THE METHOD OF CONSTRUCTING THE LAW OF THE SECURITY MANAGEMENT SYSTEM OF CRITICAL INFRASTRUCTURE OBJECTS IN THE CONDITIONS OF EXTERNAL UNCONTROLLED INFLUENCES

Authors

DOI:

https://doi.org/10.28925/2663-4023.2024.24.2839

Keywords:

модель об’єкта; персональні дані; система управління; безпека; критична інфраструктура; захист інформації.

Abstract

The intensive development of information technologies with a high degree of autonomy requires the development of autonomous management systems for optimal management. This issue is especially acute for critical infrastructure objects that have been proven to be affected by extreme external factors and impacts. It is proposed to consider the management process as management in a system with incomplete a priori information about the managed process. The process of managing which changes as information accumulates and is used to improve the operation of the entire security system in general. An identification approach to the synthesis of indirect adaptive control is used, which consists in specifying the model of the object during the control process. On the basis of the refined model, a safety control signal of the object is produced. The model of the object needs clarification because the system is constantly affected by external uncontrolled influences. The difference between the proposed method and the existing ones is that it offers a method of building a robust control system that allows to compensate for unknown disturbances with a certain accuracy in the required time. At the same time, by selecting the parameters of the closed system, it is possible to make the error and time values sufficiently small.

A simulation of the operation of the security management system was carried out, the results of which proved that the quality of transient processes does not depend on disturbances that affect both the nature of the behavior of the solution of the differential equation describing the critical infrastructure object and its structure. Transient processes, first of all, depend on the initial conditions of the object model and the parameters of the control system. And this means that if in the process of designing the security system, the initial conditions are correctly set and the changes (including uncontrolled) of the parameters of the system's functioning are properly monitored, it is possible to ensure the stable and safe operation of the facility over time.

Downloads

Download data is not yet available.

References

Atassi, A. N., & Khalil, H. K. (1999). A separation principle for the stabilization of class of nonlinear systems. IEEE Trans. Automat. Control. 44(9), 1672–1687.

Tao, G., & Ioannou, P. A. (1993). Model reference adaptive control for plants with unknown relative degree. IEEE Trans. Automat. Control. 38(6), 976–982.

Hoagg, J. B., & Dernstein, D. S. (2007). Direct adaptive command following and disturbance rejection for minimum phase systems with unknown relative degree. Int. J. of Adaptive Control and Signal Processing. 21(1), 49–75.

Laptiev, O., Savchenko. V., Pravdyvyi, A., Ablazov, I., Lisnevskyi, R., Kolos, O., & Hudyma, V. (2021). Method of Detecting Radio Signals using Means of Covert by Obtaining Information on the basis of Random Signals Model. International Journal of Communication Networks and Information Security (IJCNIS), 13(1), 48–54.

Barabash, O., Laptiev, O., Sobchuk, V., Salanda, I., Melnychuk, Y., & Lishchyna, V. (2021). Comprehensive Methods of Evaluation of Distance Learning System Functioning. International Journal of Computer Network and Information Security (IJCNIS), 13(3), 62–71. https://doi.org/10.5815/ijcnis.2021.03.06

Pichkur, V., & Sobchuk, V. (2021). Mathematical models and control design of a functionally stable technological process. Journal of Optimization, Differential Equations and Their Applications (JODEA), 29(1), 1–11. https://doi.org/10.15421/141905

Asrorov, F., Sobchuk, V., & Kurylko О. (2019). Finding of bounded solutions to linear impulsive systems. Eastern-European Journal of Enterprise Technologies, 6(4(102), 14–20. https://doi.org/10.15587/1729-4061.2019.178635

Sobchuk, V., Olimpiyeva, Y., Musienko, A., & Sobchuk, A. (2021). Ensuring the properties of functional stability of manufacturing processes based on the application of neural networks. CEUR Workshop Proceedings, 2845, 106–116.

Laptiev, O., Tkachev, V., Maystrov, O., Krasikov, O., Open’ko, P., Khoroshko, V., & Parkhuts, L. (2021). The method of spectral analysis of the determination of random digital signals. International Journal of Communication Networks and Information Security (IJCNIS), 13(2), 271–277. https://doi.org/10.54039/ijcnis.v13i2.5008.

