DESIGN OF KNOWLEDGE BASE FOR CYBER SECURITY SYSTEMS ON THE BASIS OF SUBJECT IDENTIFICATION METHOD
-
Published:2020
Issue:8
Volume:4
Page:135-148
-
ISSN:2663-4023
-
Container-title:Cybersecurity: Education, Science, Technique
-
language:
-
Short-container-title:Cybersecurity
Author:
Lakhno Valerii1ORCID, Kasatkin Dmytro1ORCID, Misiura Maksym1ORCID, Husiev Borys1ORCID
Affiliation:
1. National University of Life and Environmental Sciences of Ukraine
Abstract
The article presents the results of research performed in the process of designing an expert system (ES) designed to assess the threats to information security (IS) of critical information facilities (CIF). The approach to designing of expert system on the basis of syllogisms and logic of predicates, and also a method of meaningful identification of objects of knowledge base (KB) is offered. The essence of the method is that each object of the database of the projected EU, is matched by a tuple of keywords (ToK), the significance of which is determined by experts. Thus, each database object is placed in accordance with the element of the finite fuzzy topological space of the database objects. Meaningful identification takes place on the distance between the objects of the database. The approach proposed in the work, in comparison with the decisions of other authors, has a number of advantages. Namely, it allows: to model different variants of cyber threat scenarios for CIF and their consequences; determine the contribution of each of the factors or components of the architecture of the IS CIF to the overall picture of the probability of a cyber threat to the CIF; model the interaction of all IS factors and, if necessary, visualize this interaction; calculate and further rank the values of cyber threat probabilities for CIF for specific threat scenarios; automate the processes of threat modeling through the use of developed software and significantly reduce the time for audit of threats. It is shown that the use of the method of meaningful identification allows to increase the adequacy of the models of the selected subject area, as well as to prevent erroneous introduction of the same judgments of experts and goals in the EU database, in particular by combining hierarchies of goals formed by different expert groups. It is shown that the method can also be used to find the goals of the hierarchy, the exact wording of which, according to keywords, is unknown.
Publisher
Borys Grinchenko Kyiv University
Reference26 articles.
1. Davies, J., Milward, D., Wang, C. W., & Welch, J. (2015). Formal model-driven engineering of critical information systems. Science of Computer Programming, 103, 88-113. DOI: https://doi.org/10.1016/j.scico.2014.11.004 2. Trauth, E. (2017). A research agenda for social inclusion in information systems. ACM SIGMIS Database: the Database for Advances in Information Systems, 48(2), 9-20. DOI: https://doi.org/10.1145/3084179.3084182 3. Shahbazian, E., & Rogova, G. (2016, November). Critical Aviation Information Systems Cybersecurity. In Meeting Security Challenges Through Data Analytics and Decision Support (Vol. 47, p. 308). IOS Press. 4. Paradice, D., Freeman, D., Hao, J., Lee, J., & Hall, D. (2018). A Review of Ethical Issue Considerations in the Information Systems Research Literature. Foundations and Trends® in Information Systems, 2(2), 117-236. DOI: http://dx.doi.org/10.1561/2900000012 5. Akhmetov, B., Lakhno, V., Malyukov, V., Sarsimbayeva, S., Zhumadilova, M., Kartbayev, T. (2019). Decision support system about investments in smart сity in conditions of incomplete information, International Journal of Civil Engineering and Technology, 10 (2), pp. 661-670.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
|
|