Безопасность информационных технологий (Sep 2024)

Stochastic methods of information security

  • Mikhail A. Ivanov

DOI
https://doi.org/10.26583/bit.2024.3.03
Journal volume & issue
Vol. 31, no. 3
pp. 83 – 93

Abstract

Read online

Computer systems (CS) security has become a very critical concern that needs the attention of researchers to ensure the information protection and cyber security. This article provides an overview of the state of the art in cyber security, challenges, and global trends of CS security. A promising direction in solving information security problems is the use of stochastic methods based on the use of pseudo-random number generators (PRNG), the result of which is the introduction of unpredictability into the operation of CS and their elements. Examples of using stochastic methods for protection and attack are considered. Examples of information security technologies based on the use of PRNG in the development of software and hardware are given. Attention is drawn to the emergence of new mechanisms for carrying out attacks on CS based on code reuse and, accordingly, new methods of protection against such attacks. The idea of creating a stochastic computer is substantiated, and presented the possible strategies and approaches.

Keywords