Zubok V. Development of the Theory of Topology Security of Global Computer Networks against Cyber Attacks on Global Routing System

Українська версія

Thesis for the degree of Doctor of Science (DSc)

State registration number

0521U101085

Applicant for

Specialization

  • 05.13.05 - Комп'ютерні системи та компоненти

28-04-2021

Specialized Academic Board

Д 26.185.01

Institute of Problems of Modeling in Energy named after GE Pukhov of the National Academy of Sciences of Ukraine

Essay

The purpose of the thesis is to develop methods, models, techniques to increase the security of the topology of the Internet from attacks on the global routing system by improving interconnections based on a risk-base approach. The object of research is global routing. Subject is the process of forming a topology system of global Internet routing. Basic methods - systems analysis, discrete mathematics, combinatorics, graph theory, complex network theory, as well as methods of information security management. Scientific and practical results: - Introduced a new variant of representing the topological space of the Internet, formed by a global routing system on a plurality of connections between nodes, was proposed - A mathematical model of the Internet routing system is formulated, which describes the process of forming the topological space of a specific network prefix and the topological space of the Internet as a whole. - New metrics of network nodes are offered that reflect the components of the risk of interception of the route. - A risk-based model of the global routing system is proposed, which allows to and compare topologies by risks assessment. - The characteristics necessary for drawing up the model of the infringer and the model of threats which should be used for designing of system of management of safety of the information asset are received. - A method for assessing the security of the topology of communications of the subject of global routing, which is based on modern methods of information security management. - Implementation of results is confirmed by 4 acts.

Files

Similar theses