ASSESSMENT OF STABILITY FACTORS OF INFORMATION SECURITY SYSTEMS USING REGRESSION ANALYSIS METHODS

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.31.1023

Keywords:

information security; regression analysis; multiple regression; multicollinearity; heteroscedasticity; autocorrelation.

Abstract

The article explores regression analysis methods as an effective tool for assessing factors that determine the stability of information security systems. In particular, it is shown that the use of multiple regression models allows us to quantitatively determine the impact of various technical, organizational and behavioral factors on the level of security of digital systems, predict the probability of cyber threats, assess the effectiveness of countermeasures and optimize the allocation of protection resources. Particular attention is paid to the application of the least squares method (LSM) to estimate the parameters of regression models, as well as the requirements that ensure the correctness of the obtained results, in particular, the independence of factor variables, the absence of multicollinearity, homoscedasticity, and uncorrelatedness of residuals. The article examines in detail the diagnostics of the main statistical violations: multicollinearity, heteroscedasticity and autocorrelation of residuals and methods for their elimination, including the transformation of variables, the introduction of auxiliary factors or the use of alternative estimation approaches, such as the generalized least squares method (GLS), the principal component analysis (PCA). It is shown that the systematic detection and correction of these violations are critically important for increasing the accuracy of forecasts and the reliability of conclusions in the field of cybersecurity, since erroneous assessments can lead to underestimation of risks or incorrect prioritization in threat management. The work demonstrates that the statistically sound application of regression analysis models creates a solid analytical basis for building intelligent decision support systems in the field of information security, increases the effectiveness of monitoring and contributes to the formation of strategic approaches to cyber risk management. The results obtained can be used both in scientific research aimed at improving the methodology for assessing cyber risks, and in the practical formation of monitoring and protection systems for information resources, ensuring an increase in the level of resilience of digital infrastructure and the effectiveness of cyber protection measures.

Downloads

Download data is not yet available.

References

Abramov, V., Astafieva, M., Boiko, M., Bodnenko, D., Bushma, A., Vember, V., Hlushak, O., Zhyltsov, O., Ilich, L., Kobets, N., Kovaliuk, T., Kuchakovska, H., Lytvyn, O., Lytvyn, P., Mashkina, I., Morze, N., Nosenko, T., Proshkin, V., Radchenko, S., … Yaskevych, V. (2021). Theoretical and practical aspects of the use of mathematical methods and information technology in education and science. https://doi.org/10.28925/9720213284km.

Vasechko L., Hlushak, О., Semenyaka, S., Ramskyi, А., & Nesterova, О. (2022). Diagnosis profitable part of the pension fund of Ukraine by method of mathematical modeling. Financial and Credit Activity Problems of Theory and Practice, 2(43), 157-164. https://doi.org/10.55643/fcaptp.2.43.2022.3638

Ilich, L., Hlushak, О., Semenyaka, S.(2020) Modeling of employment structural transformations. Financial and credit activity: problems of theory and practice. ISSN (print) 2306-4994, ISSN (on-line) 2310-8770, 1(32), P.251-259.

Ilich L., Hlushak О., Semenyaka, S. & Shestack, Y. (2023) «Modeling of Structural Changes in the Employment as the Direction of Economic Security Risk Management» Cybersecurity Providing in Information and Telecommunication Systems, (3421.) p p. 46-55. ISSN 1613-0073.

Каrpunin, І., Zinchenko, N. (2023). Cognitive modeling of intelligent systems for analyzing the financial condition of a business entity Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 1(21), 75–85.

