METHOD FOR STUDYING QUANTITATIVE INDICATORS OF CORPORATE NETWORK SECURITY SYSTEM
DOI:
https://doi.org/10.28925/2663-4023.2025.28.776Keywords:
security indicator; corporate network; flow; information; data; leakage; coefficient; system; equationAbstract
A mathematical model of corporate network security has been developed and analyzed. The dependence of the security level on the information flow in the corporate network has been examined, along with the influence of parameters affecting the security system and its overall functionality. The relationship between network security, system size, and security threats has been established. A system of linear equations has been derived, reflecting the change in the security level as a function of the information flow rate and the impact of various security measures: data integrity and authenticity control, access restrictions, antivirus protection, firewall functionality, data backup, auditing, physical security measures, protection against unintended electromagnetic emissions, as well as the effects of possible hardware and software failures. The impact of the volume of personal data on its leakage, leakage rate, and the effectiveness of security mechanisms has been analyzed.
As a result of solving the system of linear differential equations, mathematical and graphical dependencies of the corporate network security level on various factors have been obtained. By considering three possible solutions to the equation near the system's stationary state, it has been concluded that, depending on the ratio of dissipation and the natural frequency of oscillations, attenuation to a certain value occurs either periodically with a damped amplitude or following an exponentially decaying law. A more illustrative analysis of system behavior has been performed by transitioning from the differential form of the equations to a discrete form and simulating the system's evolution over a selected time interval.
Mathematical and graphical dependencies of the system’s natural oscillation frequency, damping coefficient, and oscillation period are presented. Simulation modeling with deviations from the stationary state has confirmed the nonlinear nature of the corporate network security system.
Downloads
References
Akhramovych, V. M., Batrak, I. H., Kolida, V. P., & Shvorak, K. V. (2021). Information Security Indicator of an Individual Computer. Telecommunications and Information Technologies. DUT, 4(73), 62–77.
Akhramovych, V., Pepa, Y., Zahynei, A., Akhramovych, V., Dzyuba, T., & Danylov, I. (2024). Method for Calculating the Information Security Indicator in Social Media with Consideration of the Path Duration Between Clients. Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska – IAPGOS, 14(1), 71–77. http://doi.org/10.35784/iapgos.5720.2024.03.31.
Akhramovych, V. M., Lazarenko, S. V., Nimchenko, T. V., & Ryabova, L. V. (2022). Method for Calculating Personal Data Protection Against Social Network Expansion. Science-Intensive Technologies. K. NAU, 53(1), 2–12.
Tkach, Yu. M., Yakovlev, O.O., & Lysytsia, T.A. (2021). Protection of Corporate Networks Against Human Influence Using Technical Means. Informatics and Mathematical Methods in Simulation, 11(4), 358–364.
Parkhomenko, I. I., Galkin V. V. (2020). Methods for Protecting Corporate Network Channels Based on VPN Solutions. Modern Information Protection, 4, 35–40.
Kostiuk, Yu.V. (2022). Problems of Corporate Information and Telecommunication Networks Protection. In Modern Trends in the Development of Financial and Innovation-Investment Processes in Ukraine: Materials of the 5th International Scientific and Practical Conference, 781–783.
Chernoshtan, A. M., & Vlasov, O. M. (2020). Methodology for Ensuring Corporate Network Security in Remote Management. Scientific Notes of UNDI, 1(57), 10–14.
Shkitov, A. A., & Kropyvnytskyi, D. R. (2021). Synthesis of Standard Information Security Algorithms in Corporate Networks. Information Management Technologies, 2, 129–135.
Chinchyk, D., Korobeinikova, T., & Zakharchenko, S. (2021). Methods and Means of Comprehensive Protection of Corporate Networks. InterConf, (84), 433–450. https://doi.org/10.51582/interconf.7-8.11.2021.043
Sachuk, Yu.V. (2018). Information Security in Corporate Networks: Selective Academic Discipline Program for Bachelor’s Training in the Field of Information Security, Specialty 125 Cybersecurity, Educational Program Information Security. Lesya Ukrainka Eastern European National University, Department of National Security. https://evnuir.vnu.edu.ua/handle/123456789/15562.
Milyan, K. V., & Hrytsiuk, Yu. I. (2022). Features of Organizing Information Security in the Corporate Network of an Industrial Company. Scientific Bulletin of NLTU of Ukraine, 23(4), 311–327.
Kostiuk, Yu. V., & Voitkevych, A. A. (2024). Research on Technologies for Detecting and Identifying Violators for Corporate Network Protection. Science and Technology Today, 4(23), 1017–1032. https://doi.org/10.52058/2786-6025-2024-4(32)-1017-1032
Khoroshko, V. A., & Shoroshev V. V. (2019). Shortcomings of Traditional Corporate Network Security Measures in Intranet and the Necessity of Implementing New Protection Methods. Information Protection, 5–17.
Tyshyk, I. Ya. (2022). Testing an Organization’s Corporate Network for Unauthorized Access. Cybersecurity: Education, Science, Technology, 2(18), 39–46.
Syrotynskyi, R. M., & Tyshyk, I. Ya. (2024). Improving Enterprise Network Infrastructure Security Under Modern Challenges and Limited Resources. COMPUTER SYSTEMS AND NETWORKS, 6(1), 155–164.
Chong Tian a Siqiu Hu. (2020). Mathematical modeling of the analysis of the impact on the security of the communication network based on the Monte Carlo algorithm. Computer Communications, 157, 20–27.
Romansky, R. (2023). Mathematical Model Investigation of a Technological Structure for Personal Data Protection, Axioms, 12(2). https://doi.org/10.3390/axioms12020102
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Вадим Ахрамович

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.