3 research outputs found

    Development of Scenario Modeling of Conflict Tools in a Security System Based on Formal Grammars

    Full text link
    The results of the development of tools for scenario modeling based on formal grammars are presented. The works related to various ways of scenario description in their development systems are analyzed. For the natural language description of scenarios, it is indicated that this approach is sufficiently transparent and understandable for users. However, this approach has several disadvantages for formalizing and unifying scenario description. In particular, the presence of a number of ambiguities in the language makes it impossible for the description to be uniquely interpreted, and as a result, unsuitable for performing formal transformations on the description. The graphical representation of the script is a visual representation of the script. Moreover, the visual representation of the scenario in the form of some automaton model can be estimated as extremely attractive for subsequent multi-agent modeling of its execution. The disadvantage of such scenario description is still the difficulty of performing formal manipulations and the need to switch to a more convenient representation for manipulations. Using formal grammars to describe scenarios is a compromise approach that allows scripts to be described in an unambiguously interpreted form. The formal grammar description is also more familiar to computer language specialists. In addition, there are programs focused on working with formal grammars. The transition from the natural linguistic description of scenarios to its formal representation as a standard description in the Backus-Naura form is shown. The change in the presentation form was made using the example of description of the scenario of behavior of cyber-conflict participants in the security system. The resulting script description was used in the context-free grammar analyzer. The results showed the applicability of the proposed approach and the tools used to describe and verify the description correctness of scenarios related to any subject are

    Development of Scenario Modeling of Conflict Tools in a Security System Based on Formal Grammars

    Full text link
    The results of the development of tools for scenario modeling based on formal grammars are presented. The works related to various ways of scenario description in their development systems are analyzed. For the natural language description of scenarios, it is indicated that this approach is sufficiently transparent and understandable for users. However, this approach has several disadvantages for formalizing and unifying scenario description. In particular, the presence of a number of ambiguities in the language makes it impossible for the description to be uniquely interpreted, and as a result, unsuitable for performing formal transformations on the description. The graphical representation of the script is a visual representation of the script. Moreover, the visual representation of the scenario in the form of some automaton model can be estimated as extremely attractive for subsequent multi-agent modeling of its execution. The disadvantage of such scenario description is still the difficulty of performing formal manipulations and the need to switch to a more convenient representation for manipulations. Using formal grammars to describe scenarios is a compromise approach that allows scripts to be described in an unambiguously interpreted form. The formal grammar description is also more familiar to computer language specialists. In addition, there are programs focused on working with formal grammars. The transition from the natural linguistic description of scenarios to its formal representation as a standard description in the Backus-Naura form is shown. The change in the presentation form was made using the example of description of the scenario of behavior of cyber-conflict participants in the security system. The resulting script description was used in the context-free grammar analyzer. The results showed the applicability of the proposed approach and the tools used to describe and verify the description correctness of scenarios related to any subject are

    SYNERGY OF BUILDING CYBERSECURITY SYSTEMS

    Full text link
    The development of the modern world community is closely related to advances in computing resources and cyberspace. The formation and expansion of the range of services is based on the achievements of mankind in the field of high technologies. However, the rapid growth of computing resources, the emergence of a full-scale quantum computer tightens the requirements for security systems not only for information and communication systems, but also for cyber-physical systems and technologies. The methodological foundations of building security systems for critical infrastructure facilities based on modeling the processes of behavior of antagonistic agents in security systems are discussed in the first chapter. The concept of information security in social networks, based on mathematical models of data protection, taking into account the influence of specific parameters of the social network, the effects on the network are proposed in second chapter. The nonlinear relationships of the parameters of the defense system, attacks, social networks, as well as the influence of individual characteristics of users and the nature of the relationships between them, takes into account. In the third section, practical aspects of the methodology for constructing post-quantum algorithms for asymmetric McEliece and Niederreiter cryptosystems on algebraic codes (elliptic and modified elliptic codes), their mathematical models and practical algorithms are considered. Hybrid crypto-code constructions of McEliece and Niederreiter on defective codes are proposed. They can significantly reduce the energy costs for implementation, while ensuring the required level of cryptographic strength of the system as a whole. The concept of security of corporate information and educational systems based on the construction of an adaptive information security system is proposed
    corecore