SlideShare a Scribd company logo
http://www.iaeme.com/IJCIET/index.asp 454 editor@iaeme.com
International Journal of Civil Engineering and Technology (IJCIET)
Volume 10, Issue 03, March 2019, pp. 454-463, Article ID: IJCIET_10_03_046
Available online at http://www.iaeme.com/ijciet/issues.asp?JType=IJCIET&VType=10&IType=03
ISSN Print: 0976-6308 and ISSN Online: 0976-6316
© IAEME Publication Scopus Indexed
DEVELOPMENT OF A MODEL OF CYBER
SECURITY MANAGEMENT FOR AUTOMATED
SYSTEMS
K. Sauanova
Associate Professor, Almaty University of Power Engineering and Telecommunications,
Kazakhstan
S. Sagyndykova
Associate Professor, Almaty University of Power Engineering and Telecommunications,
Kazakhstan
V. Buriachok
Professor
Doctor of Technical Sciences, Department of Information and cyber security,
Borys Grinchenko Kyiv University, Kyiv, Ukraine
N. Mazur
PhD in Pedagogical Sciences, Department of Information and cyber security,
Borys Grinchenko Kyiv University, Kyiv, Ukraine
A. Anosov
PhD in Technical Sciences, Associate Professor, Department of Information and cyber
Security, Borys Grinchenko Kyiv University, Kyiv, Ukraine
S. Smirnov
PhD
Cyber Security & Software Academic Department
Central Ukrainian National Technical University, Kropivnitskiy, Ukraine
V. Malyukov
Professor
Department of Computer systems and networks, National University of Life and
Environmental Sciences of Ukraine, Kyiv, Ukraine
K. Sauanova, S. Sagyndykova, V. Buriachok, N. Mazur, A. Anosov, S. Smirnov and V.
Malyukov
http://www.iaeme.com/IJCIET/index.asp 455 editor@iaeme.com
ABSTRACT
A model of a system of managing information security of automated data
processing systems of critical application is offered in the article. The model allows to
evaluate the level of risk for the information security and provides support of
decision-making on the counteraction to the unauthorized access to the information
circulating in the information systems.
Key words: information protection, information security, automated data processing
systems, information security risk, and decision-making.
Cite this Article: K. Sauanova, S. Sagyndykova, V. Buriachok, N. Mazur, A.
Anosov, S. Smirnov and V. Malyukov, Development of a Model of Cyber Security
Management for Automated Systems, International Journal of Civil Engineering and
Technology, 10(03), 2019, pp. 454-463
http://www.iaeme.com/IJCIET/issues.asp?JType=IJCIET&VType=10&IType=03
1. INTRODUCTION
Modern technologies of open distributed systems and network integration underlying the
functioning of the automated data processing systems of critical application (ADPS CA) and
telecommunications networks have a large number of vulnerabilities [1-3]. The intervention
in national, regional and municipal ADPS CA in energy sector, industry, transport,
communications etc. is a frequently mentioned threat of cyber-attacks of criminals [4-9]. In
this regard, the issues of information security (IS) and information protection in ADPS CA
have acquired increasing importance in recent years.
During the last decades the concept of IS was identified primarily with the terms –
confidentiality, integrity and availability of information. At the same time, the
implementation of an information security policy (ISP), for many years was assigned to the
technical systems and means of information protection (TSMP). According to the generally
accepted approach to the implementation of the ISP, the information procedures (IP)
successfully counteract to the predefined cyber threats during the operation of ADPS CA
within the known external conditions. Thus, the continuous development of methods and
means of information protection (MIP), leads to the evolution of algorithms of
implementation of cyber-attacks, and the emergence of new MIP is accompanied by new
scenarios of cyber-attacks [10-13].
The flexibility of information security management system (ISMS) within the context of
ensuring the confidentiality and availability of information is correlated with the algorithms
that differentiate access to information processes (IP) in ADPS CA. The adopted security
policy model (SPM) determines the existence of certain vulnerabilities of the IP. It should be
noted that any SPM responsible for reliable processing of information, must maintain a global
security policy (SP), which determines the required parameters of IP, and can contribute to
the local SP, regulating rules of transition of IP between adjacent states of ADPS CA.
In the existing ISMS, decision-making becomes difficult due to the following reasons: to
form a complete set of IS threats in advance is not always possible; the degree of criticality of
the situation and its forecasting in the dynamics is quite difficult to perform and others. Thus,
often incomplete and uncertain initial data on the state of MIP, possible threats, destabilizing
effects etc., cause issues associated with IS and cyber defence of ADPS CA.
Development of a Model of Cyber Security Management for Automated Systems
http://www.iaeme.com/IJCIET/index.asp 456 editor@iaeme.com
2. PROBLEM STATEMENT
The aim of the research – approbation of the model of ISMS, assessment providing of
criticality of the situation with the information protection in ADPS CA and capable to assess
the risks’ levels connected with the violation of IS and cyber security.
3. MATERIALS AND RESEARCH METHODS
From the viewpoint of evaluating the effectiveness of provision of IS of ADPS CA, it can be
represented as a set of components, each of which ensures the implementation of its function
of information security ( FIS ).
Basic components of ADPS CA are: communication network; informational and
document flow subsystems; a set of system services. ADPS CA architecture is characterized
by: a unified information and communication system, distributed computing tasks and
resources, the variety of ways of hardware and software implementation of the functional
subsystems, standardized interfaces, regulated connection to global networks. Each of the
functional subsystems consists of a set of typical complexes of automation facilities (CAF),
implementing processes and procedures of the same type for processing information in the
composition of ADPS CA.
As the basic research methods of ISMS of ADPS CA, the following were used: system
analysis; the theory of probabilities; mathematical statistics; fuzzy logic.
Let us describe elements of MIP of ADPS CA as evaluation objects – ( 1,2,... ).iO i m It
is obvious that each of the elements of MIP ensures implementation of concrete ijFIS (
1,2,..., , 1,2,..., ii m j n  ) where in – number of FIS for MIP components – Oi.
When constructing the model of ISMS, the assumption is made that the interpretation of
the concept of IS is wider than the term "security of information technologies" in the
automated data processing systems, i.e.
 










