Preview

Advanced Engineering Research (Rostov-on-Don)

Advanced search

Algorithm of software package of intellectual decision support when designing cyber security system at the enterprise

https://doi.org/10.23947/1992-5980-2020-20-2-178-187

Abstract

Introduction. To increase the decision-making efficiency at the enterprise, it is advisable to use a special software package of intellectual support. Such a product is necessary when designing an information security system and increasing its invulnerability during modernization or configuration changes. Research objectives are as follows: to develop an algorithm and a mathematical model of the software package for intellectual decision support.

Materials and Methods. The decision support method under designing an information security system is based on the use of a neural network (multilayer perceptron). For an objective assessment of the initial security of an information system (IS), a mathematical model for the analysis of security events is developed.

Results. The statistics of malicious attacks on the IS of enterprises is analyzed. The need for timely and accurate modernization of the information protection system is determined. Important characteristics of the designing an information security system are the speed at which the result is obtained and the reduction in the residual risk of IS. In this regard, the use of artificial intelligence systems in the process of determining the best set of protection subsystems is important. The threats to cyber security (CS) are classified. The main classes of security events are defined. A mathematical model of the neural network is developed; the input parameters of its operation are indicated. The current enterprise IS generates numerous events which necessitates the automatic collection and analysis of data from subsystems for registering IS objects. The process of analyzing security events is considered in detail since the adequacy of the generated design decisions depends on the correctness of the data obtained in this way. The algorithm of the software package is formed.

Discussion and Conclusions. The results can be used in the design of the information security system at the enterprise. In addition, CS administrators can use the developed software package to adjust the configuration settings of information security tools. The proposed solution will minimize the destructive influence of the developer of the security system which may and happen to be subjective.

About the Authors

E. A. Vitenburg
Volgograd State University
Russian Federation

Volgograd.



A. V. Nikishova
Volgograd State University
Russian Federation

Volgograd.



References

1. Maiorova EV. Metodicheskie aspekty reagirovaniya na intsidenty informatsionnoi bezopasnosti v usloviyakh tsifrovoi ehkonomiki [Methodological aspects of responding to information security incidents in the digital economy]. Saint-Petersburg Economic Journal. 2020;1. URL: https://cyberleninka.ru/article/n/metodicheskie-aspekty-reagirovaniya-na-intsidenty-informatsionnoy-bezopasnosti-v-usloviyah-tsifrovoyekonomiki (accessed 24.02.2020). (In Russ.)

2. Bratchenko AI, Butusov IV, Kobelyan AM, et al. Primenenie metodov teorii nechetkikh mnozhestv k otsenke riskov na-rusheniya kriticheski vazhnykh svoistv zashchishchaemykh resursov avtomatizirovannykh sistem upravleniya [Application of methods of theory of fuzzy sets to assess the risk of violations of critical properties protected resources automated control system]. Cybersecurity Issues. 2019;1(29). URL: https://cyberleninka.ru/article/n/primenenie-metodov-teorii-nechetkih-mnozhestv-k-otsenke-riskovnarusheniya-kriticheski-vazhnyh-svoystv-zaschischaemyh-resursov (accessed: 24.04.2020). (In Russ.)

3. Maiorova EV. Metodicheskie aspekty reagirovaniya na intsidenty informatsionnoi bezopasnosti v usloviyakh tsifrovoi ehkonomiki [Methodological aspects of responding to information security incidents in the digital economy]. Saint-Petersburg Economic Journal. 2020;1. URL: https://cyberleninka.ru/article/n/metodicheskie-aspekty-reagirovaniya-na-intsidenty-informatsionnoy-bezopasnosti-v-usloviyah-tsifrovoyekonomiki (accessed 24.02.2020). (In Russ.)

4. Bratchenko AI, Butusov IV, Kobelyan AM, et al. Primenenie metodov teorii nechetkikh mnozhestv k otsenke riskov na-rusheniya kriticheski vazhnykh svoistv zashchishchaemykh resursov avtomatizirovannykh sistem upravleniya [Application of methods of theory of fuzzy sets to assess the risk of violations of critical properties protected resources automated control system]. Cybersecurity Issues. 2019;1(29). URL: https://cyberleninka.ru/article/n/primenenie-metodov-teorii-nechetkih-mnozhestv-k-otsenke-riskovnarusheniya-kriticheski-vazhnyh-svoystv-zaschischaemyh-resursov (accessed: 24.04.2020). (In Russ.)

5. Bratchenko AI, Butusov IV, Kobelyan AM, et al. Primenenie metodov teorii nechetkikh mnozhestv k otsenke riskov na-rusheniya kriticheski vazhnykh svoistv zashchishchaemykh resursov avtomatizirovannykh sistem upravleniya [Application of methods of theory of fuzzy sets to assess the risk of violations of critical properties protected resources automated control system]. Cybersecurity Issues. 2019;1(29). URL: https://cyberleninka.ru/article/n/primenenie-metodov-teorii-nechetkih-mnozhestv-k-otsenke-riskovnarusheniya-kriticheski-vazhnyh-svoystv-zaschischaemyh-resursov (accessed: 24.04.2020). (In Russ.)

