The Task of Developing Software for the Proactive Information Protection of an Automated System

Abstract

This work focuses on the development of proactive protection systems against information security threats that can operate in pseudo-real time mode and identify information security threats with minimal delay. These systems would be implemented on standard hardware and would help protect against information security risks. Present mathematical model is presented that describes the impact of negative processes on an automated system caused by both the interaction of an attacker with predetermined targets, acting on the basis of a formally described strategy, and random impacts on an automated system caused by both the actions of personnel and random factors. The article presents a methodology for implementing the presented model, based on the use of multiple simplified models interacting on the basis of a generalized algorithm, which allows the security system to operate in pseudo-real time mode, but at the same time ensure increased performance. The proposed structural diagram of both the entire system and its parts responsible for simulation modeling is presented. The proposed structural diagram of both the entire system and its parts responsible for simulation modeling is presented. A set of sensors required for identifying abnormal situations and a proposed architecture of a decision support system for the presence of an anomaly have been defined. Methods for determining sensor readings and criteria for their evaluation are presented. The proposed boundaries of responsibility and scope of application of the various models used in the core of the decision support system are described. A methodology for constructing a system for assessing quantitative indicators of the quality of the proposed protection system is proposed, and various options for its construction are described, which will allow assessing the system's ability to counteract various types of information security threats.

Author Biographies

Dmitry Aleksandrovich Abramov, Tula State University

Associate Professor of the Chair of Information Security, Cand. Sci. (Eng.)

Vyacheslav Leonidovich Tokarev, Tula State University

Associate Professor of the Chair of Information Security, Dr. Sci. (Eng.), Professor

