TY - GEN
T1 - Estimation of the Degree of Reliability and Safety of Software Systems
AU - Boranbayev, Askar
AU - Boranbayev, Seilkhan
AU - Nurbekov, Askar
N1 - Publisher Copyright:
© Springer Nature Switzerland AG 2020.
PY - 2020/1/1
Y1 - 2020/1/1
N2 - The tasks of ensuring the reliability and security of a software system, managing risk and organizing risks are important. The purpose of the developed software system was to identify, evaluate and neutralize the risks of information and automated systems. Ensuring the confidentiality of the information stored in the system, including historical data on errors and risks of the systems, plays an important role. Considering the importance of protecting this system from risks of information security, studies have been conducted using the method of protection from DDoS attacks and management of risks. Approaches are based on the adaptation of certain methods to assess the risks of software systems, help reduce risks by using risk mitigation and assessment strategies based on collected historical data on risk reduction. The study assembled a network of virtual machines. Machines performed various tasks. The first machine was a server analyzing the amount of incoming traffic. The second machine - served as the target server. The third machine performed the task of the attacker and it attacked the second machine. The main purpose of the article is to present the results of reducing information security risks, namely, distributed attacks on the developed software system.
AB - The tasks of ensuring the reliability and security of a software system, managing risk and organizing risks are important. The purpose of the developed software system was to identify, evaluate and neutralize the risks of information and automated systems. Ensuring the confidentiality of the information stored in the system, including historical data on errors and risks of the systems, plays an important role. Considering the importance of protecting this system from risks of information security, studies have been conducted using the method of protection from DDoS attacks and management of risks. Approaches are based on the adaptation of certain methods to assess the risks of software systems, help reduce risks by using risk mitigation and assessment strategies based on collected historical data on risk reduction. The study assembled a network of virtual machines. Machines performed various tasks. The first machine was a server analyzing the amount of incoming traffic. The second machine - served as the target server. The third machine performed the task of the attacker and it attacked the second machine. The main purpose of the article is to present the results of reducing information security risks, namely, distributed attacks on the developed software system.
KW - Distributed attack
KW - Method
KW - Reliability
KW - Risk
KW - Security
KW - Software system
UR - http://www.scopus.com/inward/record.url?scp=85081596104&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85081596104&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-39445-5_54
DO - 10.1007/978-3-030-39445-5_54
M3 - Conference contribution
AN - SCOPUS:85081596104
SN - 9783030394448
T3 - Advances in Intelligent Systems and Computing
SP - 743
EP - 755
BT - Advances in Information and Communication - Proceedings of the 2020 Future of Information and Communication Conference FICC
A2 - Arai, Kohei
A2 - Kapoor, Supriya
A2 - Bhatia, Rahul
PB - Springer
T2 - Future of Information and Communication Conference, FICC 2020
Y2 - 5 March 2020 through 6 March 2020
ER -