THE EFFICIENCY ESTIMATION OF THE INTRUDER ATTACKS IN THE PROCESS OF HIS MODEL CREATION
Read the full article
The design of the security information system always has the stage of the intruder model creation. A well known approach is the usage of violator characteristics as the basis for estimation of his influence on the security system. The changing of the protected object behavior can be used for the estimation of the security violator actions.
Keywords: model, security, intruder, estimation, information