INTELLIGENT RISK ASSESSMENT MODELS IN DISTRIBUTED SYSTEMS BASED ON THE NEURAL NETWORK APPROACH
DOI:
https://doi.org/10.28925/2663-4023.2025.27.764Keywords:
information security; cybersecurity; cybersecurity risk; risk assessment; risk modeling; intelligent assessment models; risk management; distributed information system; neural network; security metrics; metadata; information asset.Abstract
In modern conditions of information systems functioning, the rapid growth of scale, complexity and distribution of computing resources is becoming one of the defining trends in the development of digital infrastructure. Within the framework of the widespread implementation of complex multi-component information systems that are distributed in nature and contain a large number of nodes, as well as a significant increase in the number and complexity of cyber threats focused on scalable systems, cybersecurity risks should be considered as a key factor in strategic planning of business processes. Regular analysis and assessment of cybersecurity risks allows determining the necessary and sufficient set of information protection tools, regulatory and organizational mechanisms to reduce information security threats, and ensures the process of building the most effective architecture of a comprehensive information security management system. Existing tools and assessment methodologies, which are mostly conceptual in nature and based on statistical approaches, are ineffective in analysis of large arrays of high-dimensional heterogeneous data and metrics of distributed systems. The article focuses on the current trends and existing approaches to information security risk assessment in distributed information systems. It analyzes the importance of risk management in the process of ensuring information security, and also describes a core principles of intelligent security risk assessment in distributed information systems based on the neural network approach. Research also presents a dynamic and comprehensive model of cyber risk assessment in distributed information systems based on back propagation neural network architecture and several methods of its optimization, which provides sufficient accuracy and reliability of risk assessment in the conditions of analysis of large arrays of heterogeneous input data.
Downloads
References
ames, J. (n.d.). Cebula A Taxonomy of Operational Cyber Security Risks. Hanscom AFB, MA: Carnegie Mellon University.
Palko, D., Hnatienko, H., Babenko, T., & Bigdan, A. (2021). Determining Key Risks for Modern Distributed Information Systems. IntSol-2021 Intelligent Solutions.
Palko, D., Babenko, T., Bigdan, A., Kiktev, N., Hutsol, T., Kuboń, M., Hnatiienko, H., Tabor, S., Gorbovy, O., & Borusiewicz, A. (2023). Cyber Security Risk Modeling in Distributed Information Systems. Applied Sciences, 13(4), 2393. https://doi.org/10.3390/app13042393
Palko, D., Vialkova, V., & Babenko, T. (2019). Intellectual models for cyber security risk assessment. Processing, transmission and security of information: Monografia. Tom 2. Bielsku-Biała: Wydawnictwo Naukowe Akademii Techniczno-Humanistycznej w Bielsku-Białej, 284–288.
Henry, K. (2017). Risk management and analysis. Information Security Management Handbook– 6th edition, 321–329.
Alberts, C. J. (2018). Operationally Critical Threat, Asset and Vulnerability Evaluation.
2022 Global State of Cybersecurity Survey «STATE OF CYBERSECURITY 2022: GLOBAL UPDATE ON WORKFORCE EFFORTS, RESOURCES AND CYBEROPERATIONS» (2022). ISACA® (www.isaca.org). https://www.isaca.org/state-of-cybersecurity-2022
Rot, A. (2008). IT Risk Assessment: Quantitative and Qualitative Approach. Proceedings of the World Congress on Engineering and Computer Science, 1073–1078.
Palko, D., Babenko, T., Myrutenko, L., & Bigdan, A. (2020). Model of information security critical incident risk assessment. 2020 IEEE International Conference «Problems of infocommunications. Science and technology» PIC S&T′2020. https://doi.org/10.1109/PICST51311.2020.9468107
Haykin, S. (2006). Neural networks. W.: Williams.
Rassel, S. (2005). Artificial Intelligence: Modern approach. W.: Williams.
Adebiyi A., Arreymbi, J., & Imafidon, C. (2012). Security Assessment of Software Design using Neural Network. International Journal of Advanced Research in Artificial Intelligence, 1(4).
Backpropagation. (2022). Brilliant.org. https://brilliant.org/wiki/backpropagation/
Lee, Z. J., Yang, Z. Y., Lee, C. Y., Chen, Z. H., & BingWu, W. (2021). Using improved neural network for the risk assessment of information security. IOP Conference Series Materials Science and Engineering, 1113(1), 012025. https://doi.org/10.1088/1757-899X/1113/1/012025
Landoll, D. (2016). The security risk assessment handbook: a complete guide for performing security risk assessments. Boca Raton: Auerbach Publications.
Sarker, I. H. (2021). Deep cybersecurity: a comprehensive overview from neural network and deep learning perspective. SN Computer Science, 2(3), 1–16.
Ruder, S. (2016). An overview of gradient descent optimization algorithms. arXiv preprint arXiv:1609.04747.
Zhang, Z. (2018). Improved adam optimizer for deep neural networks. 2018 IEEE/ACM 26th international symposium on quality of service (IWQoS).
Wilson, A. C, Roelofs, R., Stern, M., Srebro, N., & Recht, B. (2017). The Marginal Value of Adaptive Gradient Methods in Machine Learning. 31st International Conference on Neural Information Processing Systems, 4151–4161.
Palko, D., & Myrutenko, L. (2024). Method of comprehensive cybersecurity risks assessment in distributed information systems. Electronic Professional Scientific Journal “Cybersecurity: Education, Science, Technique”, 2(26), 487–502. https://doi.org/10.28925/2663-4023.2024.26.731
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Admin Skladannyi

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.