Method for Optimization of Information Security Systems Behavior under Conditions of Influences

Full Text (PDF, 918KB), PP.46-58

Views: 0 Downloads: 0

Author(s)

Zhengbing Hu 1,* Yulia Khokhlachova 2 Viktoriia Sydorenko 2 Ivan Opirskyy 3

1. Central China Normal University, Wuhan, China

2. Department of Information Technology Security, National Aviation University, Kyiv, Ukraine

3. Department of Information Security, National University "Lviv Polytechnic", Lviv, Ukraine

* Corresponding author.

DOI: https://doi.org/10.5815/ijisa.2017.12.05

Received: 4 Jun. 2017 / Revised: 1 Aug. 2017 / Accepted: 11 Sep. 2017 / Published: 8 Dec. 2017

Index Terms

Information Security, Information Security Systems, Information Influence, Information Systems Jptimization, Modeling Impacts

Abstract

The paper analyzes modern methods of modeling impacts on information systems, which made it possible to determine the most effective approaches and use them to optimize the parameters of security systems. And also as a method to optimize data security, taking in the security settings account (number of security measures, the type of security subsystems, safety resources and total cost information) allows to determine the optimal behavior in the “impact-security”. Also developed special software that allowed to verify the proposed method.

Cite This Paper

Zhengbing Hu, Yulia Khokhlachova, Viktoriia Sydorenko, Ivan Opirskyy, "Method for Optimization of Information Security Systems Behavior under Conditions of Influences", International Journal of Intelligent Systems and Applications(IJISA), Vol.9, No.12, pp.46-58, 2017. DOI:10.5815/ijisa.2017.12.05

Reference

[1]A.А. Burushkin, A.A. Panfilov, Yu.K. Yazov, “Using the apparatus of Petri-Markov networks to assess the characteristics of the dynamics of the implementation of threats to information security in computer networks,” Counteraction to the Threats of Terrorism: ICSTT, vol.10, pp. 162-169, 2007.
[2]Grischuk R.V. “The theoretical basis of modeling processes attacks on information theory methods of differential games and transformations: Monograph,” Exactly: Ruta, 280 p., 2012.
[3]R.V. Grischuk, S.Z.H. Piskun, V.A. Khoroshko, J.E. Khokhlachova, “Gaming Methods of cyber attacks on information sphere” Information Security, vol. 1 no.54, pp. 86-93, 2012.
[4]Grischuk R.V., V.A. Khoroshko, “Synthesis of optimal behavior in the defense - attack system” Problems creating, testing and maintenance of complex information systems, vol. 5, pp. 60-66, 2011.
[5]Devyanyn V.D. “Models of computer security systems: Monograph”, Publishing Center "Academy", 144 p., 2005.
[6]V.E. Muhyn, A.N. Volokyta, “Complex Monitoring System based on security analysis purposes subject of computer systems and networks,” Control systems and machines, vol.5, pp.85-92, 2006.
[7]Tereykovskyy I.A., “Neural networks in means of information security” The Technical Writer's Handbook, 209 p. 2007.
[8]Penrose R.A. “Generalized Inverse for Matrices”, Proceedings of the Cambridge Philosophical Society”, vol. 51, pp. 406-413, 1955.
[9]S.A. Gnatyuk, Y.E. Khokhlachova, A. Okhrimenko, A. Hrebenkova, “The theoretical basis of construction and operation of information security incident control,” Information Security, vol. 1, no.54, – pp. 121-126, 2012.
[10]Khokhlachova Y.E., “Modeling optimality criteria and restrictions for the security of information systems” Information Security, vol.4, no.57, pp. 106-109, 2012.
[11]Y.E. Khokhlachova, S.S. Chumachenko, A.P. Duksenko, “Modern approaches to vulnerability assessment and modeling of information systems,” Journal of Engineering Academy of Ukraine, vol. 4, pp. 121-126, 2014.
[12]V.A. Khoroshko, Y.E. Khokhlachova, “Assessment of security of information systems,” Current security , vol. 4, pp. 50-58, 2012
[13]Y.E. Khokhlachova, “Information Security Policy Object,” Legal, regulatory and metrological support of information security in Ukraine, vol.2, no.24, pp. 23-29, 2012.
[14]V.A. Khoroshko, I.S. Ivanchenko, Y.E. Khokhlachova “Evaluation of security communication systems in information and communications systems,” Information processing systems, vol.3, no.110, pp.112-117, 2013.
[15]Opirskyy I.R., “Project design conflict threats complex system of information security in information networks of state,” Scientific Journal NLTU Ukraine, a collection of scientific works, Issue 25.09, pp. 322-328, 2015.
[16]Opirskyy I.R. “Analysis of static models of unauthorized access to information networks State,” Międzynarodowy Zbiór prac naukowych «Współpraca Europejska», vol.2, no.9, pp-92-107, 2016.
[17]Zhengbing Hu, Vadym Mukhin, Yaroslav Kornaga, Yaroslav Lavrenko, Oleg Barabash, Oksana Herasymenko, "Analytical Assessment of Security Level of Distributed and Scalable Computer Systems", International Journal of Intelligent Systems and Applications (IJISA), Vol.8, No.12, pp.57-64, 2016. DOI: 10.5815/ijisa.2016.12.07
[18]Dudykevych V.B., Opirskyy I.R., “Analysis models of information security in information networks of state”. Information processing systems, Issue 4 no.141, pp. 86-90, 2016.
[19]Sudhir Kumar Sharma, Ximi Hoque,"Sentiment Predictions using Support Vector Machines for Odd-Even Formula in Delhi", International Journal of Intelligent Systems and Applications(IJISA), Vol.9, No.7, pp.61-69, 2017. DOI: 10.5815/ijisa.2017.07.07
[20]Zhenbing Hu, Vadym Mukhin, Yaroslav Kornaga, Yaroslav Lavrenko, Oksana Herasymenko,"Distributed Computer System Resources Control Mechanism Based on Network-Centric Approach", International Journal of Intelligent Systems and Applications(IJISA), Vol.9, No.7, pp.41-51, 2017. DOI: 10.5815/ijisa.2017.07.05.