The work is devoted to the problems of protecting the document management system of public administration bodies. The aim of the work is to build a simulation model of the implementation of a targeted computer attack, taking into account the simultaneous (occurring with a slight delay) response of the security tools of the document management system. For modeling, it is proposed to use the apparatus of Petri-Markov networks, combining the representation of the change of states of the attacked system in the form of Markov (semi-Markov) processes and the expressive capabilities of Petri nets to describe the interaction of processes. The constructed model reflects both the specifics of attacks with increased user privileges, and the features of document processing processes, as well as the mechanisms used to counteract unauthorized access. Computational experiments conducted using the constructed simulation model allow us to assess possible risks and make a decision on choosing the most effective system of protection against the considered type of attacks.
Keywords: electronic document management system, computer attack, simulation modeling, Petri-Markov network
The article deals with the problem of studying the functioning of the document management system under unauthorized influences, the relevance and practical significance of which is due to the peculiarity of the requirements for ensuring the protection of confidential information, and the significance of damage in case of disruption of the uninterrupted flow of documents circulating in the system. To model the processes of functioning of the electronic document management system, an approach based on the use of the apparatus of Petri-Markov networks is proposed, which allows taking into account the statistical nature of the processes of receipt of documents for processing and manifestations of impacts from intentional threats to information security. Within the framework of the proposed approach, a model of the functioning of the electronic document management system under the influence of ARP-spoofing attacks, which are a common type of threats to information systems in the public administration sphere, has been developed. At the same time, the options for the impact of threats in the absence of technical means of information protection and their application are considered. The constructed model can be used when conducting computational experiments to determine the most effective means of information protection of electronic document management systems.
Keywords: electronic document management system, unauthorized impact, simulation modeling, Petri-Markov networks