh zavedeniy MVD Rossii. Informatika: Kontseptual'nye osnovy = Computer science: a textbook for Higher Education Institutions of the Ministry of Internal Affairs of Russia. Computer science: conceptual foundations. Moscow: Maroseyka, 2008;1:464. (In Russ.)
- Kupriyanov A.I., Korobets B.N., Bardaev E.A., Korolev I.D. et al. Teoriya informatsii: uchebnik = Information theory: a textbook. Moscow: Izd. tsentr «Akademiya», 2020:240. (In Russ.)
- Khartli R. Transfer of information. Teoriya informatsii i ee prilozheniya: sb. perevodov = Information theory and its applications: a collection of translations. Moscow: Gos. izd. fiz.-mat. lit, 1959:5–35. (In Russ.)
- Skryl' S.V., Stadnik A.N., Kupin D.S., Domrachev D.V., Abacharaeva E.R. Functional modeling as a tool for formalizing threats of virus attacks on information resources of computer systems. Telekommunkatsii = Telecommunications. 2021;(4):14‒19. (In Russ.)
- Tikhonov V.I., Mironov M.A. Markovskie protsessy = Markov processes. Moscow: Sov. radio, 1977:488. (In Russ.)
- Kalyanov G.N. CASE: Strukturnyy sistemnyy analiz (avtomatizatsiya i primenenie) = CASE: Structural Systems Analysis (Automation and Application). Moscow: Lori, 1996:242. (In Russ.)
- Metodicheskiy dokument FSTEK Rossii «Metodika otsenki ugroz bezopasnosti informatsii ». Utverzhdena 5 fevralya 2021 goda = FSTEC of Russia’s Methodological Document “Methodology for Assessing Information Security Threats”. Approved on February 5, 2021. Moscow: FSTEK. 2021:83. (In Russ.)
- Metodologiya funktsional'nogo modelirovaniya IDEF0. Rukovodyashchiy document = IDEF0 Functional Modeling Methodology. Guidance Document. Moscow: Izd-vo standartov, 2000:75. (In Russ.)
- Korn G., Korn T. Spravochnik po matematike (dlya nauchnykh rabotnikov i inzhenerov) = Handbook of mathematics (for scientists and engineers). Moscow: Izd-vo Nauka, 1973:832. (In Russ.)
Arquivos suplementares

