Безопасность информационных технологий (Jun 2024)

The methodology of functional modeling as a tool for formalizing the process of intercepting computer information through spurious electromagnetic radiation and interference

  • Aleksey A. Petlevanny,
  • Tatyana V. Meshcheryakova,
  • Aleksandr I. Boronenkov,
  • Vadim. I. Spivak,
  • Varvara A. Vladychenskaia

DOI
https://doi.org/10.26583/bit.2024.2.11
Journal volume & issue
Vol. 31, no. 2
pp. 159 – 171

Abstract

Read online

The article is devoted to the formalization of the process of unauthorized getting of computer information by intercepting informative signals of secondary electromagnetic radiation of the main technical means and systems by technical means of intelligence, as well as the removal informative guidance signals on the conductive lines of the main technical means by technical means of intelligence. Analyzing the completeness problem of the assessing information leakage threats due to the interception of informative signals of side electromagnetic radiation and leads, it must be stated that the procedure for identifying such threats is limited only to their detection by controlling only individual signs of manifestations of these threats. At the same time, the dynamics of the interception implementation process is not taken into account. This determines the need to solve the scientific problem of developing methodological foundations for the synthesis of algorithms for recognizing information leakage threats. The article presents the main stages of the procedure for formalizing the actions of the violator to intercept information. The basis for solving such problems is the procedure for forming the recognition feature space. In order to form such a space, functional modeling methods are used. The article presents a representation of the functional diagram in terms of the Markov process, as well as obtaining a mathematical expression to determine the average value of the time spent by the violator to achieve the target interception function.

Keywords