n
i
ivq
ij
hvnqFIS
njmiFISFIS
1
,...,2,1,:
,...,2,1:,...,2,1:
(1)
where 

n
i
inq
1
– summation of FIS for all evaluation objects of Oi.
It can be assumed that the elements of a set of ijFIS may not completely ensure the
requirements of IS. For example, this may occur in cases of emergence of new types or
classes of cyber threats and vulnerabilities in the ADPS CA, which in its turn leads to
increasing of the information risk. Now, as a rule, the level of risk is set that is considered
acceptable and does not require the adoption of measures to counteract attempts of
unauthorized access to ADPS CA [1, 3, 6, 9, 13].
The following assumptions were taken during the development of the model and the
algorithm of ISMS.
1. Actions of the attacking side influence ADPS CA and can lead to the loss of data
integrity or partial non-fulfilment of the functions of IS.
2. The impact of the attacking side is probabilistic in nature.
K. Sauanova, S. Sagyndykova, V. Buriachok, N. Mazur, A. Anosov, S. Smirnov and V.
Malyukov
http://www.iaeme.com/IJCIET/index.asp 457 editor@iaeme.com
3. The impact of the attacking side can be directed both from the outside the
company and ADPS CA and from the inside.
4. Assessment of the attacking side impact’s consequences was based on statistical
analysis methods.
Previously [4] it was suggested to use a special indicator for quantitative characteristic of
the degree of current danger of attack or unauthorized access to the ADPS CA, which can be
calculated (measured) at any time – index of current risks (ICR) )(XCC ICRICR  , where
),...,,...,( 1 MIi ICRICRICRICR xxxX  – vector of values of ICR, MI – the number of
information threats. It is assumed that )10( ICRC .
At the first step of work of the algorithm of ISMS the task of obtaining quantitative
values that characterize the implementation of ijFIS of MIP of ADPS CA. For each of the
functions of IS ( ijFIS ) such value is the probability that a certain function of IS – ijFIS , for
example, control of integrity of software and information support, will be reliably performed
within a certain time interval. At a given time interval  probability of trouble-free execution
of iFIS based on the theory of reliability can be described by the following equation:
  ,mti
i
T
FIS
P e




(2)
where mti
T – average time interval of trouble-free execution of .iFIS
If it is needed to perform the assessment of costs Zi, necessary to ensure trouble-free
implementation of iFIS of MIP of ADPS CA, it is possible to use the following relationship:
  ,
i
i
i
Z
FISP e
 



(3)
where i – the proportionality factor.
The next step is to obtain a quantitative assessment of the figure of current informational
risks arising from incomplete execution of ijFIS .
The basic approaches to the analysis of ADPS CA vulnerabilities, and assessment of their
degree of IS, are based on analytical calculations and simulation modelling. However, in MIP
based on the fuzzy approach, especially with a large number of variables, it is practically
impossible to take into account the synergism that can arise at co-occurrence of certain
specific values of the individual variables, and it is impossible to ensure the account of
differences in the importance of factors influencing the decision-making.
These circumstances make it expedient to develop a technology that would be more
consistent with the model, "a multi-dimensional input - output", and made it possible to take
into account not only the value of the factors affecting the original variable, but also to
determine the degree of importance of controlled parameters when making a decision, and
their interaction in the necessary order. Considering all the above mentioned, in this ISMS
block, the decision-making algorithms were used in the conditions of fuzzy input information
when determining the dimensions of vulnerability of information resources of ADPS CA.
The following assumptions are made:
Development of a Model of Cyber Security Management for Automated Systems
http://www.iaeme.com/IJCIET/index.asp 458 editor@iaeme.com
1. there is a set of controlled input parameters FISi
p  1,2,...,i M , the estimates of
which were obtained at the previous step of the algorithm, for example, mti
T and
iFISP ( iFISP – Pim – the probability of launch of communication centre service of
software and information support of ADPS CA in the next working session);
2. it is necessary to obtain a quantitative estimate of the parameter )(XCC ICRICR  ;
at the same time it should be considered that when the character of features is
probabilistic (when solving the problem of recognition of cyber threats, cyber
attacks and anomalies in ADPS CA – the parameter estimation task is ICRC ), i.e.
when between the features and the measures to which they may be assigned, there
are stochastic connections, it is appropriate to conduct the synthesis of algorithms,
the recognition, based on the application of the theory of statistical decisions. In
the situation when in ISMS there is a complete initial priori information, these
results can be used directly. With incomplete initial information the recognition
algorithms can also be based on the results of the theory of statistical decisions.
Although in the latter case, these results can be used only by implementing
algorithms of adaptive learning or self-learning. The next quantitative measure for
the assessment is proposed ICRC :
jMN ,
( / )
IM ,
( )i
j i
j
P MN
P MN



(4)
where P(MNj) – the probability that a means (method) is used to prevent the threat to
IS MNj; R1, R2– a sign of threat to IS of ADPS CA, for example, a sudden increase in traffic,
if there is a system of features nSF of IS violation, i.e. value 1ICRC  , it is possible to use the
following dependence:
 

L
li
iMN
i
iMNSFMN j
j
jnj
IMIMIM ,
1
, 

(5)
where i = 1,…, θj – the number of independent features, describing the method MNj ; l =
1,…, L – the number of groups of independent features.
there is a set of linguistic terms Т, characterizing the values of the input ( i
v , where
 v 1, iN , iN – the number of terms of the parameter FISi
p ) and output ( j ,  1,j N , where N
– the number of terms of the parameter CICR) parameters.
An analytical model of the membership function of the variable i to the fuzzy term Т is
represented in the following form [4]:
  2
1
1
T
 
 


 
  
  (6)
K. Sauanova, S. Sagyndykova, V. Buriachok, N. Mazur, A. Anosov, S. Smirnov and V.
Malyukov
http://www.iaeme.com/IJCIET/index.asp 459 editor@iaeme.com
where  and  – setting options of ijFIS ;
 – max value of ijFIS ;
( ) 1T
  
– (  – the
most pragmatic value of the variable i for the fuzzy term);  –concentration factor –
stretching of FIS ( ijFIS ).
For example, when implementing tests on penetration in ADPS CA [9], a series of N
measurements of values of the controlled variables i was conducted, in the result of which
the following matrix was obtained:
11 12 1 1
21 22 2 2
1 2
1 2
.
i n
i n
l l li l n
N N N i N n
H
   
   
   
   
 
 
 
 
  
 
 
 
 
 
The first stage of simulation with fuzzy knowledge base consists of the formation with the
expert information of the model of the evaluation object (Oi) by building a knowledge base.
The second stage is necessary for setting the fuzzy model by its training on the experimental
data. Training of ISMS model of ADPS CA lies in the selection of the parameters of
membership functions by minimizing the difference between the experimental and theoretical
data.
Assuming that:
{ }iB b – knowledge base, where 1, ,i B    – number of objects (of evaluation)
in the knowledge base, for example, integrity monitoring service – Pim;
1
i
i
A A


