Information system security evaluation and creation of survivability evaluation model

Lech Gulbinovič

Doctoral dissertation

Dissertations are not being sold



The dissertation investigates the information security. The main objects of research include information system security mechanisms, information system modeling methods, information system survivability and packet distribution in computer network. These are the objects important to obtain the main aim and create a information security systems simulation tool for computer system security level evaluation.

The paper approaches a few major tasks: information security modeling method selection, computer network statistical analysis, the information system survivability evaluation model creation and real information system security level evaluation characteristics.

The dissertation consists: Introduction, 4 chapters, Conclusions and References.

The introduction reveals the investigated problem, importance of the thesis and the object of research and describes the purpose and tasks of the paper, research methodology, scientific novelty, the practical significance of results examined in the paper and defended statements. The introduction ends in presenting the author’s publications on the subject of the defended dissertation, offering the material of made presentations in conferences and defining the structure of the dissertation.

Chapter 1 revises used literature. There are reviewed information system security mechanisms, network security modeling methods analysis and network statistic usage review. At the end of the chapter, conclusions are drawn and the tasks for the dissertation are reconsidered.

Chapter 2 provides the method, how collected information is used for statistics about network flows. There are provided computer network statistical analysis experiment results. From experiment the statistical packet time inter arrival distribution was determined.

Chapter 3 provides information system security modeling model. The model operation was checked. The government information system categories are described and they security evaluation were compared.

Chapter 4 provides a methodology how gather a statistical incident distribution from incident report. Distributions were used in model. The real information system security evaluation characteristics were obtained.

6 articles focusing on the subject of the discussed dissertation are published. 7 presentations on the subject have been given in conferences at national and international level.

Read electronic version of the book:


Book details

Data sheet

Imprint No:
145×205 mm
122 p.
16 other books in the same category:

Follow us on Facebook