6. Vitenburg EA. Matematicheskaya model' intellektual'noi podderzhki prinyatiya reshenii pri proektirovanii sistemy zashchity informatsii na predpriyatii [Mathematical model of intellectual decision support when designing an enterprise information security system]. In: Industrial Automatic Control Systems and Controllers. Moscow: Nauchtekhlitizdat; 2019. P. 54–60. (In Russ.)

7. Vitenburg EA. Matematicheskaya model' intellektual'noi podderzhki prinyatiya reshenii pri proektirovanii sistemy zashchity informatsii na predpriyatii [Mathematical model of intellectual decision support when designing an enterprise information security system]. In: Industrial Automatic Control Systems and Controllers. Moscow: Nauchtekhlitizdat; 2019. P. 54–60. (In Russ.)

8. Vitenburg EA. Matematicheskaya model' intellektual'noi podderzhki prinyatiya reshenii pri proektirovanii sistemy zashchity informatsii na predpriyatii [Mathematical model of intellectual decision support when designing an enterprise information security system]. In: Industrial Automatic Control Systems and Controllers. Moscow: Nauchtekhlitizdat; 2019. P. 54–60. (In Russ.)

9. Vitenburg EA, Levtsova AA. Vybor ehlementov kompleksa zashchity informatsionnoi sistemy predpriyatiya na osnove trebovanii normativno-pravovykh dokumentov [Selecting safety package components of enterprise information system following requirements of standard legal documents]. Vestnik of DSTU. 2018;3:333–338. (In Russ.)

10. Vitenburg EA, Levtsova AA. Vybor ehlementov kompleksa zashchity informatsionnoi sistemy predpriyatiya na osnove trebovanii normativno-pravovykh dokumentov [Selecting safety package components of enterprise information system following requirements of standard legal documents]. Vestnik of DSTU. 2018;3:333–338. (In Russ.)

11. Vitenburg EA, Levtsova AA. Vybor ehlementov kompleksa zashchity informatsionnoi sistemy predpriyatiya na osnove trebovanii normativno-pravovykh dokumentov [Selecting safety package components of enterprise information system following requirements of standard legal documents]. Vestnik of DSTU. 2018;3:333–338. (In Russ.)

12. Stepanova ES, Mashkina IV, Vasil'ev VI. Razrabotka modeli ugroz na osnove postroeniya nechetkoi kognitivnoi karty dlya chislennoi otsenki riska narusheniya informatsionnoi bezopasnosti [Development of threats model on the basis of fuzzy cognitive maps contraction for information risk numerical estimation]. Izvestiya SFedU. Engineering Sciences. 2010;11(112):31–40. URL: https://cyberleninka.ru/article/n/razrabotka-modeli-ugroz-na-osnove-postroeniya-nechetkoy-kognitivnoy-kartydlya-chislennoy-otsenki-riska-narusheniya-informatsionnoy (accessed 24.04.2020). (In Russ.)

13. Stepanova ES, Mashkina IV, Vasil'ev VI. Razrabotka modeli ugroz na osnove postroeniya nechetkoi kognitivnoi karty dlya chislennoi otsenki riska narusheniya informatsionnoi bezopasnosti [Development of threats model on the basis of fuzzy cognitive maps contraction for information risk numerical estimation]. Izvestiya SFedU. Engineering Sciences. 2010;11(112):31–40. URL: https://cyberleninka.ru/article/n/razrabotka-modeli-ugroz-na-osnove-postroeniya-nechetkoy-kognitivnoy-kartydlya-chislennoy-otsenki-riska-narusheniya-informatsionnoy (accessed 24.04.2020). (In Russ.)

14. Stepanova ES, Mashkina IV, Vasil'ev VI. Razrabotka modeli ugroz na osnove postroeniya nechetkoi kognitivnoi karty dlya chislennoi otsenki riska narusheniya informatsionnoi bezopasnosti [Development of threats model on the basis of fuzzy cognitive maps contraction for information risk numerical estimation]. Izvestiya SFedU. Engineering Sciences. 2010;11(112):31–40. URL: https://cyberleninka.ru/article/n/razrabotka-modeli-ugroz-na-osnove-postroeniya-nechetkoy-kognitivnoy-kartydlya-chislennoy-otsenki-riska-narusheniya-informatsionnoy (accessed 24.04.2020). (In Russ.)

15. Vitenburg EA, Levtsova AA. Model' ugroz informatsionnoi sistemy predpriyatiya [Model of threats of enterprise information system]. Industrial Automatic Control Systems and Controllers. 2018;9:46–50. (In Russ.)

16. Vitenburg EA, Levtsova AA. Model' ugroz informatsionnoi sistemy predpriyatiya [Model of threats of enterprise information system]. Industrial Automatic Control Systems and Controllers. 2018;9:46–50. (In Russ.)