 – the plurality of all attributes in the knowledge base (where { }i ijA a –
the plurality ja – of the attribute over a plurality of objects Oi);
1,j m – the general number of attributes iO – of the object of MIP and ADPS CA.
The solution includes the following stages:
1. Define the plurality   MiPP iFISFIS ,1:  , which can include all or selective
evaluations of performance indicators of ijFIS MIP of ADPS CA, as well as the
number of terms and their meanings for each of the monitored input parameters i
.B 
2. Build a fuzzy knowledge base B as a set of production rules of the kind
  
 
  v
1,
: : 1, : 1,i
i j
i M
v N j N 

   
.
From the pre-built fuzzy logic conclusion system, we obtain the membership function for
all elements of the set of FIS :
     { : 1, , 1, }i
v
i iP i M v N
  
Development of a Model of Cyber Security Management for Automated Systems
http://www.iaeme.com/IJCIET/index.asp 460 editor@iaeme.com
and for ICRС :    { : 1, }jICRС j N 
where i and  – input and output parameters with attributes – A.
1. On the base of numerical values of  iP  , characterizing the performance of
security functions of MIP of ADPS CA, we obtain estimates of input parameters,
  1,i M , corresponding to the current indicators of implementation of iFIS
of MIP.
2. Conduct the fuzzification (comparison of the plurality of values of i its
membership function, i.е. translation of values of i in the fuzzy format) of input
parameters. Define the values of the membership functions corresponding to the
estimates of the 4th
step of the algorithm: i
v
P ,  1, iv N ,  1,i M
3. Define degree of truth for each of the production rules (PR) of ISMS of ADPS
CA.
4. Construct the resulting membership function of
ˆ ( )ICRС  for the output
parameter taking into account the degrees of truth of all PR of ISMS of ADPS
CA.
5. The calculation of probability indicators of IS for each class of IS threats is
defined by the following iterative dependency [4]:
1
1
1
1
1
( / )
( ) ( / ) ( / ) 1 ( / )
P ( )
( / )
( ) ( / ) ( / ) 1 ( / )
j
ICR j j n j n
ICR
j
ICR j j n j n
P MN
P C P MN P MN SF P MN SF
C
P MN
P C P MN P MN SF P MN SF



 















 
 
 
       
 
  
 
 
 
       
 
  



(7)
where  – the number of class of threats of IS of ADPS CA,  – the time of threats
detection.
Calculate the resulting value of ICRC of the output parameter as a result of
defuzzification of a fuzzy plurality ˆ ( )ICRС  .
It is assumed that the parameters’ ranking is carried out at the design stage of MIP of
ADPS CA and is not the subject of this study.
In this article let us consider in more detail the procedure of evaluation of ensuring the
integrity of software and information support of ADPS CA.
Flexibility of ADPS CA protection algorithms in the context of ensuring the integrity of
information, comes down to the need to keep away the negative impact of integrity
monitoring service (IMS) on the efficiency of data arrays processing procedures. The
consequence of the absence of such restrictions is the diversion of resources of computer,
first of all, of the temporary ones from the direct functional tasks of ADPS CA. At the same
time the required parameters of IS are achieved through the stepwise organization of IMS.
K. Sauanova, S. Sagyndykova, V. Buriachok, N. Mazur, A. Anosov, S. Smirnov and V.
Malyukov
http://www.iaeme.com/IJCIET/index.asp 461 editor@iaeme.com
To support decision-making on IS of ADPS CA, the automated IM service management
subsystem is implemented in ISMS. Accordingly, the estimate of the following criteria of
quality monitoring of IM service functioning was performed [9]: the identity of functioning
of ADPS CA with the set parameters – afЕ , the survivability of ADPS CA during the
computer intrusion – taЕ .
Evaluation of parameters afЕ and taЕ is performed using the model, based on semi-
Markov processes [4, 7]. An assumption was made, that these processes are formed for a
usual ADPS on the base of Е – network. The suggested model allows to take into account the
probabilistic nature of transitions between states of ADPS, and also to take into account the
selected technical means of information protection. In addition, distribution laws used in
ADPS and time of transitions between these states of the system were analysed.
The formalization of decision-making procedure is designed as a mathematical
programming task. In the course of its decision it is necessary to choose an alternative Lal A
out of the plurality of AL. The following conditions must be met:
f ( ) max;аE al  (8)
min( ) ;tа tаE al E (9)
( ) ( ) 1fa fаЕ al E al 
(10)
where Emin tа – set according to the technical task on ADPS constant; al – the alternative,
characterized by controlled service functioning parameters of IMS in ADPS CA.
4. RESULTS
During the simulation the influence of the controlled parameter imP was analysed – the
probability of IM service launch (for example, of the software and information support)
during the next start-up procedure of the standard ADPS CA and its IS subsystem. At the
same time, depending on the returned by sensors indications, caused by selecting the
corresponding SP, the values of parameters of the next launch of the IM service are
determined. For a model ADPS they define which part of the controlled information is
verified for integrity. In algorithms of protection of IP in a typical MIP only the principal
possibility of launching the IM service is revealed.
With the help of the developed programs complex [5, 6, 7] a complex study of the quality
of functioning of a typical MIP from unauthorized access was carried out, with regard to the
functioning of an automated working place on the base of a computer as a part of ADPS CA
for a large railway unit.
The calculation results in the form of dependencies )( imiaf PE and )( imita PE , criteria
Еаf and Еta on the controlled parameter Pim for different variants of SP and a typical MIP of
ADPS CA are shown on the graphs. On the pictures 3 and 4 the curves )( imiaf PE , )( imita PE
are different in values maf 3600i1 and mta=60i correspondingly, where maf, mta –
average values of maximum permissible time intervals between adjacent integrity checks and
implementation of MIP from unauthorized access of protective functions of ADPS CA. The
increase in the parameters shown in the graphs, is interpreted as an improvement (by this
criterion) of the quality of IM service operation. The decrease corresponds to the
Development of a Model of Cyber Security Management for Automated Systems
http://www.iaeme.com/IJCIET/index.asp 462 editor@iaeme.com
deterioration of indicators. Thus, on basis of the received dependencies, it is possible to make
amendments in the algorithm of assessment of the current IS risk indicator – CICR [14, 15].
5. CONCLUSIONS
The following main results were obtained:
A model of the company's information security management system is proposed; it is
found that the model makes it possible to assess the risks levels of the IS violation, as well as
provides support for the decision to counter the unauthorized access to ADPS CA; algorithms
are developed for the implementation of the proposed model, allowing to respond quickly and
make decisions in case of threats to IS.
REFERENCES
[1] Akhmetov, B. etc. (2019). Development of sectoral intellectualized expert systems and
decision making support systems in cybersecurity, Advances in Intelligent Systems and
Computing, 860, pp. 162–171.
[2] Lakhno, V., Zaitsev, S., Tkach, Y., Petrenko, T. (2019). Adaptive expert systems
development for cyber attacks recognition in information educational systems on the
basis of signs’ clustering, Advances in Intelligent Systems and Computing, 754, pp. 673–
682.
[3] Akhmetov, B., Balgabayeva, L., etc. (2019). Mobile platform for decision support system
during mutual continuous investment in technology for smart city, Studies in Systems,
Decision and Control, 199, pp. 731–742.
[4] Akhmetov, B., Lakhno, V., Akhmetov, B., Myakuhin, Y., Adranova, A., Kydyralina, L.
(2019). Models and algorithms of vector optimization in selecting security measures for
higher education institution’s information learning environment, Advances in Intelligent
Systems and Computing, 860, pp. 135–142.
[5] Lakhno, V., Kasatkin, D., Kozlovskyi, V., Petrovska, S., Boiko, Y., Kravchuk, P.,
Lishchynovska, N. (2019). A model and algorithm for detecting spyware in medical
information systems, International Journal of Mechanical Engineering and Technology,
(1), pp. 287–295.
[6] Lakhno, V., Tsiutsiura, S., Ryndych, Y., Blozva, A., Desiatko, A., Usov, Y., Kaznadiy, S.
(2019). Optimization of information and communication transport systems protection
tasks, International Journal of Civil Engineering and Technology, 10 (1), pp. 1–9.
[7] Lakhno, V., Buriachok, V., Parkhuts, L., Tarasova, H., Kydyralina, L., Skladannyi, P.,
Skrypnyk, M., Shostakovska, A. (2018). Development of a conceptual model of adaptive
access rights management with using the apparatus of petri nets, International Journal of
Civil Engineering and Technology, 9 (11), pp. 95–104.
[8] Akhmetov, B., etc. (2018). Model for a computer decision support system on mutual
investment in the cybersecurity of educational institutions, International Journal of
Mechanical Engineering and Technology, 9 (10), pp. 1114–1122.
[9] Lakhno, V., Akhmetov, B., Korchenko, A., Alimseitova, Z., Grebenuk, V. (2018).
Development of a decision support system based on expert evaluation for the situation
center of transport cybersecurity, Journal of Theoretical and Applied Information
Technology, 96 (14), pp. 4530–4540.
[10] Akhmetov, B., Lakhno, V. (2018). System of decision support in weaklyformalized
problems of transport cybersecurity ensuring, Journal of Theoretical and Applied
Information Technology, 96 (8), pp. 2184–2196.
[11] Lakhno, V., Akhmetov, B., Malyukov, V., Kartbaev, T. (2018). Modeling of the decision-
making procedure for financing of cyber security means of cloud services by the medium
K. Sauanova, S. Sagyndykova, V. Buriachok, N. Mazur, A. Anosov, S. Smirnov and V.
Malyukov
http://www.iaeme.com/IJCIET/index.asp 463 editor@iaeme.com
of a bilinear multistep quality game with several terminal surfaces, International Journal
of Electronics and Telecommunications, 64 (4), pp. 467–472.
[12] Lakhno, V.A., Kravchuk, P.U., Pleskach, V.L., Stepanenko, O.P., Tishchenko, R.V.,
Chernyshov, V.A. (2017). Applying the functional effectiveness information index in
cybersecurity adaptive expert system of information and communication transport
systems, Journal of Theoretical and Applied Information Technology, 95 (8), pp. 1705–
1714.
[13] Akhmetov, B. etc. (2017). Designing a decision support system for the weakly formalized
problems in the provision of cybersecurity, Eastern-European Journal of Enterprise
Technologies, 1 (2-85), pp. 4–15.
[14] Borowik, Bohdan, et al. Theory of Digital Automata. Vol. 63. Springer Science &
Business Media, 2012.
[15] Smirniy, M., etc. (2009). The research of the conflict request threads in the data
protection systems. Proceedings of Lugansk branch of the International Academy of
Informatization, 2(20), pp. 23–30.
[16] Petrov, O., Borowik, B., Karpinskyy, M., etc. (2016). Immune and defensive corporate
systems with intellectual identification of threats. Pszczyna: Śląska Oficyna
DrukarskaGordon, L. A., & Loeb, M. P. (2002). The Economics of Information Security
Investment. ACM Transactions On Information and System Security (TISSEC), 5(4), pp.
438–457.

