Application of Machine Learning Technologies for Managing Multifactor Threats in an Integrated Model of Cognitive Security Center at Defense Industry Enterprise
Abstract
The presented innovative model of the cognitive security center, based on machine learning technologies, represents a significant advancement in effectively managing multifactor threats in defense-industrial complex enterprises. This article provides a detailed examination of key elements of this model, including data analysis, anomaly detection, threat response, classification and optimization, as well as the notification system.
Particular attention is given to the model's ability to integrate data from various sources in real-time, enabling swift responses to diverse threats and providing a comprehensive overview of the enterprise's security. The model effectively demonstrates the application of machine learning algorithms, efficiently processing anomalies and responding to threats, offering real-time operational security management solutions.
Additionally, the article underscores the importance of the dynamic adaptation of machine learning algorithms to new threats, imparting resilience to the system in a constantly changing security environment. Efficient threat response management is ensured through automated security protocols, expediting decision-making processes and significantly reducing potential risks for the enterprise.
A crucial component of the model is the role of the notification system, playing a key role in operational communication with security personnel and responsible structures upon threat detection. This facilitates swift and targeted actions, directed towards neutralizing the threat or minimizing its potential consequences. Such a modern and effective approach to security management provides a comprehensive and integrated strategy for ensuring security in defense-industrial complex enterprises, offering real-time protection.
References
2. Trofimov O.V., Sahakyan A.G. Digitalization and the problem of ensuring information security in the military-industrial companies of the Russian Federation. Creative Economics. 2023;17(9):3331-3344. (In Russ., abstract in Eng.) https://doi.org/10.18334 /ce.17.9.119149
3. Kazmina I.V., Potudinsky A.V., Kryuchkov R.A. Ensuring information security at high-tech enterprises in the military-industrial. Digital and sectoral economics. 2023;(3):40-46. (In Russ., abstract in Eng.) EDN: OSIIAN
4. Kartashev E.N., Krasovsky V.S. Information security of a modern enterprise engaged in defense-industrial sector. Information security issues. 2016;(4):41-46. (In Russ., abstract in Eng.) EDN: XEHNRP
5. Panilov P.A., Tsibizova T.Yu, Chernega E.V. Development of an algorithm for managing cognitive functions in intelligent security systems. Izvestiya Tula State University. Technical sciences. 2023;(10):47-61. (In Russ., abstract in Eng.) https://doi.org/10.24412/2071-6168-2023-10-47-48
6. Panilov P., Tsibizova T., Voskresensky G. Methodology of Expert-Agent Cognitive Modeling for Preventing Impact on Critical Information Infrastructure. In: Jordan V., Tarasov I., Shurina E., Filimonov N., Faerman V.A. (eds.) High-Performance Computing Systems and Technologies in Scientific Research, Automation of Control and Production. HPCST 2023. Communications in Computer and Information Science. Vol. 1986. Cham: Springer; 2024. p. 276-287. https://doi.org/10.1007/978-3-031-51057-1_21
7. Kotenko I.V., Fedorchenko E.V., Novikova E.S., et al. Methodology of data collection for security analysis of industrial cyber-physical systems. Voprosy kiberbezopasnosti = Cybersecurity issues. 2023;(5):69-79. (In Russ., abstract in Eng.) https://doi.org/10.21681/2311-3456-2023-5-69-79
8. Bogdanov V.V., Domukhovsky N.A., Levchuk D.V., et al. Identification of anomalies in the operation of information systems using machine learning. Information protection. Inside. 2020;(3):31-35. (In Russ., abstract in Eng.) EDN: HKYWZR
9. Mistrov L.E. Method of synthesis of information security systems of organizational and technical systems. Devices and systems. Management, control, diagnostics. 2010;(10):4-11. (In Russ., abstract in Eng.) EDN: MWLUBD
10. Aslamova E.A., Krivov M.V., Aslamova V.S. Information system of estimation of level of industrial safety based on the technology of expert systems. Reshetnev readings. 2018;(2):221-223. (In Russ., abstract in Eng.) EDN: YTFPBJ
11. Yang X., Zhu C. Industrial Expert Systems Review: A Comprehensive Analysis of Typical Applications. IEEE Access. 2024;12:88558-88584. https://doi.org/10.1109/ACCESS.2024.3419047
