MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT USING PETRI NETS
Open Access
- 1 January 2022
- journal article
- Published by Borys Grinchenko Kyiv University in Cybersecurity: Education, Science, Technique
- Vol. 3 (15), 135-147
- https://doi.org/10.28925/2663-4023.2022.15.135147
Abstract
The article describes the conceptual model of adaptive management of cybersecurity of the information and educational environment of a modern university (IOSU). Petri nets are used as a mathematical apparatus to solve the problem of adaptive management of access rights of IOS users. A simulation model is proposed and modeling in PIPE v4.3.0 package is performed. The possibility of automating the procedures of user profile adjustment to minimize or neutralize cyber threats in IOS is shown. The model of distribution of tasks of the user in computer networks of IOSU is offered. The model, in contrast to the existing ones, is based on the mathematical apparatus of Petri nets and contains variables that reduce the power of the state space. The method of access control (ICPD) has been supplemented. The additions addressed aspects of the verification of access rights, which are required by the tasks and requirements of the security policy, the degree of coherence of tasks and allowed access to the IOSU nodes. Adjusting security rules and metrics for new tasks or reallocating tasks is described in Petri net notation.Keywords
This publication has 11 references indexed in Scilit:
- WEB-ORIENTED INFORMATION-EDUCATION ENVIRONMENT OF THE INSTITUTION OF GENERAL SECONDARY EDUCATIONInformation Technologies in Education, 2018
- Verification of Cloud Based Information Integration Architecture using Colored Petri NetsInternational Journal of Computer Network and Information Security, 2018
- A Graph Metric for Model Predictive Control of Petri NetsIFAC-PapersOnLine, 2018
- The optimal control of mine drainage systems based on hybrid Petri netsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2017
- Evaluating ISO 14441 privacy requirements on role based access control (RBAC) restrict mode via Colored Petri Nets (CPN) modelingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2017
- Development of a Support System for Managing the Cyber Security of Information and Communication Environment of TransportPublished by Springer Science and Business Media LLC ,2017
- Modeling cyber-physical attacks based on probabilistic colored Petri nets and mixed-strategy game theoryInternational Journal of Critical Infrastructure Protection, 2017
- Designing a decision support system for the weakly formalized problems in the provision of cybersecurityEastern-European Journal of Enterprise Technologies, 2017
- Development of adaptive expert system of information security using a procedure of clustering the attributes of anomalies and cyber attacksEastern-European Journal of Enterprise Technologies, 2016
- Prediction of DoS attacks in external communication for self-driving vehicles using a fuzzy petri net modelPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2016