More Related Content

PDF
A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...
PDF
A model based security requirements engineering framework
PDF
A model based security requirements engineering framework
PDF
Cyber Security Models - CxT Group
PDF
Industrial Control System Security Taxonomic Framework with Application to a ...
PDF
Ijciet 10 02_001
PDF
امنیت سیستم های کنترل صنعتی : طبقه بندی رخدادهای امنیت سایبری سیستم های کنتر...
PDF
A risk and security assessment of VANET availability using attack tree concept
A SURVEY ON TECHNIQUES REQUIREMENTS FOR INTEGRATEING SAFETY AND SECURITY ENGI...
A model based security requirements engineering framework
A model based security requirements engineering framework
Cyber Security Models - CxT Group
Industrial Control System Security Taxonomic Framework with Application to a ...
Ijciet 10 02_001
امنیت سیستم های کنترل صنعتی : طبقه بندی رخدادهای امنیت سایبری سیستم های کنتر...
A risk and security assessment of VANET availability using attack tree concept

What's hot (17)

PDF
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...
PDF
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
PDF
A1 - Cibersegurança - Raising the Bar for Cybersecurity
PDF
System Dynamics Based Insider Threats Modeling
PDF
Hp2513711375
PDF
Automatic Insider Threat Detection in E-mail System using N-gram Technique
PDF
A predictive framework for cyber security analytics using attack graphs
PPTX
A comparative analysis of current intrusion detection technologies
PDF
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
PDF
Paper Titled Information Security in an organization
PDF
Machine Learning Algorithms Applied to System Security: A Systematic Review
PDF
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
PDF
Cyber security: challenges for society- literature review
PDF
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
PDF
N018138696
PDF
User centric machine learning for cyber security operation center
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...
A1 - Cibersegurança - Raising the Bar for Cybersecurity
System Dynamics Based Insider Threats Modeling
Hp2513711375
Automatic Insider Threat Detection in E-mail System using N-gram Technique
A predictive framework for cyber security analytics using attack graphs
A comparative analysis of current intrusion detection technologies
A LITERATURE SURVEY AND ANALYSIS ON SOCIAL ENGINEERING DEFENSE MECHANISMS AND...
Paper Titled Information Security in an organization
Machine Learning Algorithms Applied to System Security: A Systematic Review
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
Cyber security: challenges for society- literature review
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
N018138696
User centric machine learning for cyber security operation center
Ad

Similar to DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMS (20)

