main| new issue| archive| editorial board| for the authors| publishing house|
Ðóññêèé
Main page
New issue
Archive of articles
Editorial board
For the authors
Publishing house

 

 


ABSTRACTS OF ARTICLES OF THE JOURNAL "INFORMATION TECHNOLOGIES".
No. 6. Vol. 29. 2023

DOI: 10.17587/it.29.296-306

A. D. Kozlov, Researcher, N. L. Noga, Leading Software Engineer,
V. A. Trapeznikov Institute of Control Sciences of Russian Academy of Sciences, Moscow, 117997, Russian Federation

The Methodology for Determining the Most Critical Nodes of the Information Network Infrastructures in Order to Ensure Cybersecurity

Based on the conducted research of the influence of various parameters on the values of information and cybersecurity risks in the functioning of enterprises and organizations that widely use elements of the digital economy and have a network structure, the need for timely identification of critical nodes in the network structures used has been established. The authors propose the methodology for determining the most critical nodes of network information infrastructures to ensure their operability and the necessary level of cybersecurity. The methodology bases on the combined use of fuzzy logic, regression analysis and ranking methods in the context of the dependence of information and cybersecurity risk on many different parameters. The authors propose to solve the problem of determining the most critical nodes of network information infrastructures in two stages. At the first stage, the methods of fuzzy logic and regression analysis determine the set of parameters that most affect the value of the cybersecurity risk for the considerate network nodes. At the second stage, we identify the most critical nodes by the method of ranking nodes according to the parameters determined at the first stage. The use of the proposed methodology makes it possible to identify the most critical nodes of the network infrastructure in a timely manner, to plan the set of measures to maintain it at the required level of operability, as well as minimize possible damage and consequences from the implementation of existing threats.
Keywords: network information infrastructures, information security, the most critical nodes, multiple regression, fuzzy logic, ranking

P. 296-306

References

  1. Kondratiev A. Modern trends in the study of critical infrastructure in foreign countries, Foreign Military Review, 2012, no. 1, pp. 19—30 (In Russian).
  2. Chkhartishvili A. G., Gubanov D. A., Novikov D. A. Social Networks: Models of information influence, control and confrontation, Cham, Switzerland, Springer International Publishing, 2019, p. 158.
  3. Gubanov D. A. Methods for Analysis of Information Influence in Active Network Structures, Automation and Remote Control, 2022, vol. 83, no. 5, pp. 743—754
  4. Falcone Y., Gatsenko O. Modeling the spread of information threats in social networks, Problems of information security. Computer systems, 2017, no. 4, pp. 9—16 (In Russian).
  5. Vorobyov S. V., Edelev A. V. Application of the method of determining critical elements in the networks of technical infra­structures to search for critical objects of the Russian gas transmis­sion network, Energy policy, 2018, no. 1, pp. 45—51 (In Russian).
  6. Boginski V, Commander C. Identifying critical nodes in protein-protein interaction networks, Clustering Challenges in Biological Networks, Elsevier, Amsterdam, Netherlands, 2009, pp. 153—166.
  7. Nguyen D. T., Shen Y., Thai M. T. Detecting critical nodes in interdependent power networks for vulnerability assess­ment, IEEE Transactions Smart Grid, 2013, vol. 4(1), pp. 151—159.
  8. Aspnes J., Chang K., Yampolskiy A. Inoculation strategies for victims of viruses and the sum-of-squares partition problem, Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms, SODA '05, Society for Industrial and Applied Mathematics, ACM, New York, NY, USA, 2005, pp. 43—52.
  9. Ventresca M., Aleman D. Evaluation of strategies to mitigate contagion spread using social network characteristics, Social Networks, 2013, vol. 35(1), pp. 75—88.
  10. Ventresca M., Aleman D. Efficiently identifying critical nodes in large complex networks, Computational Social Networks, 2015, vol. 2(6), pp. 3—16.
  11. Kozlov A. D., Noga N. L. Some Method of Complex Struc­tures Information Security Risk Assessment in Conditions of Uncertainty, Proceedings of the 13th International Conference "Management of Large-Scale System Development" (MLSD), Moscow, IEEE, 2020, available at: https://ieeexplore.ieee.org/document/9247662
  12. Elmore J. G., Wild D. M. G., Nelson H. D., Katz D. L. Jekel's Epidemiology, Biostatistics, Preventive Medicine, and Public Health, Elsevier Science, 2020, 432 p.
  13. Kozlov A. D., Noga N. L. Applying the Methods of Regression Analysis and Fuzzy Logic for Assessing the Information Security Risk of Complex Systems, Proceedings of the 14th International Conference "Management of Large-Scale System Development" (MLSD), Moscow, IEEE, 2021, available at: https://ieeexplore.ieee.org/document/9600245.
  14. Eliseeva I. I. ed. Econometrics, Moscow, Finance and Statistics, 2003, 344 p. (in Russian).
  15. 15. Kozlov A. D., Noga N. L. The method of averaged influence coefficients for the formation of a fuzzy knowledge base when assessing information security risks, Materials of the 30th International Conference "Security Management Problems of Complex Systems" (PUBSS'2022, Moscow), Moscow, ICS RAS, 2022, pp. 174—180 (in Russian).
  16. Matlab v. 9.6.0 R2019a (Electronic resource), available at: https://1progs.ru/matlab/ — (Date of application: 05.12.2021).
  17. Podinovski V. V. Multi-criteria decision-making tasks: theory and methods of analysis: textbook for universities, Moscow, Urait, 2022, 486 p. (in Russian).
  18. 18. Kozlov A. D., Noga N. L. Methods of ranking the divisions of the distributed corporate system according to the degree of compliance with the information security policy, Proceedings of the XIII all-Russian meeting on management problems (VSPU-2019), Moscow, ICS RAS, 2019, pp. 2565—2570 (in Russian).
  19. Aleskerov F., Ersel H., Yolalan R. Multicriterial ranking approach for evaluating bank branch performance, International Journal of Information Technology & Decision Making, 2004, vol. 3, no. 2, pp. 321—335.
  20. Hulkower N. D., Neatrour J. The Power of None, Sage journals (Sage open), 2019, available at: https://doi.org/10.1177/2158244019837468.
  21. Liu A. X., Shen K., Torng E. Large Scale Hamming Distance Query Processing, ICDE Conference, 2011, pp. 553—564.

To the contents