Development of a mathematical model for detecting software backdoors

Бесплатный доступ

This article analyzes software backdoors that can be used to illegally access information or collect confidential data. To detect such backdoors, various approaches were considered that make it possible to identify the presence of backdoors in the system. During the study, criteria were highlighted that allow assessing the effectiveness of various approaches to detecting software backdoors. These include detection accuracy, data processing speed, resistance to circumvention of protective measures and other factors. Currently, the protection of confidential information is the main task of companies, since its leakage entails irreparable damage to the company’s reputation, as well as financial losses. To ensure the protection of confidential information from unauthorized access to it, companies use a special set of measures, which includes technical, software, hardware and administrative measures to protect information. One of the ways to obtain confidential information is software backdoors that can enter the system in various ways. To identify backdoors at workplaces, special methods must be used. In general, this article represents an important contribution to the field of detection of software backdoors and can be used in the development of new methods of information protection.

Еще

Information security, backdoor, software backdoor, undeclared capabilities, software impact, technical protection of information

Короткий адрес: https://sciup.org/149142561

IDR: 149142561   |   DOI: 10.15688/NBIT.jvolsu.2023.1.3

Статья научная