17. Vitenburg EA, Levtsova AA. Model' ugroz informatsionnoi sistemy predpriyatiya [Model of threats of enterprise information system]. Industrial Automatic Control Systems and Controllers. 2018;9:46–50. (In Russ.)

18. Bova VV, Dukkart AN. Primenenie iskusstvennykh neironnykh setei dlya kollektivnogo resheniya intellektual'nykh zadach [Application of artificial neural networks for collective decision of complex intelligent problems]. Izvestiya SFedU. Engineering Sciences. 2012;7(132):131–138. (In Russ.)

19. Bova VV, Dukkart AN. Primenenie iskusstvennykh neironnykh setei dlya kollektivnogo resheniya intellektual'nykh zadach [Application of artificial neural networks for collective decision of complex intelligent problems]. Izvestiya SFedU. Engineering Sciences. 2012;7(132):131–138. (In Russ.)

20. Bova VV, Dukkart AN. Primenenie iskusstvennykh neironnykh setei dlya kollektivnogo resheniya intellektual'nykh zadach [Application of artificial neural networks for collective decision of complex intelligent problems]. Izvestiya SFedU. Engineering Sciences. 2012;7(132):131–138. (In Russ.)

21. Smolyak DS, Pulko TA. Monitoring sobytii informatsionnoi bezopasnosti tekhnogennykh ob"ektov [Monitoring of information security events of technogenic objects]. In: Reports of the Belarusian State University of Informatics and Radioelectronics. Minsk: BSUIR Publ. House; 2015. P. 43–47. (In Russ.)

22. Smolyak DS, Pulko TA. Monitoring sobytii informatsionnoi bezopasnosti tekhnogennykh ob"ektov [Monitoring of information security events of technogenic objects]. In: Reports of the Belarusian State University of Informatics and Radioelectronics. Minsk: BSUIR Publ. House; 2015. P. 43–47. (In Russ.)

23. Smolyak DS, Pulko TA. Monitoring sobytii informatsionnoi bezopasnosti tekhnogennykh ob"ektov [Monitoring of information security events of technogenic objects]. In: Reports of the Belarusian State University of Informatics and Radioelectronics. Minsk: BSUIR Publ. House; 2015. P. 43–47. (In Russ.)

24. Mashkina IV, Sentsova AYu, Guzairov MN, et al. Ispol'zovanie metodov sistemnogo analiza dlya resheniya problemy obespecheniya bezopasnosti sovremennykh informatsionnykh sistem [Use of system analysis methods for the solution of information protection problem of information systems]. Izvestiya SFedU. Engineering Sciences. 2011;12(125):25–35. (In Russ.)

25. Mashkina IV, Sentsova AYu, Guzairov MN, et al. Ispol'zovanie metodov sistemnogo analiza dlya resheniya problemy obespecheniya bezopasnosti sovremennykh informatsionnykh sistem [Use of system analysis methods for the solution of information protection problem of information systems]. Izvestiya SFedU. Engineering Sciences. 2011;12(125):25–35. (In Russ.)

26. Mashkina IV, Sentsova AYu, Guzairov MN, et al. Ispol'zovanie metodov sistemnogo analiza dlya resheniya problemy obespecheniya bezopasnosti sovremennykh informatsionnykh sistem [Use of system analysis methods for the solution of information protection problem of information systems]. Izvestiya SFedU. Engineering Sciences. 2011;12(125):25–35. (In Russ.)

27. Astrakhov AV, Klimov SM, Sychev MP. Protivodeistvie komp'yuternym atakam. Tekhnologicheskie osnovy [Countering computer attacks. Technological basis]. Moscow: Bauman University Publ. House; 2013. 70 p. URL: http://wwwcdl.bmstu.ru/iu10/comp-atak-techno.pdf (accessed 18.05.2020). (In Russ.)

28. Astrakhov AV, Klimov SM, Sychev MP. Protivodeistvie komp'yuternym atakam. Tekhnologicheskie osnovy [Countering computer attacks. Technological basis]. Moscow: Bauman University Publ. House; 2013. 70 p. URL: http://wwwcdl.bmstu.ru/iu10/comp-atak-techno.pdf (accessed 18.05.2020). (In Russ.)

29. Astrakhov AV, Klimov SM, Sychev MP. Protivodeistvie komp'yuternym atakam. Tekhnologicheskie osnovy [Countering computer attacks. Technological basis]. Moscow: Bauman University Publ. House; 2013. 70 p. URL: http://wwwcdl.bmstu.ru/iu10/comp-atak-techno.pdf (accessed 18.05.2020). (In Russ.)


Review

For citations:


Vitenburg E.A., Nikishova A.V. Algorithm of software package of intellectual decision support when designing cyber security system at the enterprise. Vestnik of Don State Technical University. 2020;20(2):178-187. https://doi.org/10.23947/1992-5980-2020-20-2-178-187

Views: 622


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2687-1653 (Online)