Correlation of conflicts in distributed special-purpose management systems
DOI:
https://doi.org/10.5281/zenodo.4399916Keywords:
information security, information security risk formation model, fuzzy cognitive map, software, distributed special-purpose management systems, information security systemsAbstract
One of the mandatory conditions for the successful implementation of any innovative project is to reliably ensure its information security. The specifics of innovation and venture activities, as a rule, involve the widespread use of modern information technologies for managing organizational production and technological processes, which (if the information security system is imperfect) may be associated with certain risks. This makes it relevant to introduce a methodological apparatus for correlating threats and supporting management decision-making to ensure the availability, confidentiality, and reliability of the information. When managing processes in the information sphere, quite often there is a need to decide in weakly structured situations, when the parameters, laws, and regularities of the development of the situation are described not quantitatively, but qualitatively. At the same time, a unique situation arises when changes in its structure are very difficult to predict. Therefore, the article deals with the issue of cognitive analysis of conflicts in distributed special-purpose management systems, considers concepts that affect the security of software, builds a fuzzy cognitive map of the model of information security risk formation, quantifies the impact of cognitive modeling conflicts in distributed special-purpose management systems, and analyzes the results of calculations and justifies the results.
Downloads
References
Avetisyan, A. I., Belevantsev, A. A., Chuklyaev I. I. (2014). The technologies of static and dynamic analyses detecting vulnerabilities of software. Cybersecurity. issues, 3(4), 20-28. Retrieved November 08, 2020 Available from: https://cyberleninka.ru/article/n/tehnologii-staticheskogo-i-dinamicheskogo-analiza-uyazvimostey-programmnogo-obespecheniya.
Bidoit, N., Hull, R. (1989). Minimalism, justification and non-monotony in deductive databases. Journal of Computer and System Sciences, 38, 290-325. Retrieved November 08, 2020. DOI: 10.1016/0022-0000(89)90004-4.
Brewka, G. (1991). Nonmonotonic Reasoning: Logical Foundations of Commonsense. Cambridge University Press. Retrieved November 08, 2020. DOI: 10.1017/S026988890000014X.
Brewka, G., Dix, J., Konolige, K. (1997). Nonmonotonic Reasoning – An Overview. Stanford: CSLI publications.
Cadoli, M., Schaerf, M. (1993). A survey of complexity results for non-monotonic logics. The Journal of Logic Programming, 17, 127-60. Retrieved November 08, 2020. DOI: 10.1016/0743-1066(93)90029-G.
Donini, F.M., Lenzerini, M., Nardi, D. et al. (1990). Nonmonotonic reasoning. Artif Intell Rev 4, 163-210. Retrieved November 08, 2020 DOI: 10.1007/BF00140676.
Fedorchenko, A. V., Levshun, D. S., Chechulin, A. A., & Kotenko, I. V. (2016). An Analysis of Security Event Correlation Techniques in SIEM-Systems. Part 2. SPIIRAS Proceedings, 6(49), 208-225. Retrieved November 08, 2020. Available from: DOI: 10.15622/sp.49.11.
Garusi, M. (2003) Event correlation systems: revolution or evolution? Network online, #7, 7-11.
Ginsberg, M. L., ed. (1987). Readings in Nonmonotonic Reasoning. Los Altos CA: Morgan Kaufmann.
Gray, S. A., S. Gray, J. L. De Kok, A. E. R. Helfgott, B. O'Dwyer, R. Jordan, and A. Nyaki. (2015). Using fuzzy cognitive mapping as a participatory approach to analyze change, preferred states, and perceived resilience of social-ecological systems. Ecology and Society 20(2): 11. Retrieved November 08, 2020. http://dx.doi.org/10.5751/ES-07396-200211.
Horty, J. F. (2001). "Nonmonotonic Logic," in Goble, Lou, ed., The Blackwell Guide to Philosophical Logic. Blackwell.
Kozlova, E. A. (2013). Information security risk assessment using the method of fuzzy clustering and mutual information calculation. Young scientist, 5 (52), 154-161. Retrieved November 08, 2020. Available from: https://moluch.ru/ archive/52/6967/.
Liashenko, I. O., Stefantsev, S. S., Polumiienko, S. K. (2020). Fuzzy cognitive models in decision support tasks of distributed special purpose control systems. InterConf, (9). Retrieved November 08, 2020 Available from: https://ojs.ukrlogos.in.ua/index.php/interconf/article/view/1214.
Liashenko, I. O., Voitko, O. V., Chernega, V. M., Rakhimov, V. V. (2019). Formal model of Decision Support in poorly structured situations of a distributed management system. Proceedings of the XV International Scientific and Practical Conference International Trends in Science and Technology. Publisher – RS Global Sp. z O.O., Warsaw, Poland. Vol. 1, July 31, 2019, P. 36-40. ISBN 978-83-954081-6-8. Available from: http://ws-conference.com/.
Liashenko, I. O. (2013). Selection of survivability indicators for special-purpose information and control systems. Information processing systems, 2, 64-66. Retrieved November 08, 2020 Available from: http://nbuv.gov.ua/ UJRN/ soi_2013_2_16.
Mukhin, V. E., Volokita, А. N. (2009). Analysis of information security events to perform corrective actions for security management. Computer science, management and engineering, 50, 1–7. Retrieved November 08, 2020. Available from: https://ela.kpi.ua/ handle/123456789/8116.
Nadezhdin, E. N., Novikova, T. L. (2017). Optimization of vulnerability search in the system of protection of University information and computer network resources. Modern high-tech technologies, 4, 38-43. Retrieved November 08, 2020. Available from: http://www.top-technologies.ru/ru/article/ view?id=36636.
Silov, V. B. (1995). Making strategic decisions in a fuzzy environment. Moscow: INPRO-RES. Retrieved November 08, 2020. Available from: http://www.padaread.com/?book=30006&pg=1.
Stepanova, A. S., Muromtsev, D. Yu. (2009). The analysis of information-operating systems evolution with the use of scientifically-technological foresight. Samara: proceedings of the Samara scientific center of the Russian Academy of Sciences, 354-357. Retrieved November 08, 2020. Available from: https://cyberleninka.ru/article/n/analiz-razvitiya-informatsionno-upravlyayuschih-sistem-s-ispolzovaniem-nauchno-tehnologicheskogo-forsayta/viewer.
Taze, A., Gribaumont, P., Louis J. (1990). Logical approach to artificial intelligence: From classical logic to logical programming. Moscow: World. Retrieved November 08, 2020. Available from: http://www.aiportal.ru/ downloads/books/logical-approach-to-ai-by-tei-gribomon-and-other.html.
Published
How to Cite
Issue
Section
License
The authors agree with the following conditions:
1. Authors retain copyright and grant the journal right of first publication (Download agreement) with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
2. Authors have the right to complete individual additional agreements for the non-exclusive spreading of the journal’s published version of the work (for example, to post work in the electronic repository of the institution or to publish it as part of a monograph), with the reference to the first publication of the work in this journal.
3. Journal’s politics allows and encourages the placement on the Internet (for example, in the repositories of institutions, personal websites, SSRN, ResearchGate, MPRA, SSOAR, etc.) manuscript of the work by the authors, before and during the process of viewing it by this journal, because it can lead to a productive research discussion and positively affect the efficiency and dynamics of citing the published work (see The Effect of Open Access).