Безопасность информационных технологий (Nov 2024)

Functional modeling of formalization malware implementation tactics

  • Igor I. Korchagin,
  • Ksenia E. Amelina,
  • Alexander N. Stadnik,
  • Anton O. Karetskiy,
  • Valeriy S. Antonov

DOI
https://doi.org/10.26583/bit.2024.4.05
Journal volume & issue
Vol. 31, no. 4
pp. 87 – 98

Abstract

Read online

This paper is devoted to illustrating the possibilities of using the methodological apparatus of functional modeling to solve the problem of formalized representation of threats of destructive impact of malicious software on the operating environment of an automated control system for special purposes. It examines an attacker's sequence of actions to compromise the confidentiality, integrity, and availability of information on these systems, using malicious code as a tool to destructively affect their operating environment to their operating environment with malicious code. The article presents the results of functional decomposition of the target function of the threat into its stages realized by the intruder - infiltration of malicious code into the operating environment of a special-purpose automated control system, its execution of destructive actions and concealment of traces of destructive impact. The tactics performed in this process are described, as well as the malware techniques used. A formalized representation of the multiple structure of the decomposition representation of the target function is given. Functional diagrams of the corresponding functional components are given in terms of the IDEF0 methodology. The prerequisites for the development of mathematical models in terms of the Markov process for determining the time characteristics of individual functional components and the objective function as a whole are substantiated. The developed functional model serves as a tool for assessing the ability of an intruder to implement such threats and damage to the object of control caused by information failures of the system. The purpose of this article is to illustrate the possibilities of achieving the required level of adequacy of mathematical models for studying the threats of the destructive impact of malicious objects on such systems.

Keywords