Kapustian, O.A., Kapustyan, O.V., Ryzhov, A., & Sobchuk, V. (2022). Approximate Optimal Control for a Parabolic System with Perturbations in the Coefficients on the Half-Axis. Axioms, 11, 175. https://doi.org/10.3390/ axioms11040175

Sobchuk, V., Asrorov, F., Perehuda, O., Sukretna, A., Laptiev, O., & Lukova-Chuiko, N. (2021). The Limited Solutions Method for Telecommunications Network Information Security Models. IEEE 3nd International Conference on Advanced Trends in Information Theory (ATIT), 126–131.

Asrorov, F., Perehuda, O., Sobchuk, V., & Sukretna, A. (2021). Behavioral Properties of Bounded Solutions for a Weakly Nonlinear Impulse System that Describe the Dissemination of Information on Social Networks. ISIT 2021: II International Scientific and Practical Conference “Intellectual Systems and Information Technologies”, 3126.

Laptiev, O., Lukova-Chuiko, N., Laptiev, S., Laptieva, T., Savchenko, V., & Yevseiev, S. (2021). Development of a method for detecting deviations in the nature of traffic from the elements of the communication network. International Scientific and Practical Conference “Information Security and Information Technologies”: Conference Proceedings, 1–9.

Lukova-Chuiko, N., Herasymenko, O., Toliupa, S., Laptieva, T., & Laptiev, O. (2021). The method detection of radio signals by estimating the parameters signals of eversible Gaussian propagation. IEEE 3rd International Conference on Advanced Trends in Information Theory, ATIT 2021 - Proceedings, 67–70.

Savchenko, V., Akhramovych, V., Dzyuba, T., Lukova-Chuiko, N., & Laptiev, A T. (2021). Methodology for calculating information protection from parameters of its distribution in social networks. IEEE 3rd International Conference on Advanced Trends in Information Theory, ATIT 2021 - Proceedings, 99–105.

Sobchuk, A., Haidur, H., Laptiev, S., Laptieva, T., Asrorov, F., & Perehuda, O. (2022). Modified Fourier transform for improving spectral analysis of radio signals. “Мodern information, measurement and control systems: problems, applications and perspectives”2022” (MIMCS’2022).

Yevseiev, S., Trakaliuk, O., Kuzmenko, M., Laptieva T., Laptiev, S., & Polovinkin, I. (2022). An Improved Method of Detection and Localization of Signals the Digital Range. IEEE 4th International Conference on Advanced Trends in nformation Theory (ATIT), 129–132. https://doi.org/10.1109/ATIT58178.2022. 10024242

Lukova-Chuiko Н., Laptev О., Barabash О., Musienko А., & Akhramovich В. (2022). The method of calculation of personal data protection on the basis of a set of specific parameters of social networks. Collection of Scientific Works of the Military Institute of Kyiv National Taras Shevchenko University, (76), 54–68. https://doi.org/10.17721/2519-481X/2022/76-05

Kyrychok, R., Laptiev, O., Lisnevsky, R., Kozlovsky, V., & Klobukov, V. (2022). Development of a method for checking vulnerabilities of a corporate network using bernstein transformations. Eastern-European journal of enterprise technologies, 1(9)(115), 93–101. https://doi.org/10.15587/1729-4061.2022.253530

Barabash, O., Sobchuk, V., Musienko, A., Laptiev, O., Bohomia, V., & Kopytko, S. (2023). System Analysis and Method of Ensuring Functional Sustainability of the Information System of a Critical Infrastructure Object. System Analysis and Artificial Intelligence, 1107, 177–192. https://doi.org/10.1007/978-3-031-37450-0_11

Downloads


Abstract views: 1

Published

2024-06-26

How to Cite

Tsyganivska, I., Sobchuk, A., Laptieva, T., Laptiev, S., & Ponomarenko, V. (2024). THE METHOD OF CONSTRUCTING THE LAW OF THE SECURITY MANAGEMENT SYSTEM OF CRITICAL INFRASTRUCTURE OBJECTS IN THE CONDITIONS OF EXTERNAL UNCONTROLLED INFLUENCES. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 4(24), 28–39. https://doi.org/10.28925/2663-4023.2024.24.2839

Most read articles by the same author(s)