PDF
DEVELOPMENT OF A CONCEPTUAL MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT WITH U...
PDF
Titles with Abstracts_2023-2024_Cyber Security.pdf
PDF
Artificial intelligence andCyberSecurity_zhang2021.pdf
PDF
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
PDF
July 2025 - Top 10 Read Articles in International Journal of Security, Privac...
PDF
Top 10 Cited Network Security Research Articles 2021 - 2022
PDF
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
PDF
Most trending articles 2020 - International Journal of Network Security & Its...
PDF
Trends in Network and Wireless Network Security in 2020
PDF
Detecting network attacks model based on a convolutional neural network
PDF
A Review on Data Falsification-Based attacks In Cooperative Intelligent Trans...
DOCX
Information Security Assurance Capability Maturity Model (ISA-.docx
PDF
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
PDF
Predictive cyber security
PDF
PREDICTIVE CYBER SECURITY ANALYTICS FRAMEWORK: A NONHOMOGENOUS MARKOV MODEL F...
PDF
Trust-based secure routing against lethal behavior of nodes in wireless adhoc...
PDF
A model based security requirements engineering framework
PDF
A model based security requirements engineering framework
PDF
A survey on security and privacy issues in IoV
PDF
Hyperparameters optimization XGBoost for network intrusion detection using CS...
DEVELOPMENT OF A CONCEPTUAL MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT WITH U...
Titles with Abstracts_2023-2024_Cyber Security.pdf
Artificial intelligence andCyberSecurity_zhang2021.pdf
Implementation of Secured Network Based Intrusion Detection System Using SVM ...
July 2025 - Top 10 Read Articles in International Journal of Security, Privac...
Top 10 Cited Network Security Research Articles 2021 - 2022
Software Reliability and Quality Assurance Challenges in Cyber Physical Syste...
Most trending articles 2020 - International Journal of Network Security & Its...
Trends in Network and Wireless Network Security in 2020
Detecting network attacks model based on a convolutional neural network
A Review on Data Falsification-Based attacks In Cooperative Intelligent Trans...
Information Security Assurance Capability Maturity Model (ISA-.docx
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
Predictive cyber security
PREDICTIVE CYBER SECURITY ANALYTICS FRAMEWORK: A NONHOMOGENOUS MARKOV MODEL F...
Trust-based secure routing against lethal behavior of nodes in wireless adhoc...
A model based security requirements engineering framework
A model based security requirements engineering framework
A survey on security and privacy issues in IoV
Hyperparameters optimization XGBoost for network intrusion detection using CS...
Ad

More from IAEME Publication (20)

PDF
IAEME_Publication_Call_for_Paper_September_2022.pdf
PDF
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
PDF
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
PDF
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
PDF
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
PDF
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
PDF
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
PDF
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
PDF
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
PDF
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
PDF
GANDHI ON NON-VIOLENT POLICE
PDF
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
PDF
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
PDF
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
PDF
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
PDF
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
PDF
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
PDF
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
PDF
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
PDF
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME_Publication_Call_for_Paper_September_2022.pdf
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
GANDHI ON NON-VIOLENT POLICE
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT

Recently uploaded (20)

PPTX
Internet of Things (IOT) - A guide to understanding
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PPT
Mechanical Engineering MATERIALS Selection
PPTX
additive manufacturing of ss316l using mig welding
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
DOCX
573137875-Attendance-Management-System-original
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
PPTX
OOP with Java - Java Introduction (Basics)
PPT
Project quality management in manufacturing
PPTX
Geodesy 1.pptx...............................................
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PDF
Digital Logic Computer Design lecture notes
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Internet of Things (IOT) - A guide to understanding
CH1 Production IntroductoryConcepts.pptx
Model Code of Practice - Construction Work - 21102022 .pdf
Mechanical Engineering MATERIALS Selection
additive manufacturing of ss316l using mig welding
Embodied AI: Ushering in the Next Era of Intelligent Systems
573137875-Attendance-Management-System-original
R24 SURVEYING LAB MANUAL for civil enggi
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
Operating System & Kernel Study Guide-1 - converted.pdf
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Foundation to blockchain - A guide to Blockchain Tech
OOP with Java - Java Introduction (Basics)
Project quality management in manufacturing
Geodesy 1.pptx...............................................
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Digital Logic Computer Design lecture notes
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx

DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMS

  • 1. http://www.iaeme.com/IJCIET/index.asp 454 editor@iaeme.com International Journal of Civil Engineering and Technology (IJCIET) Volume 10, Issue 03, March 2019, pp. 454-463, Article ID: IJCIET_10_03_046 Available online at http://www.iaeme.com/ijciet/issues.asp?JType=IJCIET&VType=10&IType=03 ISSN Print: 0976-6308 and ISSN Online: 0976-6316 © IAEME Publication Scopus Indexed DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMS K. Sauanova Associate Professor, Almaty University of Power Engineering and Telecommunications, Kazakhstan S. Sagyndykova Associate Professor, Almaty University of Power Engineering and Telecommunications, Kazakhstan V. Buriachok Professor Doctor of Technical Sciences, Department of Information and cyber security, Borys Grinchenko Kyiv University, Kyiv, Ukraine N. Mazur PhD in Pedagogical Sciences, Department of Information and cyber security, Borys Grinchenko Kyiv University, Kyiv, Ukraine A. Anosov PhD in Technical Sciences, Associate Professor, Department of Information and cyber Security, Borys Grinchenko Kyiv University, Kyiv, Ukraine S. Smirnov PhD Cyber Security & Software Academic Department Central Ukrainian National Technical University, Kropivnitskiy, Ukraine V. Malyukov Professor Department of Computer systems and networks, National University of Life and Environmental Sciences of Ukraine, Kyiv, Ukraine
  • 2. K. Sauanova, S. Sagyndykova, V. Buriachok, N. Mazur, A. Anosov, S. Smirnov and V. Malyukov http://www.iaeme.com/IJCIET/index.asp 455 editor@iaeme.com ABSTRACT A model of a system of managing information security of automated data processing systems of critical application is offered in the article. The model allows to evaluate the level of risk for the information security and provides support of decision-making on the counteraction to the unauthorized access to the information circulating in the information systems. Key words: information protection, information security, automated data processing systems, information security risk, and decision-making. Cite this Article: K. Sauanova, S. Sagyndykova, V. Buriachok, N. Mazur, A. Anosov, S. Smirnov and V. Malyukov, Development of a Model of Cyber Security Management for Automated Systems, International Journal of Civil Engineering and Technology, 10(03), 2019, pp. 454-463 http://www.iaeme.com/IJCIET/issues.asp?JType=IJCIET&VType=10&IType=03 1. INTRODUCTION Modern technologies of open distributed systems and network integration underlying the functioning of the automated data processing systems of critical application (ADPS CA) and telecommunications networks have a large number of vulnerabilities [1-3]. The intervention in national, regional and municipal ADPS CA in energy sector, industry, transport, communications etc. is a frequently mentioned threat of cyber-attacks of criminals [4-9]. In this regard, the issues of information security (IS) and information protection in ADPS CA have acquired increasing importance in recent years. During the last decades the concept of IS was identified primarily with the terms – confidentiality, integrity and availability of information. At the same time, the implementation of an information security policy (ISP), for many years was assigned to the technical systems and means of information protection (TSMP). According to the generally accepted approach to the implementation of the ISP, the information procedures (IP) successfully counteract to the predefined cyber threats during the operation of ADPS CA within the known external conditions. Thus, the continuous development of methods and means of information protection (MIP), leads to the evolution of algorithms of implementation of cyber-attacks, and the emergence of new MIP is accompanied by new scenarios of cyber-attacks [10-13]. The flexibility of information security management system (ISMS) within the context of ensuring the confidentiality and availability of information is correlated with the algorithms that differentiate access to information processes (IP) in ADPS CA. The adopted security policy model (SPM) determines the existence of certain vulnerabilities of the IP. It should be noted that any SPM responsible for reliable processing of information, must maintain a global security policy (SP), which determines the required parameters of IP, and can contribute to the local SP, regulating rules of transition of IP between adjacent states of ADPS CA. In the existing ISMS, decision-making becomes difficult due to the following reasons: to form a complete set of IS threats in advance is not always possible; the degree of criticality of the situation and its forecasting in the dynamics is quite difficult to perform and others. Thus, often incomplete and uncertain initial data on the state of MIP, possible threats, destabilizing effects etc., cause issues associated with IS and cyber defence of ADPS CA.
  • 3. Development of a Model of Cyber Security Management for Automated Systems http://www.iaeme.com/IJCIET/index.asp 456 editor@iaeme.com 2. PROBLEM STATEMENT The aim of the research – approbation of the model of ISMS, assessment providing of criticality of the situation with the information protection in ADPS CA and capable to assess the risks’ levels connected with the violation of IS and cyber security. 3. MATERIALS AND RESEARCH METHODS From the viewpoint of evaluating the effectiveness of provision of IS of ADPS CA, it can be represented as a set of components, each of which ensures the implementation of its function of information security ( FIS ). Basic components of ADPS CA are: communication network; informational and document flow subsystems; a set of system services. ADPS CA architecture is characterized by: a unified information and communication system, distributed computing tasks and resources, the variety of ways of hardware and software implementation of the functional subsystems, standardized interfaces, regulated connection to global networks. Each of the functional subsystems consists of a set of typical complexes of automation facilities (CAF), implementing processes and procedures of the same type for processing information in the composition of ADPS CA. As the basic research methods of ISMS of ADPS CA, the following were used: system analysis; the theory of probabilities; mathematical statistics; fuzzy logic. Let us describe elements of MIP of ADPS CA as evaluation objects – ( 1,2,... ).iO i m It is obvious that each of the elements of MIP ensures implementation of concrete ijFIS ( 1,2,..., , 1,2,..., ii m j n  ) where in – number of FIS for MIP components – Oi. When constructing the model of ISMS, the assumption is made that the interpretation of the concept of IS is wider than the term "security of information technologies" in the automated data processing systems, i.e.             n i ivq ij hvnqFIS njmiFISFIS 1 ,...,2,1,: ,...,2,1:,...,2,1: (1) where   n i inq 1 – summation of FIS for all evaluation objects of Oi. It can be assumed that the elements of a set of ijFIS may not completely ensure the requirements of IS. For example, this may occur in cases of emergence of new types or classes of cyber threats and vulnerabilities in the ADPS CA, which in its turn leads to increasing of the information risk. Now, as a rule, the level of risk is set that is considered acceptable and does not require the adoption of measures to counteract attempts of unauthorized access to ADPS CA [1, 3, 6, 9, 13]. The following assumptions were taken during the development of the model and the algorithm of ISMS. 1. Actions of the attacking side influence ADPS CA and can lead to the loss of data integrity or partial non-fulfilment of the functions of IS. 2. The impact of the attacking side is probabilistic in nature.
