The Future of Education

Edition 14

Accepted Abstracts

Usage of Mathematical Models for Cybersecurity Analysis

Alexey Stefanov, South-West University "Neofit Rilski" (Bulgaria)

Iliyan Ivanov, South-West University "Neofit Rilski (Bulgaria)

Ivan Trenchev, South-West University "Neofit Rilski" - University of Library Studies and Information Technologies (Bulgaria)

Radoslav Stoev, University of Library Studies and Information Technologies (Bulgaria)

Miglena Trencheva, South-West University "Neofit Rilski" (Bulgaria)

Abstract

In the early 1990s, the word "hacker" was used to describe a very good programmer who could construct complex logic. Unfortunately, over time, the word "hacker" has acquired a negative meaning vastly due to the media. A hacker is described as someone who discovers new ways of "hacking" into a system, be it in a computer system, a programmable logic controller, someone who is able to break into banking systems, steal credit card information, and more. This is the general picture of a hacker built by the media, but it is not completely true because everything has a positive and a negative side. Network attacks are usually defined as intrusions into the network infrastructure, achieved by analyzing the network, gathering information about existing open ports or vulnerabilities and in some cases unauthorized access to resources. Computer security training is very important in today's dynamic world. In this report, we will briefly present the mathematical methods and approaches we use in teaching our students in the field of computer security. We will present several mathematical principles for network attack analysis. We will mainly use Game Theory of the Nash equilibrium. It will describe mathematical models of linear optimization and how they can predict or prevent a future attack. We will analyze penetration through random processes with discrete time.  We will use examples of game theory and operations research that will be adapted to cyber attacks. Training in computer security and protection against hacker attacks is very important at the University of Library Science and Information Technology and South- west University "Neofit Rilski". In this report we will describe practical ways to implement our training and the results we achieve.

Back to the list

REGISTER NOW

Reserved area


Media Partners:

Click BrownWalker Press logo for the International Academic and Industry Conference Event Calendar announcing scientific, academic and industry gatherings, online events, call for papers and journal articles
Pixel - Via Luigi Lanzi 12 - 50134 Firenze (FI) - VAT IT 05118710481
    Copyright © 2024 - All rights reserved

Privacy Policy

Webmaster: Pinzani.it