Abstract
The tasks of ensuring the reliability and security of a software system, managing risk and organizing risks are important. The purpose of the developed software system was to identify, evaluate and neutralize the risks of information and automated systems. Ensuring the confidentiality of the information stored in the system, including historical data on errors and risks of the systems, plays an important role. Considering the importance of protecting this system from risks of information security, studies have been conducted using the method of protection from DDoS attacks and management of risks. Approaches are based on the adaptation of certain methods to assess the risks of software systems, help reduce risks by using risk mitigation and assessment strategies based on collected historical data on risk reduction. The study assembled a network of virtual machines. Machines performed various tasks. The first machine was a server analyzing the amount of incoming traffic. The second machine - served as the target server. The third machine performed the task of the attacker and it attacked the second machine. The main purpose of the article is to present the results of reducing information security risks, namely, distributed attacks on the developed software system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Boranbayev, S., Goranin, N., Nurusheva, A.: The methods and technologies of reliability and security of information systems and information and communication infrastructures. J. Theoret. Appl. Inf. Technol. 96(18), 6172–6188 (2018)
Boranbayev, A., Boranbayev, S., Nurusheva, A.: Development of a software system to ensure the reliability and fault tolerance in information systems based on expert estimates. Adv. Intell. Syst. Comput. 869, 924–935 (2018)
Grantham Lough, K., Stone, R.B., Tumer, I.: Prescribing and implementing the risk in early design (RED) method. In: Proceedings of DETC 2006, Number DETC2006-99374, Philadelphia, PA, September 2006
Grantham Lough, K., Stone, R.B., Tumer, I.: The risk in early design (RED) method: likelihood and consequence formulations. In: Proceedings of DETC 2006, Number DETC2006-99375, Philadelphia, PA, September 2006
Krus, D.A.: The risk mitigation strategy taxonomy and generated risk event effect neutralization method, Doctoral dissertations (2012)
Lough, K.G., Stone, R., Turner, I.: The risk in early design method. J. Eng. Des. 20(2), 155–173 (2009)
Boranbayev, A., Boranbayev, S., Yersakhanov, K., Nurusheva, A., Taberkhan, R.: Methods of ensuring the reliability and fault tolerance of information systems. In: 15th International Conference of Information Technology, Information Technology – New Generations, pp. 729–730 (2018)
Krus, D.A., Grantham Lough, K.: Risk due to function failure propagation. In: International Conference on Engineering Design, ICED 2007, pp. 787–788 (2007)
Krus, D.A., Grantham Lough, K.: Function-based failure propagation for conceptual design. In: Artificial Intelligence for Engineering Design, Analysis and Manufacturing, pp. 409–426. Cambridge University Press (2009)
Krus, D., Grantham, K.: Failure prevention through the cataloging of successful risk mitigation strategies. J. Fail. Anal. Prev. 13, 712–721 (2013)
Krus, D., Grantham, K.: Generated risk event effect neutralization: identifying and evaluating risk mitigation strategies during conceptual design. In: INCOSE 2012, Rome, pp. 1225–1237 (2012)
Raghavan, S., Dawson, E.: An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks: Critical Information Infrastructure Protection. Springer, Heidelberg (2011)
Boranbayev, A., Boranbayev, S., Nurusheva, A., Yersakhanov, K.: The modern state and the further development prospects of information security in the Republic of Kazakhstan. In: 15th International Conference of Information Technology, Information Technology – New Generations, pp. 33–38 (2018)
Boranbayev, A.S.: Defining methodologies for developing J2EE web-based information systems. J. Nonlin. Anal. Theory Methods Appl. 71(12), 1633–1637 (2009)
Boranbayev, A., Mazhitov, M., Kakhanov, Z.: Implementation of security systems for prevention of loss of information at organizations of higher education. In: Proceedings of the 12th International Conference on Information Technology: New Generations (ITNG 2015), 13–15 April 2015, Las Vegas, Nevada, USA, pp. 802–804 (2015)
Boranbayev, S., Boranbayev, A., Altayev, S., Seitkulov, Y.: Application of diversity method for reliability of cloud computing. In: Proceedings of the 2014 IEEE 8th International Conference on Application of Information and Communication Technologies-AICT2014, Astana, Kazakhstan, 15–17 October 2014, pp. 244–248 (2014)
Turskis, Z., Goranin, N., Nurusheva, A., Boranbayev, S.: A fuzzy WASPAS-based approach to determine critical information infrastructures of EU sustainable development. Sustainability (Switzerland) 11(2), 424 (2019)
Turskis, Z., Goranin, N., Nurusheva, A., Boranbayev, S.: Information security risk assessment in critical infrastructure: a hybrid MCDM approach. Informatica (Netherlands) 30(1), 187–211 (2019)
Boranbayev, A., Boranbayev, S., Nurusheva, A.: Analyzing methods of recognition, classification and development of a software system. Adv. Intell. Syst. Comput. 869, 690–702 (2018)
Boranbayev, A., Shuitenov, G., Boranbayev, S.: The method of data analysis from social networks using apache Hadoop. Adv. Intell. Syst. Comput. 558, 281–288 (2018)
Boranbayev, A., Boranbayev, S., Nurusheva, A., Yersakhanov, K.: Development of a software system to ensure the reliability and fault tolerance in information systems. J. Eng. Appl. Sci. 13(23), 10080–10085 (2018)
Boranbayev, S., Nurkas, A., Tulebayev, Y., Tashtai, B.: Method of processing big data. Adv. Intell. Syst. Comput. 738, 757–758 (2018)
Akhmetova, Z., Boranbayev, S., Zhuzbayev, S.: The visual representation of numerical solution for a non-stationary deformation in a solid body. Adv. Intell. Syst. Comput. 448, 473–482 (2016)
Boranbayev, S.N., Nurbekov, A.B.: Development of the methods and technologies for the information system designing and implementation. J. Theoret. Appl. Inf. Technol. 82(2), 212–220 (2015)
Hritonenko, N., Yatsenko, Y., Boranbayev, S.: Environmentally sustainable industrial modernization and resource consumption: is the Hotelling’s rule too steep? Appl. Math. Model. 39(15), 4365–4377 (2015)
Akhmetova, Z., Zhuzbayev, S., Boranbayev, S., Sarsenov, B.: Development of the system with component for the numerical calculation and visualization of non-stationary waves propagation in solids. Front. Artif. Intell. Appl. 293, 353–359 (2016)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Boranbayev, A., Boranbayev, S., Nurbekov, A. (2020). Estimation of the Degree of Reliability and Safety of Software Systems. In: Arai, K., Kapoor, S., Bhatia, R. (eds) Advances in Information and Communication. FICC 2020. Advances in Intelligent Systems and Computing, vol 1129. Springer, Cham. https://doi.org/10.1007/978-3-030-39445-5_54
Download citation
DOI: https://doi.org/10.1007/978-3-030-39445-5_54
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-39444-8
Online ISBN: 978-3-030-39445-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)