The Task of Developing Software for the Proactive Information Protection of an Automated System
Abstract
This work focuses on the development of proactive protection systems against information security threats that can operate in pseudo-real time mode and identify information security threats with minimal delay. These systems would be implemented on standard hardware and would help protect against information security risks. Present mathematical model is presented that describes the impact of negative processes on an automated system caused by both the interaction of an attacker with predetermined targets, acting on the basis of a formally described strategy, and random impacts on an automated system caused by both the actions of personnel and random factors. The article presents a methodology for implementing the presented model, based on the use of multiple simplified models interacting on the basis of a generalized algorithm, which allows the security system to operate in pseudo-real time mode, but at the same time ensure increased performance. The proposed structural diagram of both the entire system and its parts responsible for simulation modeling is presented. The proposed structural diagram of both the entire system and its parts responsible for simulation modeling is presented. A set of sensors required for identifying abnormal situations and a proposed architecture of a decision support system for the presence of an anomaly have been defined. Methods for determining sensor readings and criteria for their evaluation are presented. The proposed boundaries of responsibility and scope of application of the various models used in the core of the decision support system are described. A methodology for constructing a system for assessing quantitative indicators of the quality of the proposed protection system is proposed, and various options for its construction are described, which will allow assessing the system's ability to counteract various types of information security threats.
References
2. Perwej Yu., et al. A Systematic Literature Review on the Cyber Security. International Journal of Scientific Research and Management. 2021;09(12):669-710. https://doi.org/10.18535/ijsrm/v9i12.ec04
3. Riggs H., Tufail S., Parvez I., Tariq M., Khan M.A., Amir A., Vuda K.V., Sarwat A.I. Impact, Vulnerabilities, and Mitigation Strategies for Cyber-Secure Critical Infrastructure. Sensors. 2023;23(8):4060. https://doi.org/10.3390/s23084060
4. Unizhaev N.V. Osobennosti modelirovaniya ugroz bezopasnosti personalnyh dannyh dlya obespecheniya dostatochnogo urovnya zaschischennosti [Modeling threats to the personal data security to ensure a sufficient protection rate]. Voprosy innovatsionnoy ekonomiki. 2022;12(1):95-110. (In Russ., abstract in Eng.) https://doi.org/10.18334/vinec.12.1.114335
5. Klishin D.V., Chechulin A.A. Analiz standartov obespecheniya informatsionnoi bezopasnosti [Analysis of information security standards]. Sistemy analiza i obrabotki dannykh = Analysis and Data Processing Systems. 2023;(1):37-54. (In Russ., abstract in Eng.) https://doi.org/10.17212/2782-2001-2023-1-37-54
6. Bespalova N.V., et al. Analysis of foreign experience in the application of intelligent methods in the tasks of protecting objects of critical information infrastructure of the financial sector. Ingineering Journal of Don. 2024;(5):76-91. (In Russ., abstract in Eng.) EDN: CUNCOD
7. Tokarev V.L., Sychugov A.A. Method of auditing the protection of automated systems. Modeling, optimization and information technology. 2019;7(1):548-559. (In Russ., abstract in Eng.) https://doi.org/10.26102/2310-6018/2019.24.1.036
8. Bansal S., Ruby D., Bargoti R. A New Hybrid Ensemble Learning-Based Malware Detection Technique. In: Dassan P., Thirumaaran S., Subramani N. (Eds.) Intelligent Computing, Smart Communication and Network Technologies. ICICSCNT 2023. Communications in Computer and Information Science. Vol. 1970. Cham: Springer; 2024. p. 235-249. https://doi.org/10.1007/978-3-031-75957-4_20
9. Tokarev V.L. Recognition of rival''s strategy using actions detection. Proceedings of TUSUR University. 2014;(2):184-187. (In Russ., abstract in Eng.) EDN: SEBGVJ
10. Tokarev V.L. Formal Security Models. Chebyshevskii Sbornik. 2021;22(1):488-495. (In Russ., abstract in Eng.) https://doi.org/10.22405/2226-8383-2021-22-1-488-494
11. Borzenkova S.Yu., Tokarev V.L. Determination of actual threats based on the risk factors of destructive actions of a potential violator of the information security system ACS TP. Industrial Automatic Control Systems and Controllers. 2020;(10):52-55. (In Russ., abstract in Eng.) https://doi.org/10.25791/asu.10.2020.1229
