Selection of the rational password generation method for the expected multiples

Бурячок, Володимир Леонідович and Платоненко, Артем Вадимович and Семко, Олексій Вікторович (2019) Selection of the rational password generation method for the expected multiples Безпека інформації, Том 25 (1). pp. 59-64. ISSN 2225-5036

[thumbnail of 13668-35570-1-PB.pdf]
Preview
Text
13668-35570-1-PB.pdf

Download (679kB) | Preview

Abstract

This article discusses the method of justification of the decision to improve the password policies in wireless communication systems. This method allows to provide deflection of wireless networks in the conditions of cybernetic attacks by choosing a rational way of generating passwords among the set of existing ones. The most expedient choice to improve the method of generating passwords, among the possible set, is based on the determination and evaluation of the proximity between the base method and each analogue method, which allows you to generate passwords for passwords policies and conducted in accordance with the general requirements and the set of characteristics appropriate methods. The procedure for choosing the most expedient way to improve the method of generating passwords among a set of possible ones, is based on a modified Saati hierarchy analysis method. In the absence of data on the requirements for a promising (complicated) method of generating passwords, similar characteristics of analogue methods are excluded from further consideration. Estimation of the proximity between the basic method and the analogue method taking into account the characteristics allows to obtain an assessment of the inconsistency of the description of the base method and each analogue method in terms of the coincidence of the list of their characteristics. In order to carry out improvement activities, the method is chosen from all possible pairs "Base method - method-analogue" from the population under study for which the coefficient of the integrated (generalized) estimation will be the largest. Thus, there is a way of generating random passwords based on the benefit coefficient and the indicator of an integrated generalized assessment of the proximity (distance) between the basic method of generat-ing passwords and each method analogue most rational for ensuring the functional security of wireless systems, due to the improve-ment of the password policies

Item Type: Article
Uncontrolled Keywords: information security; information security threats; wireless networks; unauthorized access network protection; protec-tion of mobile devices
Subjects: Це архівна тематика Київського університету імені Бориса Грінченка > Статті у наукометричних базах > Index Copernicus
Це архівна тематика Київського університету імені Бориса Грінченка > Статті у журналах > Наукові (входять до інших наукометричних баз, крім перерахованих, мають ISSN, DOI, індекс цитування)
Divisions: Це архівні підрозділи Київського університету імені Бориса Грінченка > Факультет інформаційних технологій та математики > Кафедра інформаційної та кібернетичної безпеки імені професора Володимира Бурячка
Depositing User: професор Володимир Леонідович Бурячок
Date Deposited: 03 Jun 2019 07:13
Last Modified: 03 Jun 2019 07:13
URI: https://elibrary.kubg.edu.ua/id/eprint/27565

Actions (login required)

View Item View Item