10.14489/vkit.2022.05.pp.049-057 |
DOI: 10.14489/vkit.2022.05.pp.049-057 Соколовский С. П. Аннотация. Приведено оригинальное решение задачи определения оптимальных параметров информационной системы, функционирующей в условиях конфигурирования параметров передачи данных для защиты от сетевой разведки. При этом задача сформулирована как задача векторной параметрической оптимизации и сведена к скалярной оптимизации методом главного критерия. Исходя из соображений обеспечения устойчивости информационного обмена между узлами, в качестве ограничений в решаемой задаче заданы требования по минимальному использованию ресурсного запаса информационной системы, а также заданы возможности средств сетевой разведки и требования к робастности системы. Для решения оптимизационной задачи применяется алгоритм имитации отжига, обеспечивающий приближенный поиск глобального экстремума. Приведена графическая интерпретация полученных результатов. Ключевые слова: сетевая разведка; сервис передачи данных; оптимизация; алгоритм имитации отжига; проактивная защита.
Sokolovsky S. P. Abstract. The analysis of the FTP protocol revealed a number of vulnerabilities in it, which can be used by an adversary to uncover the IDs of data transfer service clients and compromise the used network security features. On the one hand, it is due to the possibility of repeated authorization attempts to unauthorized clients, allowing to implement a data transfer service username and password. On the other hand, the implementation of reactive measures of protection, which consists in breaking the control connection to the adversary after a number of unsuccessful authorization attempts, forcing him to change the strategy of exposure. In this regard, the use of proactive protection measures, allowing to increase the time of dialog interaction with the intruder and imposing restrictions on computing and temporal resources used by the intruder, is proposed as a countermeasure to the network reconnaissance tools. The essence of proactive protection measures consists in splitting the response of FTP server to unauthorized client commands into fragments and sending those fragments to the intruder after a specified delay time. Application of proactive protection gives the security system of information system a number of advantages over the intruder in using the time resource, allowing to implement additional protection measures. The problematic issues when implementing proactive protection measures for data transmission service of information systems are, firstly, the need to send fragments of response to the intruder at intervals shorter than the timeout time of waiting for these responses, set by the intruder. Secondly, the possibility of sending to the violator the limited number of fragments of response, that is caused by FTP protocol capabilities, regulating the size of response, as well as the excessive saturation of the communication channel by fragments of messages, that can lead to exhaustion of the resource opportunities of data transmission medium. Therefore, there is a need to find the optimal parameters of the information system in the configuration of data transmission parameters in the interaction with the network reconnaissance tools. The process of information system՚s data transmission service functioning under the influence of network reconnaissance tools is formalized in the form of a Markov random process with discrete states and continuous time. Intensities of streams of events, under which the system passes from state to state, are the input data for solving the task of finding the optimal parameters of the information system for the situation under consideration. The qualitative formulation of the task of determining the optimal parameters of the information system is formulated as follows: using a given mathematical model of the information system՚s data transmission service under conditions of network reconnaissance we should find such a set of parameters of information system՚s functioning, in which the maximum efficiency of its protection while ensuring a given level of availability is provided. The problem under consideration is a vector (multi-criteria) parametric optimization problem, which will be reduced to single-criteria (scalar) optimization by constraint method (main criterion). Main criterion method implies selection of one scalar target function and transfer of other target functions into additional restriction functions. As the constraints for solving the optimization problem set resource constraints, characterized by the coefficient of the transmission medium, as well as the condition of a given level of robustness of the information system, characterized by the number of conditionality of the matrix of the intensity of the flow of events. The research applies a nonlinear optimization algorithm, an annealing simulation algorithm that provides the ability to approximate the search for a global extremum. The results obtained during the study are presented in the form of an assortment of graphic dependences of changes in the optimal parameters of the information system on the intensity of the impact of network reconnaissance means and the imposed constraints. Keywords: Network reconnaissance; Datacom service; Optimization; Annealing simulation algorithm; Proactive defense.
РусС. П. Соколовский (Краснодарское высшее военное орденов Жукова и Октябрьской революции Краснознаменное училище имени генерала армии С. М. Штеменко, Краснодар, Россия) E-mail: Этот e-mail адрес защищен от спам-ботов, для его просмотра у Вас должен быть включен Javascript EngS. P. Sokolovsky (Krasnodar Higher Military Awarded by the Orders of Zhukov and October Revolution and the Red Banner School named after the General of the Army S. M. Shtemenko, Krasnodar, Russia) E-mail: Этот e-mail адрес защищен от спам-ботов, для его просмотра у Вас должен быть включен Javascript
Рус1. Postel J., Reynolds J. Request for Comments: 959. File Transfer Protocol (FTP) [Электронный ресурс]. 1985. URL: https://tools.ietf. org/html/rfc959 (дата обращения: 04.09.2021). Eng1. Request for Comments: 959. File Transfer Protocol (FTP). (1985). Available at: https://tools.ietf.org/html/rfc959 (Accessed: 04.09.2021).
РусСтатью можно приобрести в электронном виде (PDF формат). Стоимость статьи 500 руб. (в том числе НДС 18%). После оформления заказа, в течение нескольких дней, на указанный вами e-mail придут счет и квитанция для оплаты в банке. После поступления денег на счет издательства, вам будет выслан электронный вариант статьи. Для заказа скопируйте doi статьи: 10.14489/vkit.2022.05.pp.049-057 Отправляя форму вы даете согласие на обработку персональных данных. .
EngThis article is available in electronic format (PDF). The cost of a single article is 450 rubles. (including VAT 18%). After you place an order within a few days, you will receive following documents to your specified e-mail: account on payment and receipt to pay in the bank. After depositing your payment on our bank account we send you file of the article by e-mail. To order articles please copy the article doi: 10.14489/vkit.2022.05.pp.049-057 and fill out the
.
|