This article describes an approach to using fuzzy logic methods and forming membership functions for criteria of connectivity between the significance of commands and the possibility of unauthorized access to its implementation. Relevant parameters for implementing unauthorized access through a vm or physical network to the hypervisor can be identified based on a specific set of commands, functions, instructions, procedures, utilities, or their parameters, as well as other information about software or hardware, knowledge of which allows the violator to implement each of the current threats of unauthorized access to the hypervisor. Therefore, to assess the relationship between the significance of commands for implementing unauthorized access through a vm to the hypervisor due to the presence of only qualitative evaluation parameters and the absence of their quantitative evaluations, this article offers an evaluation based on fuzzy logic methods implemented as membership functions in MATLAB.
hypervisor, virtual machine, thin client technology, access differentiation, fuzzy logic, quality indicators, MATLAB
1. Razrabotka imitacionnoy modeli sistemy zaschity informacii ot nesankcionirovannogo dostupa s ispol'zovaniem programmnoy sredy CPN TOOLS / O.I. Bokova, D.I. Korobkin, S.A. Kuharev, A.D. Popov // Bezopasnost' informacionnyh tehnologiy. - 2019. -T. 26, № 3. - S. 80-89.
2. Patent na poleznuyu model'. Ustroystvo vyyavleniya uyazvimostey / A.S. Markov, V.L. Cirlov, A.A. Fadin, D.F. Varin. - RU 168346 U1, 30.01.2017. - Zayavka № 2016125045 ot 23.06.2016.
3. Avezova, Ya.E. Voprosy obespecheniya doverennoy zagruzki v fizicheskih i virtual'nyh sredah / Ya.E. Avezova, A.A. Fadin // Voprosy kiberbezopasnosti. -2016. - №1(14). -S. 24-30.
4. Patent na poleznuyu model'. Ustroystvo vyyavleniya uyazvimostey v besprovodnyh setyah tipa Wi-Fi / A.S. Veryaev, V.V. Vylegzhanin, A.S. Markov, A.A. Ryazancev, A.A. Fadin, V.L. Cirlov. - RU 124102 U1, 10.01.2013. - Zayavka № 2012130036/08 ot 17.07.2012.
5. Barabanov, A.V. Ocenka vozmozhnosti vyyavleniya uyazvimostey programmnogo koda pri otsutstvii ishodnyh tekstov programm / A.V. Barabanov, A.S. Markov, A.A. Fadin // Informacionnoe protivodeystvie ugrozam terrorizma. Nauchno-prakticheskiy zhurnal. - 2009. -№ 13. - S. 106-109.
6. Barabanov, A.V. Ocenka vozmozhnosti vyyavleniya uyazvimostey programmnogo koda pri otsutstvii ishodnyh tekstov programm / A. V. Barabanov, A. S. Markov, A. A. Fadin // Informacionnoe protivodeystvie ugrozam terrorizma. Nauchno-prakticheskiy zhurnal. - 2011. -№ 16. - S. 86-89.
7. Matematicheskaya model' politiki bezopasnosti etalonnoy avtomatizirovannoy sistemy na osnove EMZAS-seti / A.S. Dubrovin, V.I. Sumin, M.V. Korotkov, A.Yu. Nemchenko // Voronezh: Vestnik VGU. Seriya: Fizika. Matematika. - 2005. - №2. - S. 147-155.
8. Lavlinskiy, V.V. Teoreticheskie predposylki resheniya problem formirovaniya modeley i metodov vzaimodeystviya informacionnyh processov / V.V. Lavlinskiy // Modelirovanie sistem i processov. - 2013. - № 2. - S. 30-36.
9. Lavlinskiy, V.V. Modelirovanie vzaimodeystviya sistem zaschity informacii vychislitel'nyh setey s vneshney sredoy / V.V. Lavlinskiy, Yu.S. Serbulov, D.V. Sysoev // Voronezh, 2004. - 273 s.
10. Lavlinskiy, V.V. Model' vyyavleniya zakonomernostey preodoleniya sredstv zaschity informacii / V.V. Lavlinskiy, V.V. Sysoev // Informacionnye tehnologii i vychislitel'nye sistemy. - 2001. - № 4. - S. 78-81.
11. Sistemy zaschity informacii i "proniknoveniya", ih vzaimodeystvie / V.V. Lavlinskiy, D.V. Sysoev, O.V. Churko, A.A. Micel' // Doklady Tomskogo gosudarstvennogo universiteta sistem upravleniya i radioelektroniki. - 2007. - № 2 (16). - S. 15-17.
12. Teoreticheskie osnovy matematicheskogo modelirovaniya dlya opisaniya celenapravlennyh sistem / V.V. Lavlinskiy, E.A. Rogozin, S.N. Yan'shin // Vestnik Voronezhskogo instituta MVD Rossii. - 2017. - № 2. - S. 143-153.
13. Lavlinskiy, V.V. Formirovanie modeley i metodov vzaimodeystviya informacionnyh processov / V.V. Lavlinskiy, O.G. Ivanova // Pribory i sistemy. Upravlenie, kontrol', diagnostika. - 2014. - № 5. - S. 39-50.
14. Lavlinskiy, V.V. Formirovanie modeley i metodov vzaimodeystviya informacionnyh processov / V.V. Lavlinskiy, O.G. Ivanova // Prikladnaya fizika i matematika. - 2015. - № 4. - S. 49-61.
15. Lavlinskiy, V.V. Matematicheskaya model' neyronnoy seti dlya opisaniya vzaimodeystviya informacionnyh potokov na primere dostupa k gipervizoru cherez virtual'nuyu mashinu / V.V. Lavlinskiy, A.A. Zmeev // Pribory i sistemy. Upravlenie, kontrol', diagnostika. - 2019. - № 4. - S. 47-55.