ISSN 0021-3454 (print version)
ISSN 2500-0381 (online version)
Menu

11
Issue
vol 67 / November, 2024
Article

DOI 10.17586/0021-3454-2016-59-11-928-933

UDC 004.891.3

APPLICATION OF STOCHASTIC NETWORKS CONVERSION TECHNIQUE FOR SIMULATION OF MOBILE BANKING ATTACKS

I. B. Saenko
St. Petersburg Institute for Informatics and Automation of the RAS, Laboratory of Computer Security Problems; Professor


O. S. Lauta
Marshal S. M. Budyonny Military Academy of Telecommunications, Department of the Security of Information-Telecommunication Systems for Special Purposes;


I. V. Kotenko
St. Petersburg Institute for Informatics and Automation of Russian Academy of Sciences, Laboratory of Computer Security Problems ; Professor


Read the full article 

Abstract. An approach to modeling mobile banking attacks is proposed. The approach is based on stochastic network conversion technique providing a high speed of modeling, high reliability, and high sensitivity of results to change in initial data. Results of experimental assessment of the proposed method are presented to confirm efficiency of the developed approach.
Keywords: mobile security, attack modeling, mobile banking attack, stochastic networks, Laplace transform

References:
  1. Svajcer V. Launched at Mobile World Congress, SophosLabs, 2014.
  2. Dmitrenko A., Liebchen Ch., Rossow Ch., Sadeghi A.-R. Intel Technology Journal, 2014, no. 4(18), pp. 138–161.
  3. Privalov A.A. Metod topologicheskogo preobrazovaniya stokhasticheskikh setey i ego ispol'zovanie dlya analiza setey svyazi VMF (Method of Topological Transformations of Stochastic Networks and Its Application to the Analysis of Communication Networks of the Navy), St. Petersburg, 2000. (in Russ.)
  4. Ahuja S.P. 28th Annual Frontiers in Education: Conf. Proc. (FIE '98), 1998, no. 3, pp. 1085–1088.
  5. Kotenko I., Chechulin A. Proc. of the 5th IEEE Intern. Conf. on Cyber Conflict (CyCon), 2013, рp. 1–24.
  6. Kotenko I., Polubelova O., Saenko I. Proc. of 2012 IEEE Intern. Conf. on Green Computing and Communications, 2012, pp. 761–766.
  7. Goldman R.P. Proc. of the 5th Intern. Symp. (RAID 2002), 2002, pp. 199–218.
  8. Gorodetski V., Kotenko I. Lecture Notes in Computer Science, 2002, no. 2516, pp. 219–238.
  9. Dudorov D., Stupples D., Newby M. 2013 European Intelligence and Security Informatics Conf., 2013, pр. 38–44.
  10. Matlof N. From Algorithms to Z-Scores: Probabilistic and Statistical Modeling in Computer Science, htttp://heather.cs.ucdavis.edu/probstatbook.
  11. Zöhrer M., Pernkopf F. Advances in Neural Information Processing Systems, 2014, no. 27, pp. 2015–2023.
  12. Serfozo R.F. Applications of Mathematics, 1999, no. 44.