Exploration of the use of temporary computer system resources by anti-virus tools

The paper is devoted to the study of factors affecting the timeliness of response to the effects of malicious software. The analysis of anti-virus protection tools in computer systems is carried out. The analysis is based on expert assessments of protection measures against the effects of malicious...

Full description

Bibliographic Details
Main Authors: Alexey V. Astrakhov, Alexander N. Stadnik, Kirill S. Skryl, Ivan I. Korovin, Elvira R. Bashaeva
Format: Article
Language:English
Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 2023-02-01
Series:Безопасность информационных технологий
Subjects:
Online Access:https://bit.spels.ru/index.php/bit/article/view/1474
_version_ 1797698266905706496
author Alexey V. Astrakhov
Alexander N. Stadnik
Kirill S. Skryl
Ivan I. Korovin
Elvira R. Bashaeva
author_facet Alexey V. Astrakhov
Alexander N. Stadnik
Kirill S. Skryl
Ivan I. Korovin
Elvira R. Bashaeva
author_sort Alexey V. Astrakhov
collection DOAJ
description The paper is devoted to the study of factors affecting the timeliness of response to the effects of malicious software. The analysis of anti-virus protection tools in computer systems is carried out. The analysis is based on expert assessments of protection measures against the effects of malicious software and expert assessment of the time parameters of anti-virus tools. The requirements for the time characteristics of anti-virus tools in the computer systems are defined and justified. The paper provides options for the formal presentation of characteristics for assessing the implementation of information processes in the computer systems and the timeliness of responding to the effects of the malicious software. The characteristics that clarify the model of information security threat in the computer systems are analyzed by taking into account the specifics of the use of the malicious software. The substantiation of mathematical abstraction for the formal representation of a sequence of random events associated with the implementation of the threat of the impact of the malicious software on the computer systems is given, analytical expressions are obtained to evaluate anti-virus protection measures and the actions of the violator to implement unauthorized access. Hypotheses are formulated and proved regarding the adequacy of the use of a temporary computer systems resource by antivirus tools.
first_indexed 2024-03-12T03:51:41Z
format Article
id doaj.art-8c592a8f954c403cb5d3efbf6b9be0c6
institution Directory Open Access Journal
issn 2074-7128
2074-7136
language English
last_indexed 2024-03-12T03:51:41Z
publishDate 2023-02-01
publisher Joint Stock Company "Experimental Scientific and Production Association SPELS
record_format Article
series Безопасность информационных технологий
spelling doaj.art-8c592a8f954c403cb5d3efbf6b9be0c62023-09-03T12:19:28ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362023-02-01301708010.26583/bit.2023.1.051297Exploration of the use of temporary computer system resources by anti-virus toolsAlexey V. Astrakhov0Alexander N. Stadnik1Kirill S. Skryl2Ivan I. Korovin3Elvira R. Bashaeva4Moscow State Technical UniversityKrasnodar Higher Military School named after Army General S.M. ShtemenkoMoscow State Technical UniversityMoscow State Technical UniversityMoscow State Technical UniversityThe paper is devoted to the study of factors affecting the timeliness of response to the effects of malicious software. The analysis of anti-virus protection tools in computer systems is carried out. The analysis is based on expert assessments of protection measures against the effects of malicious software and expert assessment of the time parameters of anti-virus tools. The requirements for the time characteristics of anti-virus tools in the computer systems are defined and justified. The paper provides options for the formal presentation of characteristics for assessing the implementation of information processes in the computer systems and the timeliness of responding to the effects of the malicious software. The characteristics that clarify the model of information security threat in the computer systems are analyzed by taking into account the specifics of the use of the malicious software. The substantiation of mathematical abstraction for the formal representation of a sequence of random events associated with the implementation of the threat of the impact of the malicious software on the computer systems is given, analytical expressions are obtained to evaluate anti-virus protection measures and the actions of the violator to implement unauthorized access. Hypotheses are formulated and proved regarding the adequacy of the use of a temporary computer systems resource by antivirus tools.https://bit.spels.ru/index.php/bit/article/view/1474malicious software, computer system, antivirus tools, information protection, unauthorized access.
spellingShingle Alexey V. Astrakhov
Alexander N. Stadnik
Kirill S. Skryl
Ivan I. Korovin
Elvira R. Bashaeva
Exploration of the use of temporary computer system resources by anti-virus tools
Безопасность информационных технологий
malicious software, computer system, antivirus tools, information protection, unauthorized access.
title Exploration of the use of temporary computer system resources by anti-virus tools
title_full Exploration of the use of temporary computer system resources by anti-virus tools
title_fullStr Exploration of the use of temporary computer system resources by anti-virus tools
title_full_unstemmed Exploration of the use of temporary computer system resources by anti-virus tools
title_short Exploration of the use of temporary computer system resources by anti-virus tools
title_sort exploration of the use of temporary computer system resources by anti virus tools
topic malicious software, computer system, antivirus tools, information protection, unauthorized access.
url https://bit.spels.ru/index.php/bit/article/view/1474
work_keys_str_mv AT alexeyvastrakhov explorationoftheuseoftemporarycomputersystemresourcesbyantivirustools
AT alexandernstadnik explorationoftheuseoftemporarycomputersystemresourcesbyantivirustools
AT kirillsskryl explorationoftheuseoftemporarycomputersystemresourcesbyantivirustools
AT ivanikorovin explorationoftheuseoftemporarycomputersystemresourcesbyantivirustools
AT elvirarbashaeva explorationoftheuseoftemporarycomputersystemresourcesbyantivirustools