Astafieva, M., Stepanenko, N. (2025) Optimal Cybersecurity Management: Global Controllability of Linear Models Cybersecurity Providing in Information and Telecommunication Systems (3991). с. 14-25. ISSN 1613-0073

Astafieva, M., Stepanenko, N. (2025) Оптимальне управління кібербезпекою: глобальна керованість лінійних моделей Cybersecurity Providing in Information and Telecommunication Systems (3991). с. 14-25. ISSN 1613-0073)

Shevchenko, S., Zhdanovа, Y., Spasiteleva, S., Mazur , N., Skladannyi, P., & Nehodenko, V. (2024). Mathematical methods in cyber security: cluster analysis and its application in information and cybernetic security. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 3(23), 258-273.

https://doi.org/10.28925/2663-4023.2024.23.258273

Shevchenko, S., Zhdanovа, Y., & Spasiteleva, S. (2023). Mathematical methods in cybersecurity: Catastrophe theory. Cybersecurity: Education, Science, Technique, 3(19), 165–175. https://doi.org/10.28925/2663-4023.2023.19.165175

Shevchenko, S., Zhdanovа Y., Skladannyi, P., & Spasiteleva, S. (2021). Mathematical methods in cibernetic security: graphs and their application in information and cybernetic security. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 1(13), 133–144. https://doi.org/10.28925/2663-4023.2021.13.133144

Shevchenko, S., Zhdanovа Y., Spasiteleva, S., Negodenko, O., Mazur, N., & Kravchuk, K. (2019). Mathematical methods in cyber security: fractals and their applications in information and cyber security. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 1(5), 31–39. https://doi.org/10.28925/2663-4023.2019.5.3139

Sitnikova, O., Melnyk, M., Syrota, O., & Semenov, S. (2025). Intelligent method for supporting decision-making on software security using hybrid models. Innovative technologies and scientific solutions for industries,1(31),115-126. https://doi.org/10.30837/2522-9818.2025.1.115.

Samia, N., Saha, S., & Haque, A. (2024). Predicting and mitigating cyber threats through data mining and machine learning. Computer Communications. Volume 228, 107949

https://doi.org/10.1016/j.comcom.2024.107949.

Salman, A., Al-Nuaimi, B., Subhi, A., Alkattan, H., & Alfilh, R. (2025). Enhancing Cybersecurity with Machine Learning: A Hybrid Approach for Anomaly Detection and Threat Prediction. Mesopotamian Journal of CyberSecurity. 5(1), 202-215.

https://doi.org/10.58496/mjcs/2025/014.

Gongada, T., Agnihotri, A., Santosh, K., Ponnuswamy, V., S, N., Sharma, T., & El-Ebiary, Y. (2024). Leveraging Machine Learning for Enhanced Cyber Attack Detection and Defence in Big Data Management and Process Mining. International Journal of Advanced Computer Science and Applications.

https://doi.org/10.14569/ijacsa.2024.0150266.

Alanazi, F., Alshammari, A., Sallami, C., Alhashmi, A., Effghi, R., Km, A., & Darem, A. (2025). Enhancing cybersecurity vulnerability detection using different machine learning severity prediction models. International Journal of Applied Science and Engineering. 22, 2025013. https://doi.org/10.6703/ijase.202503_22(1).003.

Sarker, I. (2022). Machine Learning for Intelligent Data Analysis and Automation in Cybersecurity: Current and Future Prospects. Annals of Data Science, 10, 1473 - 1498. https://doi.org/10.1007/s40745-022-00444-2.

Kumar, S., Machireddy, J., Sankaran, T., & Sholapurapu, P. (2025). Integration of Machine Learning and Data Science for Optimized Decision-Making in Computer Applications and Engineering. Journal of Information Systems Engineering and Management., 10 №45s, https://doi.org/10.52783/jisem.v10i45s.8990.

Li, P., & Zhang, L. (2025). Application of big data technology in enterprise information security management. Scientific Reports, 15, 1022. https://doi.org/10.1038/s41598-025-85403-6.

Lu, M. (2025). Automated Machine Learning and Data-Driven Decision Support System for Strategy Management in Organizational Activities. J. Comput. Inf. Technol., 1(33), 57-71. https://doi.org/10.20532/cit.2025.1005877.

Downloads


Abstract views: 11

Published

2025-12-16

How to Cite

Hlushak , O., Semeniaka, S., Zinchenko, N., & Solomko, V. (2025). ASSESSMENT OF STABILITY FACTORS OF INFORMATION SECURITY SYSTEMS USING REGRESSION ANALYSIS METHODS. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 3(31), 333–345. https://doi.org/10.28925/2663-4023.2025.31.1023

Most read articles by the same author(s)