Modeling of Operation of Information System for Critical Use in the Conditions of Influence of a Complex Certain Negative Factor

被引:6
|
作者
Bisikalo, Oleg [1 ]
Danylchuk, Oksana [2 ]
Kovtun, Viacheslav [3 ]
Kovtun, Oksana [4 ]
Nikitenko, Olena [3 ]
Vysotska, Victoria [5 ,6 ]
机构
[1] Vinnytsia Natl Tech Univ, Dept Automat & Intelligent Informat Technol, Fac Comp Syst & Automat, Vinnytsia, Ukraine
[2] VasylStus Donetsk Natl Univ, Fac Informat & Appl Technol, Dept Appl Math, Vinnytsia, Ukraine
[3] Vinnytsia Natl Tech Univ, Fac Comp Syst & Automat, Dept Comp Control Syst, Vinnytsia, Ukraine
[4] VasylStus Donetsk Natl Univ, Dept Theory & Practice Translat, Fac Foreign Languages, Vinnytsia, Ukraine
[5] Osnabrtick Univ, Inst Comp Sci, Osnabruck, Germany
[6] Lviv Polytech Natl Univ, Informat Syst & Networks Dept, Lvov, Ukraine
关键词
Dependability; information system for critical use; Markov chains; mathematical modeling; operation process; reliability; DEPENDABILITY;
D O I
10.1007/s12555-021-0368-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The development of the infosphere is accompanied by a proportional increase in the amount of personalized information and the threats of unauthorized access to it. This confrontation is especially acute when it comes to the resources of information systems for critical use (ISCU), unauthorized access to which can cause significant material or human losses. The specificity of ISCU determines the only rational way of evolution of means of ensuring their dependability - the mathematical modeling of the process of operation of the studied systems under the influence of certain negative factors. When determining a certain negative factor, the authors rely on the hierarchical classification of modern cyber threats presented in the specialized database of the Open Web Application Security Project (OWASP). The article presents an improved Markov mathematical model of operation of ISCU in the conditions of aggressive cyberphysical space in which, in contrast to the existing ones, the process of confrontation of the information protection subsystem of the studied system and the complex certain negative factor is analytically formalized. The proposed model takes into account that the interdependent components of the complex negative factor were created by cyber-attackers with a focus on invulnerability to individual protection schemes. The authors consider a complex negative factor as an ordered interconnected sequence of certain negative factors. An applied result of mathematical modeling is analytical equations in the first approximation to calculate the time to failure of the studied system, which operates under the influence of complex negative factor, and stochastic description of the allowable states in which the studied system may be at any discrete time.
引用
收藏
页码:1904 / 1913
页数:10
相关论文
共 50 条
  • [21] A critical appraisal of the use of recombinant factor VIIa in acquired bleeding conditions
    Mittal, S
    Watson, HG
    BRITISH JOURNAL OF HAEMATOLOGY, 2006, 133 (04) : 355 - 363
  • [22] Modeling Complex Information System Based-on Axiomatic Design
    Yang, Bin
    Xiao, Ren-bin
    2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 12381 - 12384
  • [23] Modeling Complex Information System Based-on Axiomatic Design
    Yang, Bin
    Xiao, Renbin
    SEVENTH WUHAN INTERNATIONAL CONFERENCE ON E-BUSINESS, VOLS I-III, 2008, : 1277 - 1285
  • [24] A Business Process Modeling Experience in a Complex Information System ReEngineering
    Bernonville, Stephanie
    Vantourout, Corinne
    Fendeler, Genevieve
    Beuscart, Regis
    MEDINFO 2013: PROCEEDINGS OF THE 14TH WORLD CONGRESS ON MEDICAL AND HEALTH INFORMATICS, PTS 1 AND 2, 2013, 192 : 969 - 969
  • [25] Modeling System's Process for Control Of Complex Information Systems
    Carstea, Claudia-Georgeta
    INNOVATION VISION 2020: FROM REGIONAL DEVELOPMENT SUSTAINABILITY TO GLOBAL ECONOMIC GROWTH, VOL I-VI, 2015, : 566 - 570
  • [26] The use of task graphs for modeling complex system behavior
    Silberman, A
    Stoyen, AD
    Sundaram, K
    2ND IEEE INTERNATIONAL SYMPOSIUM ON OBJECT-ORIENTED REAL-TIME DISTRIBUTED COMPUTING (ISORC'99), PROCEEDINGS, 1999, : 340 - 349
  • [27] Research of safety and survivability models of the information system for critical use
    Bisikalo, Oleg V.
    Kovtun, Viacheslav V.
    Kovtun, Oksana V.
    Romanenko, Volodimir B.
    2020 IEEE 11TH INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS, SERVICES AND TECHNOLOGIES (DESSERT): IOT, BIG DATA AND AI FOR A SAFE & SECURE WORLD AND INDUSTRY 4.0, 2020, : 7 - 12
  • [28] INFLUENCE OF LEADERSHIP STYLE ON THE USE OF ACCOUNTING INFORMATION SYSTEM
    Ferreira-da-Silva, Amelia
    Fernandez-Feijoo, Belen
    Rodriguez, Susana Gago
    5TH ANNUAL EUROMED CONFERENCE OF THE EUROMED ACADEMY OF BUSINESS: BUILDING NEW BUSINESS MODELS FOR SUCCESS THROUGH COMPETITIVENESS AND RESPONSIBILITY, 2013, : 1755 - 1756
  • [29] Modeling smart electrical microgrid with demand response and storage systems for optimal operation in critical conditions
    Wang, Xuan
    Zhang, Xiaofeng
    Zhou, Feng
    Xu, Xiang
    Chammam, A. B.
    Ali, A. M.
    SCIENCE AND TECHNOLOGY FOR ENERGY TRANSITION, 2024, 79
  • [30] Modeling of the Schemes for Organizing a Session of Person-System Interactions in the Information System for Critical Use Which Operates in a Wireless Communication Environment
    Al-Ma'aitah, Mohammed
    Saad, Aldosary
    Alwadain, Ayed
    SYMMETRY-BASEL, 2021, 13 (03): : 1 - 21