Abstract
Protecting a computer device is an important task that requires software implementation, because not every user can choose the right set of security features for their device, and there are not many applications that can help a user choose the right set of security features. In this paper, the authors consider the following tools for finding the optimal strategy for protecting a computer device: the method of Savage, Hurwitz, Bayes, Monte Carlo, Thompson Sampling algorithm. Their features and advantages are highlighted. They are based on a software application that will allow users to calculate the optimal combination of tools designed to protect their computers, depending on the wishes of users and the characteristics of their devices. Such an application can be used by system administrators to select the optimal protection of the entire computer fleet. The authors conducted a series of experiments and comparative analysis of the simulation results. The average search time for an optimal strategy for protecting a computer device is estimated.
Export citation and abstract BibTeX RIS
Content from this work may be used under the terms of the Creative Commons Attribution 3.0 licence. Any further distribution of this work must maintain attribution to the author(s) and the title of the work, journal citation and DOI.