Modeling of Operation of Information System for Critical Use in the Conditions of Influence of a Complex Certain Negative Factor

被引:6
|
作者
Bisikalo, Oleg [1 ]
Danylchuk, Oksana [2 ]
Kovtun, Viacheslav [3 ]
Kovtun, Oksana [4 ]
Nikitenko, Olena [3 ]
Vysotska, Victoria [5 ,6 ]
机构
[1] Vinnytsia Natl Tech Univ, Dept Automat & Intelligent Informat Technol, Fac Comp Syst & Automat, Vinnytsia, Ukraine
[2] VasylStus Donetsk Natl Univ, Fac Informat & Appl Technol, Dept Appl Math, Vinnytsia, Ukraine
[3] Vinnytsia Natl Tech Univ, Fac Comp Syst & Automat, Dept Comp Control Syst, Vinnytsia, Ukraine
[4] VasylStus Donetsk Natl Univ, Dept Theory & Practice Translat, Fac Foreign Languages, Vinnytsia, Ukraine
[5] Osnabrtick Univ, Inst Comp Sci, Osnabruck, Germany
[6] Lviv Polytech Natl Univ, Informat Syst & Networks Dept, Lvov, Ukraine
关键词
Dependability; information system for critical use; Markov chains; mathematical modeling; operation process; reliability; DEPENDABILITY;
D O I
10.1007/s12555-021-0368-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The development of the infosphere is accompanied by a proportional increase in the amount of personalized information and the threats of unauthorized access to it. This confrontation is especially acute when it comes to the resources of information systems for critical use (ISCU), unauthorized access to which can cause significant material or human losses. The specificity of ISCU determines the only rational way of evolution of means of ensuring their dependability - the mathematical modeling of the process of operation of the studied systems under the influence of certain negative factors. When determining a certain negative factor, the authors rely on the hierarchical classification of modern cyber threats presented in the specialized database of the Open Web Application Security Project (OWASP). The article presents an improved Markov mathematical model of operation of ISCU in the conditions of aggressive cyberphysical space in which, in contrast to the existing ones, the process of confrontation of the information protection subsystem of the studied system and the complex certain negative factor is analytically formalized. The proposed model takes into account that the interdependent components of the complex negative factor were created by cyber-attackers with a focus on invulnerability to individual protection schemes. The authors consider a complex negative factor as an ordered interconnected sequence of certain negative factors. An applied result of mathematical modeling is analytical equations in the first approximation to calculate the time to failure of the studied system, which operates under the influence of complex negative factor, and stochastic description of the allowable states in which the studied system may be at any discrete time.
引用
收藏
页码:1904 / 1913
页数:10
相关论文
共 50 条
  • [31] Influence of Hotel Information System Quality on System Use and User Satisfaction
    Jang, Jun-Ho
    Kim, Ju-Kyung
    Hwang, Yeong-Hyeon
    JOURNAL OF QUALITY ASSURANCE IN HOSPITALITY & TOURISM, 2006, 7 (03) : 41 - 58
  • [32] The Behavioral Risk Factor Surveillance System: Information, Relationships, and Influence
    Marks, James S.
    Mokdad, Ali H.
    Town, Machell
    AMERICAN JOURNAL OF PREVENTIVE MEDICINE, 2020, 59 (06) : E251 - 775
  • [33] Electromagnetic Compatibility Design of a Certain Information System Command Vehicle in Complex Electromagnetic Environment
    Liu, Qiang
    Zhai, Xiaofei
    Bao, Zuohui
    Liu, Yangke
    Wang, Yong
    MAN-MACHINE-ENVIRONMENT SYSTEM ENGINEERING (MMESE 2019), 2020, 576 : 707 - 713
  • [34] Radioelectronic system synthesis features under the conditions of complex information conflict
    Korol', O.V.
    Senchakov, G.V.
    Shevchuk, V.F.
    Yagol'nikov, S.V.
    Radiotekhnika, 1996, (11): : 79 - 81
  • [35] A framework for modeling the control and management of infrastructure through the use of critical information flows
    Turk, AL
    Weijnen, MPC
    CRITICAL INFRASTRUCTURES STATE OF THE ART IN RESEARCH AND APPLICATION, 2003, 65 : 139 - 160
  • [36] Research on the Influence Factor of Kindergarten Teachers' Information Technology Use Behavior
    Zhang Liqin
    Wan Chunhui
    2017 12TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND EDUCATION (ICCSE 2017), 2017, : 679 - 683
  • [37] Modeling Organizational Information System Architecture Using "Complex Networks" Concepts
    Sousa, Jose L. R.
    Machado, Ricardo J.
    Mendes, J. F. F.
    2012 EIGHTH INTERNATIONAL CONFERENCE ON THE QUALITY OF INFORMATION AND COMMUNICATIONS TECHNOLOGY (QUATIC 2012), 2012, : 365 - 370
  • [38] On the use of longitudinal data techniques for modeling the behavior of a complex system
    Benavent, X
    Vegara, F
    Domingo, J
    Ayala, G
    COMPUTATIONAL SCIENCE-ICCS 2002, PT I, PROCEEDINGS, 2002, 2329 : 458 - 467
  • [39] MODELING OF THE HUMAN - OPERATOR IN A COMPLEX SYSTEM FUNCTIONING UNDER EXTREME CONDITIONS
    Getzov, Peter
    Hubenova, Zoia
    Yordanov, Dimitar
    Popov, Wiliam
    AEROSPACE RESEARCH IN BULGARIA, 2013, 25 : 206 - 227
  • [40] Information Extraction from a Complex Multicomponent System by Target Factor Analysis
    Shao, Limin
    Griffiths, Peter R.
    ANALYTICAL CHEMISTRY, 2010, 82 (01) : 106 - 114