Correlation of conflicts in distributed special-purpose management systems




information security, information security risk formation model, fuzzy cognitive map, software, distributed special-purpose management systems, information security systems


One of the mandatory conditions for the successful implementation of any innovative project is to reliably ensure its information security. The specifics of innovation and venture activities, as a rule, involve the widespread use of modern information technologies for managing organizational production and technological processes, which (if the information security system is imperfect) may be associated with certain risks. This makes it relevant to introduce a methodological apparatus for correlating threats and supporting management decision-making to ensure the availability, confidentiality, and reliability of the information. When managing processes in the information sphere, quite often there is a need to decide in weakly structured situations, when the parameters, laws, and regularities of the development of the situation are described not quantitatively, but qualitatively. At the same time, a unique situation arises when changes in its structure are very difficult to predict. Therefore, the article deals with the issue of cognitive analysis of conflicts in distributed special-purpose management systems, considers concepts that affect the security of software, builds a fuzzy cognitive map of the model of information security risk formation, quantifies the impact of cognitive modeling conflicts in distributed special-purpose management systems, and analyzes the results of calculations and justifies the results.


Download data is not yet available.


Avetisyan, A. I., Belevantsev, A. A., Chuklyaev I. I. (2014). The technologies of static and dynamic analyses detecting vulnerabilities of software. Cybersecurity. issues, 3(4), 20-28. Retrieved November 08, 2020 Available from:

Bidoit, N., Hull, R. (1989). Minimalism, justification and non-monotony in deductive databases. Journal of Computer and System Sciences, 38, 290-325. Retrieved November 08, 2020. DOI: 10.1016/0022-0000(89)90004-4.

Brewka, G. (1991). Nonmonotonic Reasoning: Logical Foundations of Commonsense. Cambridge University Press. Retrieved November 08, 2020. DOI: 10.1017/S026988890000014X.

Brewka, G., Dix, J., Konolige, K. (1997). Nonmonotonic Reasoning – An Overview. Stanford: CSLI publications.

Cadoli, M., Schaerf, M. (1993). A survey of complexity results for non-monotonic logics. The Journal of Logic Programming, 17, 127-60. Retrieved November 08, 2020. DOI: 10.1016/0743-1066(93)90029-G.

Donini, F.M., Lenzerini, M., Nardi, D. et al. (1990). Nonmonotonic reasoning. Artif Intell Rev 4, 163-210. Retrieved November 08, 2020 DOI: 10.1007/BF00140676.

Fedorchenko, A. V., Levshun, D. S., Chechulin, A. A., & Kotenko, I. V. (2016). An Analysis of Security Event Correlation Techniques in SIEM-Systems. Part 2. SPIIRAS Proceedings, 6(49), 208-225. Retrieved November 08, 2020. Available from: DOI: 10.15622/sp.49.11.

Garusi, M. (2003) Event correlation systems: revolution or evolution? Network online, #7, 7-11.

Ginsberg, M. L., ed. (1987). Readings in Nonmonotonic Reasoning. Los Altos CA: Morgan Kaufmann.

Gray, S. A., S. Gray, J. L. De Kok, A. E. R. Helfgott, B. O'Dwyer, R. Jordan, and A. Nyaki. (2015). Using fuzzy cognitive mapping as a participatory approach to analyze change, preferred states, and perceived resilience of social-ecological systems. Ecology and Society 20(2): 11. Retrieved November 08, 2020.

Horty, J. F. (2001). "Nonmonotonic Logic," in Goble, Lou, ed., The Blackwell Guide to Philosophical Logic. Blackwell.

Kozlova, E. A. (2013). Information security risk assessment using the method of fuzzy clustering and mutual information calculation. Young scientist, 5 (52), 154-161. Retrieved November 08, 2020. Available from: archive/52/6967/.

Liashenko, I. O., Stefantsev, S. S., Polumiienko, S. K. (2020). Fuzzy cognitive models in decision support tasks of distributed special purpose control systems. InterConf, (9). Retrieved November 08, 2020 Available from:

Liashenko, I. O., Voitko, O. V., Chernega, V. M., Rakhimov, V. V. (2019). Formal model of Decision Support in poorly structured situations of a distributed management system. Proceedings of the XV International Scientific and Practical Conference International Trends in Science and Technology. Publisher – RS Global Sp. z O.O., Warsaw, Poland. Vol. 1, July 31, 2019, P. 36-40. ISBN 978-83-954081-6-8. Available from:

Liashenko, I. O. (2013). Selection of survivability indicators for special-purpose information and control systems. Information processing systems, 2, 64-66. Retrieved November 08, 2020 Available from: UJRN/ soi_2013_2_16.

Mukhin, V. E., Volokita, А. N. (2009). Analysis of information security events to perform corrective actions for security management. Computer science, management and engineering, 50, 1–7. Retrieved November 08, 2020. Available from: handle/123456789/8116.

Nadezhdin, E. N., Novikova, T. L. (2017). Optimization of vulnerability search in the system of protection of University information and computer network resources. Modern high-tech technologies, 4, 38-43. Retrieved November 08, 2020. Available from: view?id=36636.

Silov, V. B. (1995). Making strategic decisions in a fuzzy environment. Moscow: INPRO-RES. Retrieved November 08, 2020. Available from:

Stepanova, A. S., Muromtsev, D. Yu. (2009). The analysis of information-operating systems evolution with the use of scientifically-technological foresight. Samara: proceedings of the Samara scientific center of the Russian Academy of Sciences, 354-357. Retrieved November 08, 2020. Available from:

Taze, A., Gribaumont, P., Louis J. (1990). Logical approach to artificial intelligence: From classical logic to logical programming. Moscow: World. Retrieved November 08, 2020. Available from: downloads/books/logical-approach-to-ai-by-tei-gribomon-and-other.html.


Abstract views: 72
Downloads: 64



How to Cite

Stefantsev, S. . (2020). Correlation of conflicts in distributed special-purpose management systems. Political Science and Security Studies Journal, 1(2), 34-43.