TESTING PROCESS FOR PENETRATION INTO COMPUTER SYSTEMS MATHEMATICAL MODEL MODIFICATION

Testing process for penetration into computer systems mathematical model was developed in the article. The proposed model differs from the known by computer systems specialized information platforms security testing capabilities, which made it possible to estimate the penetration test algorithm exec...

Full description

Bibliographic Details
Main Authors: Serhii Semenov, Cao Weilin
Format: Article
Language:English
Published: National Technical University "Kharkiv Polytechnic Institute" 2020-10-01
Series:Сучасні інформаційні системи
Subjects:
Online Access:http://ais.khpi.edu.ua/article/view/213337
id doaj-367e202a484e41dba03eef8681be463e
record_format Article
spelling doaj-367e202a484e41dba03eef8681be463e2021-05-26T21:14:33ZengNational Technical University "Kharkiv Polytechnic Institute"Сучасні інформаційні системи2522-90522020-10-014310.20998/2522-9052.2020.3.19TESTING PROCESS FOR PENETRATION INTO COMPUTER SYSTEMS MATHEMATICAL MODEL MODIFICATIONSerhii Semenov0Cao Weilin1National Technical University "Kharkiv Polytechnic Institute", KharkivNeijiang Normal University, NeijiangTesting process for penetration into computer systems mathematical model was developed in the article. The proposed model differs from the known by computer systems specialized information platforms security testing capabilities, which made it possible to estimate the penetration test algorithm execution time falling within a given interval probability. The proposed testing process for penetration into computer systems mathematical model was further developed (modified). Modified model distinctive feature is the Erlang distribution as the main one in the state transition processes mathematical formalization. This made it possible on the one hand to unify the mathematical model and present the testing process at a higher level of the testing hierarchy, on the other hand to simplify it 1.7 times. A security testing mathematical model was developed in order to estimate the simulation results accuracy, based on the known GERT-networks simplification and modification approach. Testing algorithms execution time value mathematical expectation values are obtained and estimated. Comparative modeling results investigations have shown the study values comparability for all three approaches of security testing process mathematical formalization. This confirmed the hypothesis that it is advisable to use a unified mathematical formalization approach, which was implemented in a penetration testing process modified mathematical model.http://ais.khpi.edu.ua/article/view/213337computer systemsSoftwaretestingmathematical model
collection DOAJ
language English
format Article
sources DOAJ
author Serhii Semenov
Cao Weilin
spellingShingle Serhii Semenov
Cao Weilin
TESTING PROCESS FOR PENETRATION INTO COMPUTER SYSTEMS MATHEMATICAL MODEL MODIFICATION
Сучасні інформаційні системи
computer systems
Software
testing
mathematical model
author_facet Serhii Semenov
Cao Weilin
author_sort Serhii Semenov
title TESTING PROCESS FOR PENETRATION INTO COMPUTER SYSTEMS MATHEMATICAL MODEL MODIFICATION
title_short TESTING PROCESS FOR PENETRATION INTO COMPUTER SYSTEMS MATHEMATICAL MODEL MODIFICATION
title_full TESTING PROCESS FOR PENETRATION INTO COMPUTER SYSTEMS MATHEMATICAL MODEL MODIFICATION
title_fullStr TESTING PROCESS FOR PENETRATION INTO COMPUTER SYSTEMS MATHEMATICAL MODEL MODIFICATION
title_full_unstemmed TESTING PROCESS FOR PENETRATION INTO COMPUTER SYSTEMS MATHEMATICAL MODEL MODIFICATION
title_sort testing process for penetration into computer systems mathematical model modification
publisher National Technical University "Kharkiv Polytechnic Institute"
series Сучасні інформаційні системи
issn 2522-9052
publishDate 2020-10-01
description Testing process for penetration into computer systems mathematical model was developed in the article. The proposed model differs from the known by computer systems specialized information platforms security testing capabilities, which made it possible to estimate the penetration test algorithm execution time falling within a given interval probability. The proposed testing process for penetration into computer systems mathematical model was further developed (modified). Modified model distinctive feature is the Erlang distribution as the main one in the state transition processes mathematical formalization. This made it possible on the one hand to unify the mathematical model and present the testing process at a higher level of the testing hierarchy, on the other hand to simplify it 1.7 times. A security testing mathematical model was developed in order to estimate the simulation results accuracy, based on the known GERT-networks simplification and modification approach. Testing algorithms execution time value mathematical expectation values are obtained and estimated. Comparative modeling results investigations have shown the study values comparability for all three approaches of security testing process mathematical formalization. This confirmed the hypothesis that it is advisable to use a unified mathematical formalization approach, which was implemented in a penetration testing process modified mathematical model.
topic computer systems
Software
testing
mathematical model
url http://ais.khpi.edu.ua/article/view/213337
work_keys_str_mv AT serhiisemenov testingprocessforpenetrationintocomputersystemsmathematicalmodelmodification
AT caoweilin testingprocessforpenetrationintocomputersystemsmathematicalmodelmodification
_version_ 1721426075451392000