EFFICIENCY OF THE INDICATORS INVESTMENT CALCULATION METHOD IN THE INFORMATION SECURITY SYSTEM OF INFORMATION OBJECTS

Author:

Chubaievskyi Vitaliy1ORCID,Lakhno Valery2ORCID,Kryvoruchko Olena1ORCID,Kasatkin Dmytro2ORCID,Desiatko Alona1ORCID,Blozva Andrii2ORCID,Gusev Boris2ORCID

Affiliation:

1. Kyiv National University of Trade and Economics

2. National University of Life and Environmental Sciences of Ukraine

Abstract

The article describes the methodology of multi-criteria optimization of costs for the information protection system of the object of informatization. The technique is based on the use of a modified VEGA genetic algorithm. A modified algorithm for solving the MCO problem of parameters of a multi-circuit information protection system of an informatization object is proposed, which makes it possible to substantiate the rational characteristics of the ISS components, taking into account the priority metrics of OBI cybersecurity selected by the expert. In contrast to the existing classical VEGA algorithm, the modified algorithm additionally applies the Pareto principle, as well as a new mechanism for the selection of population specimens. The Pareto principle applies to the best point. At this point, the solution, interpreted as the best, if there is an improvement in one of the cybersecurity metrics, and strictly no worse in another metric (or metrics). The new selection mechanism, in contrast to the traditional one, involves the creation of an intermediate population. The formation of an intermediate population occurs in several stages. At the first stage, the first half of the population is formed based on the metric - the proportion of vulnerabilities of the object of informatization that are eliminated in a timely manner. At the second stage, the second half of the intermediate population is formed based on the metric - the proportion of risks that are unacceptable for the information assets of the informatization object. Further, these parts of the intermediate population are mixed. After mixing, an array of numbers is formed and mixed. At the final stage of selection for crossing, specimens (individuals) will be taken by the number from this array. The numbers are chosen randomly. The effectiveness of this technique has been confirmed by practical results

Publisher

Borys Grinchenko Kyiv University

Subject

General Medicine

Reference21 articles.

1. CAPTURE: Cyberattack Forecasting Using Non-Stationary Features with Time Lags;Okutan;In 2019 IEEE Conference on Communications and Network Security (CNS) (pp,2019

2. Barreto, C., & Koutsoukos, X. (2019, October). Design of Load Forecast Systems Resilient Against Cyber-Attacks. In International Conference on Decision and Game Theory for Security (pp. 1-20). Springer, Cham.

3. Design of cyber warfare testbed;Chandra;In Software Engineering (pp,2019

4. Cyber attack detection and mitigation: Software Defined Survivable Industrial Control Systems;Sándor;International Journal of Critical Infrastructure Protection,2019

5. Chiba, Z., Abghour, N., Moussaid, K., El Omri, A., & Rida, M. (2019). New Anomaly Network Intrusion Detection System in Cloud Environment Based on Optimized Back Propagation Neural Network Using Improved Genetic Algorithm. International Journal of Communication Networks and Information Security, 11(1), 61-84.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3