Development of Specialized Method for Increasing the Level of Security on Information and Communication Systems
Saparova Gaukhar1, Gulomov Sherzod2
1Saparova Gaukhar Information Security Department, Tashkent University of Information Technologies of Nukus branch named after Muhammad al-Khwarizmi, Nukus, Uzbekistan.
2Gulomov Sherzod Providing Information Security Department, Tashkent University of Information Technologies named after Muhammad al-Khwarizmi, Tashkent, Uzbekistan.
Manuscript received on November 13, 2019. | Revised Manuscript received on 24 November, 2019. | Manuscript published on December 10, 2019. | PP: 1821-1826 | Volume-9 Issue-2, December 2019. | Retrieval Number: B8110129219/2019©BEIESP | DOI: 10.35940/ijitee.B8110.129219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: This article proposes a method for increasing the level of security of a corporate network by its structure that meets the specified security requirements and distinguishes them from well-known attack type invariant structural units of the network – security domains. Hierarchy of security levels in the form of rings is represented allow more effectively protect a network that requires more security. The method allows to get output data only when the initial data allows to do this. In other words, if it is possible to improve the security level of a given network structure, then the method does this. A graph of the dependence of the security level on the ratio of the number of domains to the maximum number of objects in the domains is developed. A weighted domain allocation algorithm, which will increase the overall security on information and communication systems is proposed. For increasing the overall level of security, the splitting of the network into a larger number of security domains with as few services as possible is given. In accordance the weight of properties with modern data from the theory of information security vulnerability of a particular service is selected.
Keywords: Violation of the Security, Overlap, Allocation, Consolidation, Vulnerability, Domains, Border Protection, Communication lines.
Scope of the Article: Communication