Prediction of Network Threats and Attacks by Mathematical Simulation
Keywords:
mathematical modeling, network threats, cyberattacks, information security, critical infrastructure, threat predictionAbstract
Purpose. The purpose of the article is a comprehensive study of modern methods of mathematical modeling of network threats and attacks, as well as studying their effectiveness. Design / Method / Approach. The research uses mathematical methods such as probability theory, game theory, graph models, and statistical approaches to build models that allow to reproduce the dynamics of threats in real networks. The methodology is based on modeling various attack scenarios, affecting information security. Findings. The study showed that mathematical models do not allow analyzing complex network processes, predicting the emergence of new threats and identifying vulnerabilities in networks. Using these models makes it possible to create precise algorithms to prevent attacks, which in turn achieve the reliability and security of the network infrastructure. Theoretical Implications. The research contributes to the development of theoretical knowledge about the application of mathematical methods in cyber security, especially in the conditions of the constant expansion of network threats. The models presented in the work offer new ways of assessing risks and analyzing attacks. Practical Implications. The proposed approaches can be used by network administrators and cyber security specialists to develop effective strategies for protecting information systems. Mathematical modeling allows not only to analyze existing threats, but also to predict the emergence of new ones. Originality / Value. The article is distinguished by its originality due to the integration of various mathematical approaches in the study of network threats. This research provides a unique opportunity to gain a deeper understanding of the nature of cyberattacks, making it a valuable resource for security professionals. Research Limitations / Future Research. The study has a limitation related to the fact that the presented models apply only to certain types of network threats. In future research, it is advisable to extend these models for other forms of attacks and explore the possibilities of their integration into different systems. Article type. Review of Methods.
Downloads
References
Горобець, В. І., Дубровін, В. І., & Твердохліб, Ю. В. (2023). Виявлення несанкціонованих дій та атак в мережах методом вейвлет-аналізу. Applied Questions of Mathematical Modeling, 5(1), 9–20. https://doi.org/10.32782/mathematical-modelling/2022-5-1-1
Коробейнікова, Т., & Цар, О. (2023). Аналіз сучасних відкритих систем виявлення та запобігання вторгнень. Grail of Science, 27, 317–325. https://doi.org/10.36074/grail-of-science.12.05.2023.050
Литвинов, В. В., Стоянов, Н., Скітер, І. С., Трунова, О. В., & Гребенник, А. Г. (2018). Аналіз систем та методів виявлення несанкціонованих вторгнень у комп’ютерні мережі. Математические машины и системы, (1), 31-40. http://dspace.nbuv.gov.ua/handle/123456789/132008
Мєшков, В. (2023). Аналіз систем інтелектуального моніторингу трафіку комп’ютерної мережі для систем виявлення атак. Information Technology: Computer Science, Software Engineering and Cyber Security, (1), 85-92. https://doi.org/10.32782/IT/2023-1-11
Петрик, Б. В., & Дубровін, В. І. (2023). Виявлення атак типу DOS в мережевому трафіку за допомогою вейвлет-перетворення. Applied Questions of Mathematical Modeling, 4(1), 186–196. https://doi.org/10.32782/kntu2618-0340/2021.4.1.20
Толюпа, С., Лукова-Чуйко, Н., & Шестяк, Я. (2021). Засоби виявлення кібернетичних атак на інформаційні системи. Information and Communication Technologies, Electronic Engineering, 1(2), 19–31. https://doi.org/10.23939/ictee2021.02.019
Хавер, А.В., Савченко, В. А. (2023). Математична модель захисту об’єкта критичної інфраструктури від троянських програм. Modern Information Security, 55(3), 12–21. https://doi.org/10.31673/2409-7292.2023.030002
Яценко, А. К., Дубровін, В. І., & Дейнега, Л. Ю. (2023). Аналіз трафіку програмно-визначених мереж за допомогою ентропії. Applied Questions of Mathematical Modeling, 5(1), 108–114. https://doi.org/10.32782/mathematical-modelling/2022-5-1-14
Downloads
Published
Issue
Section
License
Copyright (c) 2024 Daniil Doroshenko (Author)
This work is licensed under a Creative Commons Attribution 4.0 International License.
All articles published in the journal Challenges and Issues of Modern Science are licensed under the Creative Commons Attribution 4.0 International (CC BY) license. This means that you are free to:
- Share, copy, and redistribute the article in any medium or format
- Adapt, remix, transform, and build upon the article
as long as you provide appropriate credit to the original work, include the authors' names, article title, journal name, and indicate that the work is licensed under CC BY. Any use of the material should not imply endorsement by the authors or the journal.