References

1. Kuzior A., Tiutiunyk I., Zielińska A., Kelemen R. Cybersecurity and cybercrime: Current trends and threats. Journal of International Studies. 2024;17(2):220-239. https://doi.org/10.14254/2071-8330.2024/17-2/12
2. Perwej Yu., et al. A Systematic Literature Review on the Cyber Security. International Journal of Scientific Research and Management. 2021;09(12):669-710. https://doi.org/10.18535/ijsrm/v9i12.ec04
3. Riggs H., Tufail S., Parvez I., Tariq M., Khan M.A., Amir A., Vuda K.V., Sarwat A.I. Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure. Sensors. 2023;23(8):4060. https://doi.org/10.3390/s23084060
4. Unizhaev N.V. Osobennosti modelirovaniya ugroz bezopasnosti personalnyh dannyh dlya obespecheniya dostatochnogo urovnya zaschischennosti [Modeling threats to the personal data security to ensure a sufficient protection rate]. Voprosy innovatsionnoy ekonomiki. 2022;12(1):95-110. (In Russ., abstract in Eng.) https://doi.org/10.18334/vinec.12.1.114335
5. Klishin D.V., Chechulin A.A. Analiz standartov obespecheniya informatsionnoi bezopasnosti [Analysis of information security standards]. Sistemy analiza i obrabotki dannykh = Analysis and Data Processing Systems. 2023;(1):37-54. (In Russ., abstract in Eng.) https://doi.org/10.17212/2782-2001-2023-1-37-54
6. Bespalova N.V., et al. Analysis of foreign experience in the application of intelligent methods in the tasks of protecting objects of critical information infrastructure of the financial sector. Ingineering Journal of Don. 2024;(5):76-91. (In Russ., abstract in Eng.) EDN: CUNCOD
7. Tokarev V.L., Sychugov A.A. Method of auditing the protection of automated systems. Modeling, optimization and information technology. 2019;7(1):548-559. (In Russ., abstract in Eng.) https://doi.org/10.26102/2310-6018/2019.24.1.036
8. Bansal S., Ruby D., Bargoti R. A New Hybrid Ensemble Learning-Based Malware Detection Technique. In: Dassan P., Thirumaaran S., Subramani N. (Eds.) Intelligent Computing, Smart Communication and Network Technologies. ICICSCNT 2023. Communications in Computer and Information Science. Vol. 1970. Cham: Springer; 2024. p. 235-249. https://doi.org/10.1007/978-3-031-75957-4_20
9. Tokarev V.L. Recognition of rival''s strategy using actions detection. Proceedings of TUSUR University. 2014;(2):184-187. (In Russ., abstract in Eng.) EDN: SEBGVJ
10. Tokarev V.L. Formal Security Models. Chebyshevskii Sbornik. 2021;22(1):488-495. (In Russ., abstract in Eng.) https://doi.org/10.22405/2226-8383-2021-22-1-488-494
11. Borzenkova S.Yu., Tokarev V.L. Determination of actual threats based on the risk factors of destructive actions of a potential violator of the information security system ACS TP. Industrial Automatic Control Systems and Controllers. 2020;(10):52-55. (In Russ., abstract in Eng.) https://doi.org/10.25791/asu.10.2020.1229
12. Zhuk R.V. Method for Determining the Potential of an Information Security Intruder and Realizable Software Vulnerabilities. Proceedings of Telecommunication Universities. 2021;7(2):95-101. (In Russ., abstract in Eng.) https://doi.org/10.31854/1813-324X-2021-7-2-95-101
13. Tokarev V.L., Sychugov A.A. Software Security Estimation of Automated Systems. News of the Tula state university. Technical sciences. 2016;(11-1):157-165. (In Russ., abstract in Eng.) EDN: XDYLNP
14. Tokarev V.L., Sychugov A.A. Method for assessing the level of security risks of network nodes to improve the efficiency of placement of immune detectors. Modeling, Optimization and Information Technology. 2020;8(3):39. (In Russ., abstract in Eng.) https://doi.org/10.26102/2310-6018/2020.30.3.021
15. Tokarev V.L. Hidden Markov Models in the Problem of Detecting Attacks on Computer Networks. Chebyshevskii Sbornik. 2021;22(5):391-399. (In Russ., abstract in Eng.) https://doi.org/10.22405/2226-8383-2021-22-5-391-399
16. Ouiazzane S., Addou M., Barramou F. A Multi-Agent Model for Network Intrusion Detection. In: 2019 1st International Conference on Smart Systems and Data Science (ICSSD). Rabat, Morocco: IEEE Press; 2019. p. 1-5. https://doi.org/10.1109/ICSSD47982.2019.9003119
17. Bova V.V., et al. Implicit Threats Identification Based on Analysis of User Activity on the Internet Space. Izvestiya SFedU. Engineering Sciences. 2020;(3):156-172. (In Russ., abstract in Eng.) https://doi.org/10.18522/2311-3103-2020-3-156-172
18. Basan A.S., et al. Architecture of Adaptive Protection System for Sensor Network. Voprosy kiberbezopasnosti = Cybersecurity issues. 2022;(6):22-39. (In Russ., abstract in Eng.) https://doi.org/10.21681/2311-3456-2022-6-22-39
19. Tokarev V.L., Sychugov A.A. Malware Detection Using Immune Detectors. News of the Tula state university. Technical sciences. 2017;(10):186-195. (In Russ., abstract in Eng.) EDN: ZVLGJR
20. Dobryshin M. M. An approach to the formation of a generalized criterion for evaluating the effectiveness of an information security system. News of the Tula state university. Technical sciences. 2021;(9):113-121. (In Russ., abstract in Eng.) https://doi.org/10.24412/2071-6168-2021-9-113-121
21. Abramov D.A., Tokarev V.L. Methodology for Automatic Detection of Emergency Situations at Public Transport Objects. Modern Information Technologies and IT-Education. 2022;18(4):878-888. (In Russ., abstract in Eng.) https://doi.org/10.25559/SITITO.18.202204.878-888
22. Soloviev S.V., Yazov Yu.K. Information Support of the Activity for Technical Protection of Information. Voprosy kiberbezopasnosti = Cybersecurity issues. 2021;(1):69-79. (In Russ., abstract in Eng.) https://doi.org/10.21681/2311-3456-2021-1-69-79
23. Kislyak A.A., et al. A variant of application of system engineering in the synthesis of the information security system. News of the Tula state university. Technical sciences. 2023;(2):71-76. (In Russ., abstract in Eng.) https://doi.org/10.24412/2071-6168-2023-2-71-77
24. Zegzhda P.D., Anisimov V.G., Anisimov E.G., Saurenko T.N. Optimal Integration Model of Information Security Measures. Problems of Information Security. Computer Systems. 2020;(2):9-15. (In Russ., abstract in Eng.) EDN: PPYPYM
25. Belov A.S., Dobryshin M.M., Shugurov D.E. Specification of Elements Qualitology Used at the Quality Estimation Systems of Support of Information Security. Instruments and Systems: Monitoring, Control, and Diagnostics. 2022;(11);34-40. (In Russ., abstract in Eng.) https://doi.org/10.25791/pribor.11.2022.1373
Published
2024-10-15
How to Cite
ABRAMOV, Dmitry Aleksandrovich; TOKAREV, Vyacheslav Leonidovich. The Task of Developing Software for the Proactive Information Protection of an Automated System. Modern Information Technologies and IT-Education, [S.l.], v. 20, n. 3, p. 748-759, oct. 2024. ISSN 2411-1473. Available at: <http://sitito.cs.msu.ru/index.php/SITITO/article/view/1134>. Date accessed: 10 jan. 2026. doi: https://doi.org/10.25559/SITITO.020.202403.748-759.
Section
Research and development in the field of new IT and their applications