DEVELOPMENT OF A MATHEMATICAL MODEL FOR DETECTING SOFTWARE BACKDOORS
Egor A. Zhuikov
Assistant, Department of Information Security,
Volgograd State University
This email address is being protected from spambots. You need JavaScript enabled to view it.
Prosp. Universitetsky, 100, 400062 Volgograd, Russian Federation
Abstract. This article analyzes software backdoors that can be used to illegally access information or collect confidential data. To detect such backdoors, various approaches were considered that make it possible to identify the presence of backdoors in the system. During the study, criteria were highlighted that allow assessing the effectiveness of various approaches to detecting software backdoors. These include detection accuracy, data processing speed, resistance to circumvention of protective measures and other factors. Currently, the protection of confidential information is the main task of companies, since its leakage entails irreparable damage to the company’s reputation, as well as financial losses. To ensure the protection of confidential information from unauthorized access to it, companies use a special set of measures, which includes technical, software, hardware and administrative measures to protect information. One of the ways to obtain confidential information is software backdoors that can enter the system in various ways. To identify backdoors at workplaces, special methods must be used. In general, this article represents an important contribution to the field of detection of software backdoors and can be used in the development of new methods of information protection.
Key words: information security, backdoor, software backdoor, undeclared capabilities, software impact, technical protection of information.
This work is licensed under a Creative Commons Attribution 4.0 International License.