Menu: Home :: go to Journal :: switch to Russian :: switch to English
You are here: all Journals and Issues→ Journal→ Issue→ Article

Use of fractals in the problems of information security

Annotation

The present study is devoted to the mathematical modeling of the process of information security in an information computer network of the organization by means of fractal computation. It is suggested to consider the security of every computer-assisted working place using the property set, which can be represented in a fractal form, and then, using the properties of self-similarity, project the obtained results onto the whole system of information security. The significant part of the work is devoted to the description of fractals properties. The use of three fractals is suggested, the first of which describes the possibility of the infliction of harm to information, the second - information security requirements and the third - system capabilities of information security in a data-processing network. The results of the modeling can be used in real systems of information security, which are symmetrical to the main elements. In the case of asymmetry it is necessary to take into account additional boundary conditions while changing from low-level to upper-level structures.

Keywords

fractals; topological dimension; computer network; system of information security

Full-text in one file

Download

UDC

004.9

Pages

599-604

Для корректной работы сайта используйте один из современных браузеров. Например, Firefox 55, Chrome 60 или более новые.