Prediction of Network Threats and Attacks by Mathematical Simulation

Authors

Keywords:

mathematical modeling, network threats, cyberattacks, information security, critical infrastructure, threat prediction

Abstract

Purpose. The purpose of the article is a comprehensive study of modern methods of mathematical modeling of network threats and attacks, as well as studying their effectiveness. Design / Method / Approach. The research uses mathematical methods such as probability theory, game theory, graph models, and statistical approaches to build models that allow to reproduce the dynamics of threats in real networks. The methodology is based on modeling various attack scenarios, affecting information security. Findings. The study showed that mathematical models do not allow analyzing complex network processes, predicting the emergence of new threats and identifying vulnerabilities in networks. Using these models makes it possible to create precise algorithms to prevent attacks, which in turn achieve the reliability and security of the network infrastructure. Theoretical Implications. The research contributes to the development of theoretical knowledge about the application of mathematical methods in cyber security, especially in the conditions of the constant expansion of network threats. The models presented in the work offer new ways of assessing risks and analyzing attacks. Practical Implications. The proposed approaches can be used by network administrators and cyber security specialists to develop effective strategies for protecting information systems. Mathematical modeling allows not only to analyze existing threats, but also to predict the emergence of new ones. Originality / Value. The article is distinguished by its originality due to the integration of various mathematical approaches in the study of network threats. This research provides a unique opportunity to gain a deeper understanding of the nature of cyberattacks, making it a valuable resource for security professionals. Research Limitations / Future Research. The study has a limitation related to the fact that the presented models apply only to certain types of network threats. In future research, it is advisable to extend these models for other forms of attacks and explore the possibilities of their integration into different systems. Article type. Review of Methods.

PURL: https://purl.org/cims/2403.021

Downloads

Download data is not yet available.

References

Горобець, В. І., Дубровін, В. І., & Твердохліб, Ю. В. (2023). Виявлення несанкціонованих дій та атак в мережах методом вейвлет-аналізу. Applied Questions of Mathematical Modeling, 5(1), 9–20. https://doi.org/10.32782/mathematical-modelling/2022-5-1-1

Коробейнікова, Т., & Цар, О. (2023). Аналіз сучасних відкритих систем виявлення та запобігання вторгнень. Grail of Science, 27, 317–325. https://doi.org/10.36074/grail-of-science.12.05.2023.050

Литвинов, В. В., Стоянов, Н., Скітер, І. С., Трунова, О. В., & Гребенник, А. Г. (2018). Аналіз систем та методів виявлення несанкціонованих вторгнень у комп’ютерні мережі. Математические машины и системы, (1), 31-40. http://dspace.nbuv.gov.ua/handle/123456789/132008

Мєшков, В. (2023). Аналіз систем інтелектуального моніторингу трафіку комп’ютерної мережі для систем виявлення атак. Information Technology: Computer Science, Software Engineering and Cyber Security, (1), 85-92. https://doi.org/10.32782/IT/2023-1-11

Петрик, Б. В., & Дубровін, В. І. (2023). Виявлення атак типу DOS в мережевому трафіку за допомогою вейвлет-перетворення. Applied Questions of Mathematical Modeling, 4(1), 186–196. https://doi.org/10.32782/kntu2618-0340/2021.4.1.20

Толюпа, С., Лукова-Чуйко, Н., & Шестяк, Я. (2021). Засоби виявлення кібернетичних атак на інформаційні системи. Information and Communication Technologies, Electronic Engineering, 1(2), 19–31. https://doi.org/10.23939/ictee2021.02.019

Хавер, А.В., Савченко, В. А. (2023). Математична модель захисту об’єкта критичної інфраструктури від троянських програм. Modern Information Security, 55(3), 12–21. https://doi.org/10.31673/2409-7292.2023.030002

Яценко, А. К., Дубровін, В. І., & Дейнега, Л. Ю. (2023). Аналіз трафіку програмно-визначених мереж за допомогою ентропії. Applied Questions of Mathematical Modeling, 5(1), 108–114. https://doi.org/10.32782/mathematical-modelling/2022-5-1-14

Downloads

Published

2024-11-26

Issue

Section

Information Technology and Cybersecurity

How to Cite

Doroshenko, D. (2024). Prediction of Network Threats and Attacks by Mathematical Simulation. Challenges and Issues of Modern Science, 3, 173–179. https://cims.fti.dp.ua/j/article/view/197

Share