12. Kurmanbai A.K., Nozirzoda S.S. The developed system of information security criteria for the implementation of information systems. Nauchnyj jelektronnyj zhurnal Novaja nauka: ot idei k rezul'tatu. 2016;(5-2):175-178. (In Russ., abstract in Eng.) EDN: VZGJZN
13. Valeev R.R., Orlov S.P. Organization of information security systems based on a computer decision support system. Nauka i mir = Science and World. 2018;(6-1):16-21. (In Russ., abstract in Eng.) EDN: UCUGKD
14. Gromov Yu.Yu, Eliseev A.I., Diedrich V.E., Ulanov A.O. Mathematical support of the system for monitoring the state of reliability and security of a network-centric information system. Information and Security. 2015;18(4):602-607. (In Russ., abstract in Eng.) EDN: VADQBN
15. Kalimulina E.Y. Math Modeling of the Reliability Control and Monitoring System of Complex Network Platforms. In: Abraham A., Cherukuri A., Melin P., Gandhi N. (eds.) Intelligent Systems Design and Applications. ISDA 2018 2018. Advances in Intelligent Systems and Computing. Vol. 941. Cham: Springer; 2020. p. 230-237. https://doi.org/10.1007/978-3-030-16660-1_23
16. Prokopenko A.N., Kovaleva E.G., Vasyutkina D.I. The organization of information security systems on the basis of the computer decision support system. Bulletin of the Belgorod State Technological University named after V.G. Shukhov. 2016;(2):138-140. (In Russ., abstract in Eng.) EDN: VHIKAD
17. Gvozdev D.B., Arkhangelsky O.D. Enhancing the information security of automated dispatch control systems in electric power systems. Vestnik Moskovskogo Energeticheskogo Instituta = Vestnik MEI / Bulletin of MPEI. 2019;(3):27-36. (In Russ., abstract in Eng.) https://doi.org/10.24160/1993-6982-2019-3-27-36
18. Tokarev A.A. [Information security systems as the basis of information security, and methods for improving the efficiency of these systems]. Territorija nauki = The territory of science. 2012;(3):63-67. (In Russ.) EDN: UCSHJB
19. Berketov G.A., Mikryukov A.A., Fedoseev S.V. [Optimization of the information security system in automated information systems]. Innovacii na osnove informacionnyh i kommunikacionnyh tehnologij = Innovations based on information and communication technologies. 2010;(1):331-334. (In Russ.) EDN: RWEAND
20. Starzec M., Kordana-Obuch S., Piotrowska B. Evaluation of the Suitability of Using Artificial Neural Networks in Assessing the Effectiveness of Greywater Heat Exchangers. Sustainability. 2024;16(7):2790. https://doi.org/10.3390/su16072790
21. Garifullina L.A., Isavnin A.G. [Assessment of the relevance and effectiveness of the integration of artificial neural networks in information security systems]. Modern Science. 2021;(3-2):467-472. (In Russ.) EDN: OHQNOM
22. Wu B., Xu J., Zhang Y., Liu B., Gong Y., Huang J. Integration of computer networks and artificial neural networks for an AI-based network operator. Applied and Computational Engineering. 2024;64:114-119. https://doi.org/10.54254/2755-2721/64/20241370
23. Lipatnikov V.A., Shevchenko A.A. A Mathematical model of information security management process for a distributed information system under conditions of unauthorized attacker impact. Information systems and Technologies. 2022;(3):121-130. (In Russ., abstract in Eng.) EDN: KSBCGK
24. Kozin I.S. Providing personal data protection in an information system based on user behavior analytics. Information management systems. 2018;(3):69-78. (In Russ., abstract in Eng.) https://doi.org/10.15217 / issn1684-8853.2018.3.69
25. Karpova N.E., Babinova A.A. Ensuring the security of personal data in the enterprise information system. Bezopasnost' tsifrovykh tekhnologii = Digital Technology Security. 2024;(2):55-68. (In Russ., abstract in Eng.) https://doi.org/10.17212/2782-2230-2024-2-55-68

This work is licensed under a Creative Commons Attribution 4.0 International License.
Publication policy of the journal is based on traditional ethical principles of the Russian scientific periodicals and is built in terms of ethical norms of editors and publishers work stated in Code of Conduct and Best Practice Guidelines for Journal Editors and Code of Conduct for Journal Publishers, developed by the Committee on Publication Ethics (COPE). In the course of publishing editorial board of the journal is led by international rules for copyright protection, statutory regulations of the Russian Federation as well as international standards of publishing.
Authors publishing articles in this journal agree to the following: They retain copyright and grant the journal right of first publication of the work, which is automatically licensed under the Creative Commons Attribution License (CC BY license). Users can use, reuse and build upon the material published in this journal provided that such uses are fully attributed.