Detection of Weaknesses in Information Systems for Automatic Selection of Security Actions


Cite item

Full Text

Open Access Open Access
Restricted Access Access granted
Restricted Access Subscription Access

Abstract

The problem of automation of the process of detecting weaknesses in information systems based on the analysis of its vulnerabilities is solved. The input data used for the classification, the process of their preparation, and the classification results are described. The interpretation and analysis of the results are presented. The problem solved is a part of the approach proposed by the authors to automatic formation of a set of required security tools for a particular information system. A necessary set of security tools is determined by the set of possible threats.

About the authors

E. V. Doynikova

St. Petersburg Institute for Informatics and Automation, Russian Academy of Sciences

Author for correspondence.
Email: elenadoynikova@mail.ru
Russian Federation, St. Petersburg, 199178

A. V. Fedorchenko

St. Petersburg Institute for Informatics and Automation, Russian Academy of Sciences

Email: ivkote1@mail.ru
Russian Federation, St. Petersburg, 199178

I. V. Kotenko

St. Petersburg Institute for Informatics and Automation, Russian Academy of Sciences

Author for correspondence.
Email: ivkote1@mail.ru
Russian Federation, St. Petersburg, 199178

Supplementary files

Supplementary Files
Action
1. JATS XML

Copyright (c) 2019 Allerton Press, Inc.