Methods for assessing the connectivity of an undirected bipolar labeled graph taking into account the destructive impact of external threats on its vertices

Author:

Voevodin V. A.1,Krahotin N. A.1

Affiliation:

1. National Research University of Electronic Technology

Abstract

Objective. The main arguments that position the problem of assessing the connectivity of the bipolar graph in relation to the conditions of destructive impact of external threats (threats) as relevant for assessing the vitality of information systems (IS) are discussed operating under conditions of information security threats.Method. The following are presented: formulation of the problem of assessing connectivity for conditions of exposure to threats; a brief overview of existing methods for structural modeling of bipolar structures; results of the analysis of the applicability of existing methods for assessing the stability of functioning (stability) of bipolar structures in relation to conditions of exposure to threats. The initial conditions are accepted: the stability of the information system as a whole depends deterministically on the stability of its structural elements and the network structure itself; the problem of assessing the connectivity of a two-pole structure is basic for assessing the connectivity of the corresponding multi-pole structures; the stability analysis of the impacted object is carried out using minimax criteria, and the result is presented in the form of the minimum value of the stability function and the moment in time of the occurrence of this event.Result. Limiting factors that prevent the use of existing methods to solve the problem have been identified. The main limiting factor is that existing methods are based on probabilistic stationary models that require representative statistics. The second, no less important limiting factor is that the situation characterizing the impact of threats is very dynamic (not stationary), the events themselves are very rare, and the assessment period is comparable to the period of response to threats, which does not allow obtaining effective assessments of sustainability. It is proposed to: generalize existing methods for conditions of non-stationary functioning process, for which, when assessing, take into account changes in the probabilistic characteristics of nodal elements over time; as an indicator characterizing connectivity, use the minimum value of the stability function determined during the period of exposure to threats. The price to pay for ensuring the sustainability of the functioning of the affected object under the influence of threats is the need to ensure structural redundancy.Conclusion. The results of the study can be used by persons who simulate both the object of impact and the processes of its functioning, to make a decision on ensuring the continuity of production processes under the conditions of the impact of threats.

Publisher

FSB Educational Establishment of Higher Education Daghestan State Technical University

Reference26 articles.

1. GOST R 59516–2021. Information Technology. Information security management. Rules for insurance of information security risks. Approved and put into effect by Order of the Federal Agency for Technical Regulation and Metrology dated May 20, 2021 N 420-st. M.: Standardinform. 2021: 20. (In Russ)

2. GOST R ISO/IEC 27005–2010 Information technology. Methods and means of ensuring safety. Information security risk management. Approved and put into effect by Order of the Federal Agency for Technical Regulation and Metrology dated November 30, 2010 N 632-р. Standardinform. 2012: 91. (In Russ)

3. Voevodin V. A. Genesis of the concept of structural stability of the information infrastructure of an automated production process management system to the impact of targeted threats to information security. Bulletin of the Voronezh Institute of the Federal Penitentiary Service of Russia. 2023; 2: 30–41. (In Russ)

4. Methodology for assessing threats to information security. Methodological document of the FSTEC of Russia dated February 5, 2021 // Official website of the FSTEC of Russia [Electronic resource]. – URL: https://fstec.ru/component/attachments/download/2919 (access date 04/08/2021). (In Russ)

5. Vasilyev V. I., Vulfin A. M., Kirillova A. D., Kuchkarova N. V. Methodology for assessing current threats and vulnerabilities based on cognitive modeling and Text Mining technologies. Control, Communication and Security Systems. 2021; 3: 110–134. DOI: 10.24412/2410-9916-2021-3-110-134. (In Russ)

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3