12. Zhuk R.V. Method for Determining the Potential of an Information Security Intruder and Realizable Software Vulnerabilities. Proceedings of Telecommunication Universities. 2021;7(2):95-101. (In Russ., abstract in Eng.) https://doi.org/10.31854/1813-324X-2021-7-2-95-101
13. Tokarev V.L., Sychugov A.A. Software Security Estimation of Automated Systems. News of the Tula state university. Technical sciences. 2016;(11-1):157-165. (In Russ., abstract in Eng.) EDN: XDYLNP
14. Tokarev V.L., Sychugov A.A. Method for assessing the level of security risks of network nodes to improve the efficiency of placement of immune detectors. Modeling, Optimization and Information Technology. 2020;8(3):39. (In Russ., abstract in Eng.) https://doi.org/10.26102/2310-6018/2020.30.3.021
15. Tokarev V.L. Hidden Markov Models in the Problem of Detecting Attacks on Computer Networks. Chebyshevskii Sbornik. 2021;22(5):391-399. (In Russ., abstract in Eng.) https://doi.org/10.22405/2226-8383-2021-22-5-391-399
16. Ouiazzane S., Addou M., Barramou F. A Multi-Agent Model for Network Intrusion Detection. In: 2019 1st International Conference on Smart Systems and Data Science (ICSSD). Rabat, Morocco: IEEE Press; 2019. p. 1-5. https://doi.org/10.1109/ICSSD47982.2019.9003119
17. Bova V.V., et al. Implicit Threats Identification Based on Analysis of User Activity on the Internet Space. Izvestiya SFedU. Engineering Sciences. 2020;(3):156-172. (In Russ., abstract in Eng.) https://doi.org/10.18522/2311-3103-2020-3-156-172
18. Basan A.S., et al. Architecture of Adaptive Protection System for Sensor Network. Voprosy kiberbezopasnosti = Cybersecurity issues. 2022;(6):22-39. (In Russ., abstract in Eng.) https://doi.org/10.21681/2311-3456-2022-6-22-39
19. Tokarev V.L., Sychugov A.A. Malware Detection Using Immune Detectors. News of the Tula state university. Technical sciences. 2017;(10):186-195. (In Russ., abstract in Eng.) EDN: ZVLGJR
20. Dobryshin M. M. An approach to the formation of a generalized criterion for evaluating the effectiveness of an information security system. News of the Tula state university. Technical sciences. 2021;(9):113-121. (In Russ., abstract in Eng.) https://doi.org/10.24412/2071-6168-2021-9-113-121
21. Abramov D.A., Tokarev V.L. Methodology for Automatic Detection of Emergency Situations at Public Transport Objects. Modern Information Technologies and IT-Education. 2022;18(4):878-888. (In Russ., abstract in Eng.) https://doi.org/10.25559/SITITO.18.202204.878-888
22. Soloviev S.V., Yazov Yu.K. Information Support of the Activity for Technical Protection of Information. Voprosy kiberbezopasnosti = Cybersecurity issues. 2021;(1):69-79. (In Russ., abstract in Eng.) https://doi.org/10.21681/2311-3456-2021-1-69-79
23. Kislyak A.A., et al. A variant of application of system engineering in the synthesis of the information security system. News of the Tula state university. Technical sciences. 2023;(2):71-76. (In Russ., abstract in Eng.) https://doi.org/10.24412/2071-6168-2023-2-71-77
24. Zegzhda P.D., Anisimov V.G., Anisimov E.G., Saurenko T.N. Optimal Integration Model of Information Security Measures. Problems of Information Security. Computer Systems. 2020;(2):9-15. (In Russ., abstract in Eng.) EDN: PPYPYM
25. Belov A.S., Dobryshin M.M., Shugurov D.E. Specification of Elements Qualitology Used at the Quality Estimation Systems of Support of Information Security. Instruments and Systems: Monitoring, Control, and Diagnostics. 2022;(11);34-40. (In Russ., abstract in Eng.) https://doi.org/10.25791/pribor.11.2022.1373

This work is licensed under a Creative Commons Attribution 4.0 International License.
Publication policy of the journal is based on traditional ethical principles of the Russian scientific periodicals and is built in terms of ethical norms of editors and publishers work stated in Code of Conduct and Best Practice Guidelines for Journal Editors and Code of Conduct for Journal Publishers, developed by the Committee on Publication Ethics (COPE). In the course of publishing editorial board of the journal is led by international rules for copyright protection, statutory regulations of the Russian Federation as well as international standards of publishing.
Authors publishing articles in this journal agree to the following: They retain copyright and grant the journal right of first publication of the work, which is automatically licensed under the Creative Commons Attribution License (CC BY license). Users can use, reuse and build upon the material published in this journal provided that such uses are fully attributed.