  • 4. K. Sauanova, S. Sagyndykova, V. Buriachok, N. Mazur, A. Anosov, S. Smirnov and V. Malyukov http://www.iaeme.com/IJCIET/index.asp 457 editor@iaeme.com 3. The impact of the attacking side can be directed both from the outside the company and ADPS CA and from the inside. 4. Assessment of the attacking side impact’s consequences was based on statistical analysis methods. Previously [4] it was suggested to use a special indicator for quantitative characteristic of the degree of current danger of attack or unauthorized access to the ADPS CA, which can be calculated (measured) at any time – index of current risks (ICR) )(XCC ICRICR  , where ),...,,...,( 1 MIi ICRICRICRICR xxxX  – vector of values of ICR, MI – the number of information threats. It is assumed that )10( ICRC . At the first step of work of the algorithm of ISMS the task of obtaining quantitative values that characterize the implementation of ijFIS of MIP of ADPS CA. For each of the functions of IS ( ijFIS ) such value is the probability that a certain function of IS – ijFIS , for example, control of integrity of software and information support, will be reliably performed within a certain time interval. At a given time interval  probability of trouble-free execution of iFIS based on the theory of reliability can be described by the following equation:   ,mti i T FIS P e     (2) where mti T – average time interval of trouble-free execution of .iFIS If it is needed to perform the assessment of costs Zi, necessary to ensure trouble-free implementation of iFIS of MIP of ADPS CA, it is possible to use the following relationship:   , i i i Z FISP e      (3) where i – the proportionality factor. The next step is to obtain a quantitative assessment of the figure of current informational risks arising from incomplete execution of ijFIS . The basic approaches to the analysis of ADPS CA vulnerabilities, and assessment of their degree of IS, are based on analytical calculations and simulation modelling. However, in MIP based on the fuzzy approach, especially with a large number of variables, it is practically impossible to take into account the synergism that can arise at co-occurrence of certain specific values of the individual variables, and it is impossible to ensure the account of differences in the importance of factors influencing the decision-making. These circumstances make it expedient to develop a technology that would be more consistent with the model, "a multi-dimensional input - output", and made it possible to take into account not only the value of the factors affecting the original variable, but also to determine the degree of importance of controlled parameters when making a decision, and their interaction in the necessary order. Considering all the above mentioned, in this ISMS block, the decision-making algorithms were used in the conditions of fuzzy input information when determining the dimensions of vulnerability of information resources of ADPS CA. The following assumptions are made:
  • 5. Development of a Model of Cyber Security Management for Automated Systems http://www.iaeme.com/IJCIET/index.asp 458 editor@iaeme.com 1. there is a set of controlled input parameters FISi p  1,2,...,i M , the estimates of which were obtained at the previous step of the algorithm, for example, mti T and iFISP ( iFISP – Pim – the probability of launch of communication centre service of software and information support of ADPS CA in the next working session); 2. it is necessary to obtain a quantitative estimate of the parameter )(XCC ICRICR  ; at the same time it should be considered that when the character of features is probabilistic (when solving the problem of recognition of cyber threats, cyber attacks and anomalies in ADPS CA – the parameter estimation task is ICRC ), i.e. when between the features and the measures to which they may be assigned, there are stochastic connections, it is appropriate to conduct the synthesis of algorithms, the recognition, based on the application of the theory of statistical decisions. In the situation when in ISMS there is a complete initial priori information, these results can be used directly. With incomplete initial information the recognition algorithms can also be based on the results of the theory of statistical decisions. Although in the latter case, these results can be used only by implementing algorithms of adaptive learning or self-learning. The next quantitative measure for the assessment is proposed ICRC : jMN , ( / ) IM , ( )i j i j P MN P MN    (4) where P(MNj) – the probability that a means (method) is used to prevent the threat to IS MNj; R1, R2– a sign of threat to IS of ADPS CA, for example, a sudden increase in traffic, if there is a system of features nSF of IS violation, i.e. value 1ICRC  , it is possible to use the following dependence:    L li iMN i iMNSFMN j j jnj IMIMIM , 1 ,   (5) where i = 1,…, θj – the number of independent features, describing the method MNj ; l = 1,…, L – the number of groups of independent features. there is a set of linguistic terms Т, characterizing the values of the input ( i v , where  v 1, iN , iN – the number of terms of the parameter FISi p ) and output ( j ,  1,j N , where N – the number of terms of the parameter CICR) parameters. An analytical model of the membership function of the variable i to the fuzzy term Т is represented in the following form [4]:   2 1 1 T              (6)
  • 6. K. Sauanova, S. Sagyndykova, V. Buriachok, N. Mazur, A. Anosov, S. Smirnov and V. Malyukov http://www.iaeme.com/IJCIET/index.asp 459 editor@iaeme.com where  and  – setting options of ijFIS ;  – max value of ijFIS ; ( ) 1T    – (  – the most pragmatic value of the variable i for the fuzzy term);  –concentration factor – stretching of FIS ( ijFIS ). For example, when implementing tests on penetration in ADPS CA [9], a series of N measurements of values of the controlled variables i was conducted, in the result of which the following matrix was obtained: 11 12 1 1 21 22 2 2 1 2 1 2 . i n i n l l li l n N N N i N n H                                      The first stage of simulation with fuzzy knowledge base consists of the formation with the expert information of the model of the evaluation object (Oi) by building a knowledge base. The second stage is necessary for setting the fuzzy model by its training on the experimental data. Training of ISMS model of ADPS CA lies in the selection of the parameters of membership functions by minimizing the difference between the experimental and theoretical data. Assuming that: { }iB b – knowledge base, where 1, ,i B    – number of objects (of evaluation) in the knowledge base, for example, integrity monitoring service – Pim; 1 i i A A    – the plurality of all attributes in the knowledge base (where { }i ijA a – the plurality ja – of the attribute over a plurality of objects Oi); 1,j m – the general number of attributes iO – of the object of MIP and ADPS CA. The solution includes the following stages: 1. Define the plurality   MiPP iFISFIS ,1:  , which can include all or selective evaluations of performance indicators of ijFIS MIP of ADPS CA, as well as the number of terms and their meanings for each of the monitored input parameters i .B  2. Build a fuzzy knowledge base B as a set of production rules of the kind        v 1, : : 1, : 1,i i j i M v N j N       . From the pre-built fuzzy logic conclusion system, we obtain the membership function for all elements of the set of FIS :      { : 1, , 1, }i v i iP i M v N   
  • 7. Development of a Model of Cyber Security Management for Automated Systems http://www.iaeme.com/IJCIET/index.asp 460 editor@iaeme.com and for ICRС :    { : 1, }jICRС j N  where i and  – input and output parameters with attributes – A. 1. On the base of numerical values of  iP  , characterizing the performance of security functions of MIP of ADPS CA, we obtain estimates of input parameters,   1,i M , corresponding to the current indicators of implementation of iFIS of MIP. 2. Conduct the fuzzification (comparison of the plurality of values of i its membership function, i.е. translation of values of i in the fuzzy format) of input parameters. Define the values of the membership functions corresponding to the estimates of the 4th step of the algorithm: i v P ,  1, iv N ,  1,i M 3. Define degree of truth for each of the production rules (PR) of ISMS of ADPS CA. 4. Construct the resulting membership function of ˆ ( )ICRС  for the output parameter taking into account the degrees of truth of all PR of ISMS of ADPS CA. 5. The calculation of probability indicators of IS for each class of IS threats is defined by the following iterative dependency [4]: 1 1 1 1 1 ( / ) ( ) ( / ) ( / ) 1 ( / ) P ( ) ( / ) ( ) ( / ) ( / ) 1 ( / ) j ICR j j n j n ICR j ICR j j n j n P MN P C P MN P MN SF P MN SF C P MN P C P MN P MN SF P MN SF                                                              (7) where  – the number of class of threats of IS of ADPS CA,  – the time of threats detection. Calculate the resulting value of ICRC of the output parameter as a result of defuzzification of a fuzzy plurality ˆ ( )ICRС  . It is assumed that the parameters’ ranking is carried out at the design stage of MIP of ADPS CA and is not the subject of this study. In this article let us consider in more detail the procedure of evaluation of ensuring the integrity of software and information support of ADPS CA. Flexibility of ADPS CA protection algorithms in the context of ensuring the integrity of information, comes down to the need to keep away the negative impact of integrity monitoring service (IMS) on the efficiency of data arrays processing procedures. The consequence of the absence of such restrictions is the diversion of resources of computer, first of all, of the temporary ones from the direct functional tasks of ADPS CA. At the same time the required parameters of IS are achieved through the stepwise organization of IMS.
