Abstract
In this paper we propose a method of ensuring network information security by controlling network connections using metadata. The metadata contains information about admissible task interactions and application locations in a corporate network.
Metadata is formed based on a mathematical model of an information technology. Information technology models are represented in the form of directed acyclic graphs. This paper describes hierarchical decompositions of directed acyclic graphs. Hierarchical decomposition makes it possible to optimally form blocks of information transformations for their placement on hosts of distributed information and computing system (DICS). Protocols of metadata usage are briefly discussed. The problem of transforming directed acyclic graphs into metadata is solved. Security risks introduced by user interaction with information technology process are considered.
Partially supported by Russian Foundsation for Basic Research (projects 18-29-03081, 18-07-00274).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Grusho, A.A., Timonina, E.E., Shorgin, S.Ya.: Modelling for ensuring information security of the distributed information systems. In: 31th European Conference on Modelling and Simulation Proceedings. Digitaldruck Pirrot GmbHP Dudweiler, Germany, pp. 656–660 (2017)
Grusho, A., Grusho, N., Zabezhailo, M., Zatsarinny, A., Timonina, E.: Information security of SDN on the basis of meta data. In: Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V., Szczypiorski, K. (eds.) MMM-ACNS 2017. LNCS, vol. 10446, pp. 339–347. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-65127-9_27
Samuylov, K.E., Chukarin, A.V., Yarkina, N.V.: Business Processes and Information Technologies in Management of the Telecommunication Companies. Alpina Publishers, Moscow (2009)
Tanayev, V.S., Shkurba, V.V.: Introduction to the Scheduling Theory. Science, Moscow (1975). (in Russian)
Fei, Y., Du, X., Jiang, C., Deng, R.: Directed acyclic task graph scheduling for heterogeneous computing systems by dynamic critical path duplication algorithm. J. Algorithms Comput. Technol. 3(2), 247–270 (2009)
Mao, Y., Zhong, H., Wang, L., Li, X.: Delay-bounded associated tasks scheduling based on hierarchical graph model in the cloud. Int. J. Hybrid Inf. Technol. 9, 367–386 (2016)
Behravan, A., Obermaisser, R., Basavegowda, D.H., Meckel, S.: Automatic model-based fault detection and diagnosis using diagnostic directed acyclic graph for a demand-controlled ventilation and heating system in Simulink. In: 2018 Annual IEEE International Systems Conference (SysCon), pp. 1–7 (2018)
Williams, T.C., Bach, C.C., Matthiesen, N.B., Henriksen, T.B., Gagliardi, L.: Directed acyclic graphs: a tool for causal studies in pediatrics. Pediatric Res. 84, 487–493 (2018)
Balmas, F.: Displaying dependence graphs: a hierarchical approach. In: Proceedings Eighth Working Conference on Reverse Engineering, pp. 261–270 (2001)
Grusho, A., Grusho, N., Timonina, E.: Information flow control on the basis of meta data. In: Vishnevskiy, V.M., Samouylov, K.E., Kozyrev, D.V. (eds.) DCCN 2019. LNCS, vol. 11965, pp. 548–562. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-36614-8_42
Grusho, A.A., Timonina, E.E., Shorgin, S.Ya.: Hierarchical method of meta data generation for control of network connections. J. Inform. Primen. 12(2), 44–49 (2018). (Russian)
TCSEC. Department of Defense Trusted Computer System Evaluation Criteria. DoD (1985)
Grusho, N.A., Senchilo, V.V.: Modeling of secure architecture of distributed information systems on the basis of integrated virtualization. J. Syst. Means Inf. 28(1), 110–122 (2018). (Russian)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Grusho, A., Grusho, N., Zabezhailo, M., Timonina, E. (2020). Generation of Metadata for Network Control. In: Vishnevskiy, V.M., Samouylov, K.E., Kozyrev, D.V. (eds) Distributed Computer and Communication Networks. DCCN 2020. Lecture Notes in Computer Science(), vol 12563. Springer, Cham. https://doi.org/10.1007/978-3-030-66471-8_55
Download citation
DOI: https://doi.org/10.1007/978-3-030-66471-8_55
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-66470-1
Online ISBN: 978-3-030-66471-8
eBook Packages: Computer ScienceComputer Science (R0)