EFFICIENCY OF THE INDICATORS INVESTMENT CALCULATION METHOD IN THE INFORMATION SECURITY SYSTEM OF INFORMATION OBJECTS

Authors

DOI:

https://doi.org/10.28925/2663-4023.2021.13.1628

Keywords:

information security, cybersecurity, protection circuits, multi-criteria optimization, genetic algorithm

Abstract

The article describes the methodology of multi-criteria optimization of costs for the information protection system of the object of informatization. The technique is based on the use of a modified VEGA genetic algorithm. A modified algorithm for solving the MCO problem of parameters of a multi-circuit information protection system of an informatization object is proposed, which makes it possible to substantiate the rational characteristics of the ISS components, taking into account the priority metrics of OBI cybersecurity selected by the expert. In contrast to the existing classical VEGA algorithm, the modified algorithm additionally applies the Pareto principle, as well as a new mechanism for the selection of population specimens.

The Pareto principle applies to the best point. At this point, the solution, interpreted as the best, if there is an improvement in one of the cybersecurity metrics, and strictly no worse in another metric (or metrics). The new selection mechanism, in contrast to the traditional one, involves the creation of an intermediate population. The formation of an intermediate population occurs in several stages. At the first stage, the first half of the population is formed based on the metric - the proportion of vulnerabilities of the object of informatization that are eliminated in a timely manner. At the second stage, the second half of the intermediate population is formed based on the metric - the proportion of risks that are unacceptable for the information assets of the informatization object. Further, these parts of the intermediate population are mixed. After mixing, an array of numbers is formed and mixed. At the final stage of selection for crossing, specimens (individuals) will be taken by the number from this array. The numbers are chosen randomly. The effectiveness of this technique has been confirmed by practical results

Downloads

Download data is not yet available.

References

Okutan, A., Yang, S. J., McConky, K., & Werner, G. (2019). CAPTURE: Cyberattack Forecasting Using Non-Stationary Features with Time Lags. In 2019 IEEE Conference on Communications and Network Security (CNS) (pp. 205–213). IEEE.

Barreto, C., & Koutsoukos, X. (2019, October). Design of Load Forecast Systems Resilient Against Cyber-Attacks. In International Conference on Decision and Game Theory for Security (pp. 1–20). Springer, Cham.

Chandra, Y., & Mishra, P. K. (2019). Design of cyber warfare testbed. In Software Engineering (pp. 249–256). Springer, Singapore.

Sándor, H., Genge, B., Szántó, Z., Márton, L., & Haller, P. (2019). Cyber attack detection and mitigation: Software Defined Survivable Industrial Control Systems. International Journal of Critical Infrastructure Protection, 25, pp. 152–168.

Chiba, Z., Abghour, N., Moussaid, K., El Omri, A., & Rida, M. (2019). New Anomaly Network Intrusion Detection System in Cloud Environment Based on Optimized Back Propagation Neural Network Using Improved Genetic Algorithm. International Journal of Communication Networks and Information Security, 11(1), 61–84.

Nozaki, Y., & Yoshikawa, M. (2019). Security evaluation of ring oscillator puf against genetic algorithm based modeling attack. In International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (pp. 338–347). Springer, Cham.

Dwivedi, S., Vardhan, M., & Tripathi, S. (2020). Incorporating evolutionary computation for securing wireless network against cyberthreats. The Journal of Supercomputing, 1–38.

Zhang, F., Kodituwakku, H. A. D. E., Hines, J. W., & Coble, J. (2019). Multilayer Data-Driven Cyber-Attack Detection System for Industrial Control Systems Based on Network, System, and Process Data. IEEE Transactions on Industrial Informatics, 15(7), 4362–4369.

Sureshkumar, T., Anand, B., & Premkumar, T. (2019). Efficient Non-Dominated Multi-Objective Genetic Algorithm (NDMGA) and network security policy enforcement for Policy Space Analysis (PSA). Computer Communications, 138, 90–97.

Shang, Q., Chen, L., Wang, D., Tong, R., & Peng, P. (2019). Evolvable Hardware Design of Digital Circuits Based on Adaptive Genetic Algorithm. In International Conference on Applications and Techniques in Cyber Security and Intelligence (pp. 791–800). Springer, Cham.

Yang, Y. (2019). Research on Hybrid Quantum Genetic Algorithm Based on Cross-Docking Delivery Vehicle Scheduling. In The International Conference on Cyber Security Intelligence and Analytics (pp. 893–900). Springer, Cham.

Saenko, I., & Kotenko, I. (2019). A role-base approach and a genetic algorithm for VLAN design in large critical infrastructures. In Proceedings of the Genetic and Evolutionary Computation Conference Companion (pp. 1643–1650).

Aleksieva, Y., Valchanov, H., & Aleksieva, V. (2019). An approach for host based botnet detection system. In 2019 16th Conference on Electrical Machines, Drives and Power Systems (ELMA) (pp. 1–4). IEEE.

Vinayakumar, R., Alazab, M., Soman, K. P., Poornachandran, P., Al-Nemrat, A., & Venkatraman, S. (2019). Deep learning approach for intelligent intrusion detection system. IEEE Access, 7, 41525–41550.

Malarvizhi, N., Selvarani, P., & Raj, P. (2019). Adaptive fuzzy genetic algorithm for multi biometric authentication. Multimedia Tools and Applications, 1–14.

Alhijawi, B., Kilani, Y., & Alsarhan, A. (2020). Improving recommendation quality and performance of genetic-based recommender system. International Journal of Advanced Intelligence Paradigms, 15(1), 77–88.

Baroudi, U., Bin-Yahya, M., Alshammari, M., & Yaqoub, U. (2019). Ticket-based QoS routing optimization using genetic algorithm for WSN applications in smart grid. Journal of Ambient Intelligence and Humanized Computing, 10(4), 1325–1338.

Llansó, T., McNeil, M., & Noteboom, C. (2019). Multi-Criteria Selection of Capability-Based Cybersecurity Solutions. In Proceedings of the 52nd Hawaii International Conference on System Sciences, pp. 7322–7330.

Kong, T., Wang, L., Ma, D., Xu, Z., Yang, Q., & Chen, K. (2019). A Secure Container Deployment Strategy by Genetic Algorithm to Defend against Co-Resident Attacks in Cloud Computing. In 2019 IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS) (pp. 1825–1832). IEEE.

Lakshmanaprabu, S. K., Mohanty, S. N., Krishnamoorthy, S., Uthayakumar, J., & Shankar, K. (2019). Online clinical decision support system using optimal deep neural networks. Applied Soft Computing, 81, 105487.

Lakhno, V., Akhmetov, B., Adilzhanova, S., Blozva, A., Svitlana, R., Dmytro, R. The use of a genetic algorithm in the problem of distribution of information security organizational and financial resources (2020) ATIT 2020 - Proceedings: 2020 2nd IEEE International Conference on Advanced Trends in Information Theory, № 9349310, pp. 251-254.

Downloads


Abstract views: 359

Published

2021-09-30

How to Cite

Chubaievskyi, V. ., Lakhno, V. ., Kryvoruchko, O. ., Kasatkin, D. ., Desiatko, A. ., Blozva, A. ., & Gusev, B. . (2021). EFFICIENCY OF THE INDICATORS INVESTMENT CALCULATION METHOD IN THE INFORMATION SECURITY SYSTEM OF INFORMATION OBJECTS. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 1(13), 16–28. https://doi.org/10.28925/2663-4023.2021.13.1628

Most read articles by the same author(s)

<< < 1 2