catalog / TECHNICAL SCIENCES / Standardization and Certification
скачать файл:
- title:
- Левшун Дмитрий Сергеевич Модели, алгоритмы и методика проектирования защищенных от киберфизических атак систем физической безопасности на основе микроконтроллеров
- Альтернативное название:
- Левшун Дмитро Сергійович Моделі, алгоритми та методика проектування захищених від кіберфізичних атак систем фізичної безпеки на основі мікроконтролерів
- The year of defence:
- 2021
- brief description:
- Левшун Дмитрий Сергеевич Модели, алгоритмы и методика проектирования защищенных от киберфизических атак систем физической безопасности на основе микроконтроллеров
ОГЛАВЛЕНИЕ ДИССЕРТАЦИИ
кандидат наук Левшун Дмитрий Сергеевич
Table of contents
Реферат
Synopsis
Introduction
CHAPTER 1. Systematic analysis of the main issues of ensuring the information security of microcontroller-based systems
1.1 Main issues of ensuring the information security
1.1.1 Definition and classification of microcontroller-based systems
1.1.2 Analysis and classification of attackers
1.1.3 Analysis and classification of attack actions
1.1.4 Analysis and classification of methods and means of protection
1.2 Place and role of the design techniques
1.3 Features of the microcontroller-based physical security systems
1.4 Requirements for the design methodology
1.5 Research problem statement
1.6 Conclusions on Chapter
CHAPTER 2. Methods for the evaluation of the design methodology for microcontroller-based physical security systems
2.1 Main issues of ensuring the information security
2.2 Method for the evaluation of resource consumption
2.3 Method for the evaluation of validity
2.4 Conclusions on Chapter
CHAPTER 3. Extendable set-based hierarchical relational model of microcontroller-based physical security systems
3.1. Modeling of microcontroller-based physical security systems
3.2. Modeling of attackers, attack actions and security elements
3.3. Connections between models
3.4. Conclusions on Chapter
CHAPTER 4. Set of algorithms and methodology for the design of microcontroller-based physical security systems
4.1 Algorithm for the formation of requirements for the system
4.2 Algorithm for the formation of the system components composition
4.3 Algorithm for the design of the abstract model of the system
4.4 Algorithm for the design of the detailed model of the system
4.5 Methodology for the design of the system
4.6 Conclusions on Chapter
CHAPTER 5. Software implementation of the methodology for the design of microcontroller-based physical security systems
5.1 Architecture of the software implementation
5.2 Database of the software implementation
5.2.1 Storage of the attacker, attack actions and security elements
5.2.2 Storage of tasks, abilities and requirements
5.2.3 Storage of abstract elements, sub-elements and links
5.2.4 Storage of abstract elements, sub-elements and links
5.3 Script of the software implementation
5.4 Interface of the software implementation
5.5 Conclusions on Chapter
CHAPTER 6. Experimental evaluation of the methodology for the design of microcontroller-based physical security systems
6.1 Experiment description
6.1.1 Description of the system
6.1.2 Tasks, abilities and requirements of the system and its devices
6.1.3 Components composition of devices of the system
6.2 Application of the design methodology
6.2.1 Abstract model of the system
6.2.2 Detailed model of the system
6.3 Evaluation of the design methodology
6.3.1 Compliance with functional requirements
6.3.2 Compliance with non-functional requirements
6.3.2.1 Time consumption
6.3.2.2 Resource consumption
6.3.2.3 Validity
6.3.3 Dependencies between design time and parameters of attackers
6.4 Discussion
6.5 Conclusions on Chapter
Conclusion
List of abbreviations
Bibliography
List of graphic materials
Appendix A Modeling of the perimeter monitoring system
A1. Modeling of the server
A2. Modeling of charging stations
A3. Modeling of mobile robots
Appendix B Verification of mobile robots
B.1 Description of the input data
B.2 Description of experiments
Appendix C Extraction of vulnerabilities of devices
C.1 Extraction of CPE URIs
C.2 Extraction of CVE descriptions
Appendix D Acts of implementation
Appendix E Certificates of implementation
Appendix F Publications
- Стоимость доставки:
- 230.00 руб