  • 8. K. Sauanova, S. Sagyndykova, V. Buriachok, N. Mazur, A. Anosov, S. Smirnov and V. Malyukov http://www.iaeme.com/IJCIET/index.asp 461 editor@iaeme.com To support decision-making on IS of ADPS CA, the automated IM service management subsystem is implemented in ISMS. Accordingly, the estimate of the following criteria of quality monitoring of IM service functioning was performed [9]: the identity of functioning of ADPS CA with the set parameters – afЕ , the survivability of ADPS CA during the computer intrusion – taЕ . Evaluation of parameters afЕ and taЕ is performed using the model, based on semi- Markov processes [4, 7]. An assumption was made, that these processes are formed for a usual ADPS on the base of Е – network. The suggested model allows to take into account the probabilistic nature of transitions between states of ADPS, and also to take into account the selected technical means of information protection. In addition, distribution laws used in ADPS and time of transitions between these states of the system were analysed. The formalization of decision-making procedure is designed as a mathematical programming task. In the course of its decision it is necessary to choose an alternative Lal A out of the plurality of AL. The following conditions must be met: f ( ) max;аE al  (8) min( ) ;tа tаE al E (9) ( ) ( ) 1fa fаЕ al E al  (10) where Emin tа – set according to the technical task on ADPS constant; al – the alternative, characterized by controlled service functioning parameters of IMS in ADPS CA. 4. RESULTS During the simulation the influence of the controlled parameter imP was analysed – the probability of IM service launch (for example, of the software and information support) during the next start-up procedure of the standard ADPS CA and its IS subsystem. At the same time, depending on the returned by sensors indications, caused by selecting the corresponding SP, the values of parameters of the next launch of the IM service are determined. For a model ADPS they define which part of the controlled information is verified for integrity. In algorithms of protection of IP in a typical MIP only the principal possibility of launching the IM service is revealed. With the help of the developed programs complex [5, 6, 7] a complex study of the quality of functioning of a typical MIP from unauthorized access was carried out, with regard to the functioning of an automated working place on the base of a computer as a part of ADPS CA for a large railway unit. The calculation results in the form of dependencies )( imiaf PE and )( imita PE , criteria Еаf and Еta on the controlled parameter Pim for different variants of SP and a typical MIP of ADPS CA are shown on the graphs. On the pictures 3 and 4 the curves )( imiaf PE , )( imita PE are different in values maf 3600i1 and mta=60i correspondingly, where maf, mta – average values of maximum permissible time intervals between adjacent integrity checks and implementation of MIP from unauthorized access of protective functions of ADPS CA. The increase in the parameters shown in the graphs, is interpreted as an improvement (by this criterion) of the quality of IM service operation. The decrease corresponds to the
  • 9. Development of a Model of Cyber Security Management for Automated Systems http://www.iaeme.com/IJCIET/index.asp 462 editor@iaeme.com deterioration of indicators. Thus, on basis of the received dependencies, it is possible to make amendments in the algorithm of assessment of the current IS risk indicator – CICR [14, 15]. 5. CONCLUSIONS The following main results were obtained: A model of the company's information security management system is proposed; it is found that the model makes it possible to assess the risks levels of the IS violation, as well as provides support for the decision to counter the unauthorized access to ADPS CA; algorithms are developed for the implementation of the proposed model, allowing to respond quickly and make decisions in case of threats to IS. REFERENCES [1] Akhmetov, B. etc. (2019). Development of sectoral intellectualized expert systems and decision making support systems in cybersecurity, Advances in Intelligent Systems and Computing, 860, pp. 162–171. [2] Lakhno, V., Zaitsev, S., Tkach, Y., Petrenko, T. (2019). Adaptive expert systems development for cyber attacks recognition in information educational systems on the basis of signs’ clustering, Advances in Intelligent Systems and Computing, 754, pp. 673– 682. [3] Akhmetov, B., Balgabayeva, L., etc. (2019). Mobile platform for decision support system during mutual continuous investment in technology for smart city, Studies in Systems, Decision and Control, 199, pp. 731–742. [4] Akhmetov, B., Lakhno, V., Akhmetov, B., Myakuhin, Y., Adranova, A., Kydyralina, L. (2019). Models and algorithms of vector optimization in selecting security measures for higher education institution’s information learning environment, Advances in Intelligent Systems and Computing, 860, pp. 135–142. [5] Lakhno, V., Kasatkin, D., Kozlovskyi, V., Petrovska, S., Boiko, Y., Kravchuk, P., Lishchynovska, N. (2019). A model and algorithm for detecting spyware in medical information systems, International Journal of Mechanical Engineering and Technology, (1), pp. 287–295. [6] Lakhno, V., Tsiutsiura, S., Ryndych, Y., Blozva, A., Desiatko, A., Usov, Y., Kaznadiy, S. (2019). Optimization of information and communication transport systems protection tasks, International Journal of Civil Engineering and Technology, 10 (1), pp. 1–9. [7] Lakhno, V., Buriachok, V., Parkhuts, L., Tarasova, H., Kydyralina, L., Skladannyi, P., Skrypnyk, M., Shostakovska, A. (2018). Development of a conceptual model of adaptive access rights management with using the apparatus of petri nets, International Journal of Civil Engineering and Technology, 9 (11), pp. 95–104. [8] Akhmetov, B., etc. (2018). Model for a computer decision support system on mutual investment in the cybersecurity of educational institutions, International Journal of Mechanical Engineering and Technology, 9 (10), pp. 1114–1122. [9] Lakhno, V., Akhmetov, B., Korchenko, A., Alimseitova, Z., Grebenuk, V. (2018). Development of a decision support system based on expert evaluation for the situation center of transport cybersecurity, Journal of Theoretical and Applied Information Technology, 96 (14), pp. 4530–4540. [10] Akhmetov, B., Lakhno, V. (2018). System of decision support in weaklyformalized problems of transport cybersecurity ensuring, Journal of Theoretical and Applied Information Technology, 96 (8), pp. 2184–2196. [11] Lakhno, V., Akhmetov, B., Malyukov, V., Kartbaev, T. (2018). Modeling of the decision- making procedure for financing of cyber security means of cloud services by the medium
  • 10. K. Sauanova, S. Sagyndykova, V. Buriachok, N. Mazur, A. Anosov, S. Smirnov and V. Malyukov http://www.iaeme.com/IJCIET/index.asp 463 editor@iaeme.com of a bilinear multistep quality game with several terminal surfaces, International Journal of Electronics and Telecommunications, 64 (4), pp. 467–472. [12] Lakhno, V.A., Kravchuk, P.U., Pleskach, V.L., Stepanenko, O.P., Tishchenko, R.V., Chernyshov, V.A. (2017). Applying the functional effectiveness information index in cybersecurity adaptive expert system of information and communication transport systems, Journal of Theoretical and Applied Information Technology, 95 (8), pp. 1705– 1714. [13] Akhmetov, B. etc. (2017). Designing a decision support system for the weakly formalized problems in the provision of cybersecurity, Eastern-European Journal of Enterprise Technologies, 1 (2-85), pp. 4–15. [14] Borowik, Bohdan, et al. Theory of Digital Automata. Vol. 63. Springer Science & Business Media, 2012. [15] Smirniy, M., etc. (2009). The research of the conflict request threads in the data protection systems. Proceedings of Lugansk branch of the International Academy of Informatization, 2(20), pp. 23–30. [16] Petrov, O., Borowik, B., Karpinskyy, M., etc. (2016). Immune and defensive corporate systems with intellectual identification of threats. Pszczyna: Śląska Oficyna DrukarskaGordon, L. A., & Loeb, M. P. (2002). The Economics of Information Security Investment. ACM Transactions On Information and System Security (TISSEC), 5(4), pp. 438–457.