Abstract
A confrontation between a security administrator and an intruder is presented as a conflict of information security. The formalization of the conflict with the use of Lefebvre’s algebra of conflicts is proposed. The effective behavior policies of the parties to the conflict in terms of protection have been analyzed. An approach to implementing these policies using deceptive systems has been suggested.
Similar content being viewed by others
References
Zegzhda, D.P. and Stepanova, T.V., The approach to solving the problem of security of industrial control systems from cyber threats, Probl. Inf. Bezop., Komp’yut. Sist., 2013, no. 4, pp. 32–39.
Eremeev, M.A., Gorbachev, I.E., Poterpeev, G.Yu, and Kravchuk, A.V., Concealment of information resources with the use of deceptive systems, Sbornik trudov konferentsii “Teoreticheskiye i prikladnyye problemy razvitiya i sovershenstvovaniya avtomatizirovannykh sistem upravleniya voyennogo naznacheniya” (Proc. Conf. Theoretical and Applied Problems of Development and Improvement of Automated Control Systems for Military Purposes), St. Petersburg, 2013, vol. 1, pp. 140–147.
Lefevr, V.A. and Smolyan, G.A., Algebra konfliktov (Algebra of Conflict), Moscow: URSS, 2011, 4th ed.
Kotenko, I.V. and Stepashkin, M.V., Deception systems for protection of information resources in computer networks, Tr. SPIIRAN, 2004, vol. 1, no. 2, pp. 211–230.
Davis, W.S. and Yen, D.C., The Information System Consultant’s Handbook. Systems Analysis and Design, CRC Press, 1998.
Author information
Authors and Affiliations
Corresponding author
Additional information
Original Russian Text © D.S. Lavrova, A.I. Pechenkin, 2015, published in Problemy Informatsionnoi Bezopasnosti. Komp’yuternye Sistemy.
About this article
Cite this article
Lavrova, D.S., Pechenkin, A.I. Adaptive reflexivity threat protection. Aut. Control Comp. Sci. 49, 727–734 (2015). https://doi.org/10.3103/S0146411615080106
Received:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411615080106