RUS  ENG
Full version
JOURNALS // Vestnik of Astrakhan State Technical University. Series: Management, Computer Sciences and Informatics // Archive

Vestn. Astrakhan State Technical Univ. Ser. Management, Computer Sciences and Informatics, 2014 Number 2, Pages 28–37 (Mi vagtu311)

This article is cited in 2 papers

COMPUTER SOFTWARE AND COMPUTING EQUIPMENT

The procedure of evaluation of indicators of malicious penetration in the structure of the automated monitoring system of physical security of the protected object

S. V. Belov, A. V. Melnikov

Astrakhan State Technical University

Abstract: This paper proposes to present a state of the physical security of an object in the form of an oriented weighted graph that displays the possible routes of malicious intrusion to the protected property values. On the basis of graphical representation the problems of estimating the average expected time to the nearest point of the possible penetration into the protection object and identifying the most vulnerable intruder routes to the protected values are solved. The suggested formalized methods of the analysis of the characteristics that describe the level of security allow more objectively and accurately assess the state of security at the protected facility. In particular, the algorithm of identification of the most vulnerable links and facilities that can implement effective options to improve the safety of the facility is developed. This algorithm is used as a separate unit within the automated control system security. The assessments of the moments of the most possible increase of malicious activity on the object of protection enable better protection to the object through the application of additional protective equipment at intervals of possible rise in malicious activity.

Keywords: physical security; object protection; penetration time; route penetration; automated control of the security system.

UDC: 654.9:004.7.056
BBK: 32.885:32.94-5

Received: 14.03.2014



© Steklov Math. Inst. of RAS, 2026