Log in

Models for Assessing the Security of Network Information Systems against Negative External Influences

  • INTELLIGENT SYSTEMS
  • Published:
Automatic Documentation and Mathematical Linguistics Aims and scope

Abstract

The structure of an intelligent information system that has been designed to protect the network information system from unauthorized external influences by various parrying means is described. The conditions for the stable functioning of the network information system are presented. An optimization problem has been formulated, which consists in the need to minimize the negative external influence on the network information system using parrying means of the designed intelligent information system. This problem has been divided into four subproblems, analytical models have been created for their solution, algorithms have been developed, and two examples of analytical solutions of problems of optimal distribution of negative external influences by the elements of the network information system without taking the mutual influence of system elements into account and taking them into account are shown.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.
Fig. 2.

Similar content being viewed by others

REFERENCES

  1. Gromov, Yu.Yu. and Tyutyunnik, V.M., Materials for the information theory elaboration. 1. Information quantity and quality measures, J. Int. Sci. Publ.: Mater. Methods Technol., 2011, vol. 5, no. 1, pp. 230–241.

    Google Scholar 

  2. Gromov, Yu.Yu. and Tyutyunnik, V.M., Materials to development of the information theory, part 1: Measures of quantity and quality of information, Fundam. Issled., 2011, no. 8-2, pp. 347–355.

  3. Gromov, Yu.Yu., Tyutyunnik, V.M., and Minin, Yu.V., Materials to the theory of information elaboration. 2. Information as tensor quantity and information system modelling, Int. J. Res. Eng., IT Soc. Sci., 2018, vol. 8, no. 6, pp. 1–14.

    Article  Google Scholar 

  4. Gromov, Yu.Yu., Tyutyunnik, V.M., and Minin, Yu.V., Materials to the theory of information elaboration. 3. Information systems modelling, in Materialy XVIII Mezhdunarodnoi nauchnoi konferentsii Formirovanie professionala v usloviyakh regiona: novye podkhody, Tambov, 2018 (Materials of the 18th Int. Scientific Conf. on Formation of a Specialist Under Regional Conditions: Novel Approaches), Tyutyunnik, V.M. and Zernov, V.A., Eds., Tambov: Mezhdunarod. Inf. Novelevskii Tsentr, 2018, pp. 87–106.

  5. Gromov, Yu.Yu., Tyutyunnik, V.M., and Minin, Yu.V., Materials for the information theory elaboration. 4. Tensor measurement of information for information system modelling, in Informatsionnye sistemy i protsessy: Sb. nauchnykh trudov (Information Systems and Processes), Tyutyunnik, V.M, Ed., Tambov: Mezhdunarod. Inf. Novelevskii Tsentr, 2018, pp. 7–28.

  6. Tyutyunnik, V.M., Gromov, Yu.Yu., and Aleksandrov, E.Yu., Analytical models of parrying negative external influences on a network information system, Autom. Doc. Math. Linguist., 2020, vol. 54, no. 5, pp. 250–254.  https://doi.org/10.3103/S0005105520050040

    Article  Google Scholar 

  7. Tyutyunnik, V.M., Gromov, Yu.Yu., and Aleksandrov, E.Yu., Analytical models of negative external influences vaporizing on the network information system, Autom. Doc. Math. Linguist., 2020, vol. 54, no. 5, pp. 250–254.  https://doi.org/10.3103/S0005105520050040

    Article  Google Scholar 

  8. Liang, X. and **ao, Ya., Game theory for network security, IEEE Commun. Surv. Tutorials, 2013, vol. 15, no. 1, pp. 472–486.  https://doi.org/10.1109/SURV.2012.062612.00056

    Article  Google Scholar 

  9. Gupta, M., Rees, J., Chaturvedi, A., and Chi, J., Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach, Decis. Supp. Syst., 2006, vol. 41, no. 3, pp. 592–603.  https://doi.org/10.1016/j.dss.2004.06.004

    Article  Google Scholar 

  10. Hashemi, S.M., He, J., and Basabi, A.E., Multi-objective optimization for computer security and privacy, Int. J. Network Secur., 2017, vol. 19, no. 3, pp. 394–405.  https://doi.org/10.6633/IJNS.201703.19(3).08

    Article  Google Scholar 

  11. Dewri, R., Poolsappasit, N., Ray, I., and Whitley, D., Optimal security hardening using multi-objective optimization on attack tree models of networks, in Proc. 14th ACM Conf. on Computer and Communications Security, Alexandria, Va., 2007, New York: Association for Computing Machinery, 2007, pp. 204–213.  https://doi.org/10.1145/1315245.1315272

  12. Firesmith, D.G., Common concepts underlying safety, security, and survivability engineering, Pittsburgh, Pa.: Carnegie Mellon Univ., 2003.

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Yu. Yu. Gromov or V. M. Tyutyunnik.

Additional information

Translated by O. Pismenov

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Gromov, Y.Y., Tyutyunnik, V.M. Models for Assessing the Security of Network Information Systems against Negative External Influences. Autom. Doc. Math. Linguist. 55, 196–202 (2021). https://doi.org/10.3103/S0005105521050071

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0005105521050071

Keywords:

Navigation