Exploration of the use of temporary computer system resources by anti-virus tools
The paper is devoted to the study of factors affecting the timeliness of response to the effects of malicious software. The analysis of anti-virus protection tools in computer systems is carried out. The analysis is based on expert assessments of protection measures against the effects of malicious...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2023-02-01
|
Series: | Безопасность информационных технологий |
Subjects: | |
Online Access: | https://bit.spels.ru/index.php/bit/article/view/1474 |
_version_ | 1797698266905706496 |
---|---|
author | Alexey V. Astrakhov Alexander N. Stadnik Kirill S. Skryl Ivan I. Korovin Elvira R. Bashaeva |
author_facet | Alexey V. Astrakhov Alexander N. Stadnik Kirill S. Skryl Ivan I. Korovin Elvira R. Bashaeva |
author_sort | Alexey V. Astrakhov |
collection | DOAJ |
description | The paper is devoted to the study of factors affecting the timeliness of response to the effects of malicious software. The analysis of anti-virus protection tools in computer systems is carried out. The analysis is based on expert assessments of protection measures against the effects of malicious software and expert assessment of the time parameters of anti-virus tools. The requirements for the time characteristics of anti-virus tools in the computer systems are defined and justified. The paper provides options for the formal presentation of characteristics for assessing the implementation of information processes in the computer systems and the timeliness of responding to the effects of the malicious software. The characteristics that clarify the model of information security threat in the computer systems are analyzed by taking into account the specifics of the use of the malicious software. The substantiation of mathematical abstraction for the formal representation of a sequence of random events associated with the implementation of the threat of the impact of the malicious software on the computer systems is given, analytical expressions are obtained to evaluate anti-virus protection measures and the actions of the violator to implement unauthorized access. Hypotheses are formulated and proved regarding the adequacy of the use of a temporary computer systems resource by antivirus tools. |
first_indexed | 2024-03-12T03:51:41Z |
format | Article |
id | doaj.art-8c592a8f954c403cb5d3efbf6b9be0c6 |
institution | Directory Open Access Journal |
issn | 2074-7128 2074-7136 |
language | English |
last_indexed | 2024-03-12T03:51:41Z |
publishDate | 2023-02-01 |
publisher | Joint Stock Company "Experimental Scientific and Production Association SPELS |
record_format | Article |
series | Безопасность информационных технологий |
spelling | doaj.art-8c592a8f954c403cb5d3efbf6b9be0c62023-09-03T12:19:28ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362023-02-01301708010.26583/bit.2023.1.051297Exploration of the use of temporary computer system resources by anti-virus toolsAlexey V. Astrakhov0Alexander N. Stadnik1Kirill S. Skryl2Ivan I. Korovin3Elvira R. Bashaeva4Moscow State Technical UniversityKrasnodar Higher Military School named after Army General S.M. ShtemenkoMoscow State Technical UniversityMoscow State Technical UniversityMoscow State Technical UniversityThe paper is devoted to the study of factors affecting the timeliness of response to the effects of malicious software. The analysis of anti-virus protection tools in computer systems is carried out. The analysis is based on expert assessments of protection measures against the effects of malicious software and expert assessment of the time parameters of anti-virus tools. The requirements for the time characteristics of anti-virus tools in the computer systems are defined and justified. The paper provides options for the formal presentation of characteristics for assessing the implementation of information processes in the computer systems and the timeliness of responding to the effects of the malicious software. The characteristics that clarify the model of information security threat in the computer systems are analyzed by taking into account the specifics of the use of the malicious software. The substantiation of mathematical abstraction for the formal representation of a sequence of random events associated with the implementation of the threat of the impact of the malicious software on the computer systems is given, analytical expressions are obtained to evaluate anti-virus protection measures and the actions of the violator to implement unauthorized access. Hypotheses are formulated and proved regarding the adequacy of the use of a temporary computer systems resource by antivirus tools.https://bit.spels.ru/index.php/bit/article/view/1474malicious software, computer system, antivirus tools, information protection, unauthorized access. |
spellingShingle | Alexey V. Astrakhov Alexander N. Stadnik Kirill S. Skryl Ivan I. Korovin Elvira R. Bashaeva Exploration of the use of temporary computer system resources by anti-virus tools Безопасность информационных технологий malicious software, computer system, antivirus tools, information protection, unauthorized access. |
title | Exploration of the use of temporary computer system resources by anti-virus tools |
title_full | Exploration of the use of temporary computer system resources by anti-virus tools |
title_fullStr | Exploration of the use of temporary computer system resources by anti-virus tools |
title_full_unstemmed | Exploration of the use of temporary computer system resources by anti-virus tools |
title_short | Exploration of the use of temporary computer system resources by anti-virus tools |
title_sort | exploration of the use of temporary computer system resources by anti virus tools |
topic | malicious software, computer system, antivirus tools, information protection, unauthorized access. |
url | https://bit.spels.ru/index.php/bit/article/view/1474 |
work_keys_str_mv | AT alexeyvastrakhov explorationoftheuseoftemporarycomputersystemresourcesbyantivirustools AT alexandernstadnik explorationoftheuseoftemporarycomputersystemresourcesbyantivirustools AT kirillsskryl explorationoftheuseoftemporarycomputersystemresourcesbyantivirustools AT ivanikorovin explorationoftheuseoftemporarycomputersystemresourcesbyantivirustools AT elvirarbashaeva explorationoftheuseoftemporarycomputersystemresourcesbyantivirustools |