A Fault-tolerant Two-tier Pattern Of Secure Access 'Connecting Node'

Vladimir Kolomoitcev, Vladimir Bogatyrev
2017 Proceedings of the IV International research conference "Information technologies in Science, Management, Social sphere and Medicine" (ITSMSSM 2017)   unpublished
The purpose of this paper is to study a faulttolerant system of secure access to the corporate network and to select the options for allocating resources of the server for the system's information protection software that is installed on it, given that the conflicting requirements, arising in this case, are met. A two-tier pattern of access, including two groups of routers and a group of servers with the software that implements the functions of secure access to information, is proposed to be
more » ... is proposed to be the basis for designing the protection system. The considered technical solutions were analyzed for effectiveness using the mathematical model that was developed to estimate the average time of the request in the system, depending on the means of information protection involved. An example of calculating the average time of the request in the system, with two types of software for information protection (firewall and antivirus) installed on the server, was given. An example of calculating the degree of information security computing system, with different number of used software for information protection, was given too. Options for allocating resources of the server to ensure the operation of the existing bundle of software means for information security were examined and their effectiveness was assessed.
doi:10.2991/itsmssm-17.2017.56 fatcat:h2stcjrb6nchhe4bbobczj7bty