INFORMATION PROTECTION IN AUTOMATED SYSTEMS BASED ON A CONCEPTUAL MODEL WITH FORMALIZED EFFICIENCY EVALUATION

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.28.798

Keywords:

automated systems, information security, SCADA, IIoT, access control, anomaly detection, encryption, conceptual model, security effectiveness

Abstract

In the context of increasing cyber threats and the implementation of digital technologies in production process management, automated systems are increasingly becoming targets of attacks, raising the issue of ensuring information security at critical levels. This is particularly relevant for SCADA, IIoT, and MES environments, where the use of isolated solutions without a unified security architecture leads to vulnerabilities and reduced effectiveness in incident response. The article presents a conceptual model of information protection that integrates access control, anomaly detection, and encryption of critical messages, and includes a formalized evaluation of effectiveness based on quantitative metrics. The methodological foundation of the study involves structural threat modeling, algorithmic design of protective mechanisms, implementation of functional modules in the Python environment, and simulation of behavioral scenarios using generated event logs. To assess the effectiveness of the security model, metrics such as risk coefficient, detection rate, access entropy, and average response time were used. The algorithms operate in real time, responding to events according to a predefined logic: the system blocks or limits suspicious actions, activates encryption of critical messages, and logs all incidents in the event journal. The simulation confirmed the effectiveness of the proposed model: the risk coefficient was reduced by more than half, the attack detection accuracy reached 95–98%, and the access entropy increased, indicating a more balanced and secure rights management. The proposed model establishes a multi-level security architecture that can be implemented in both traditional SCADA and MES systems, as well as IIoT infrastructures. Thanks to its flexible structure, open implementation, and adaptability, the model can be scaled to meet specific enterprise needs and applied in resource-constrained environments or large industrial systems. The obtained results demonstrate the practical applicability of the model for ensuring reliable data protection in the modern cyber environment.

Downloads

Download data is not yet available.

References

Mazurenko, V. B., et al. (2021). Osnovni zakhody zabezpechennia kiberbezpeky suchasnykh system promyslovoi avtomatyzatsii. Actual problems of automation and information technology, 25, 108–118. https://doi.org/10.15421/432112

Panovyk, U. P. (2024). Kiberbezpeka v telekomunikatsiinykh merezhakh ta systemakh. Naukovi zapysky, 1(68), 122–135. https://doi.org/10.32403/1998-6912-2024-1-68-122-135

Chepel, L. V., & Boiko, Yu. V. (2024). Pidkhid do bezpeky ta orhanizatsii merezh IoT z vykorystanniam blokchein tekhnolohii. Visnyk VPI, 175(4), 129–138. https://doi.org/10.31649/1997-9266-2024-175-4-129-138

AL-Hawawreh, M., & Sitnikova, E. (2020). Developing a Security Testbed for Industrial Internet of Things. IEEE Internet of Things Journal. 8(7), 5558–5573. https://doi.org/10.1109/jiot.2020.3032093

Aouedi, O., et al. (2024). A Survey on Intelligent Internet of Things: Applications, Security, Privacy, and Future Directions. IEEE Communications Surveys & Tutorials, 27(2), 1238–1292. https://doi.org/10.1109/comst.2024.3430368

Barsha N. K., & Hubballi N. (2024). Anomaly Detection in SCADA Systems: A State Transition Modeling. IEEE Transactions on Network and Service Management, 21(3), 3511–3521. https://doi.org/10.1109/tnsm.2024.3373881

Chih-Yuan Lin. (2020). A timing approach to network-based anomaly detection for SCADA systems. Linköping: Linköping University Electronic Press. https://doi.org/10.3384/lic.diva-165155

Hassan ALI, et al. (2023). Cellsecure: Securing image data in industrial internet-of-things via cellular automata and chaos-based encryption. In 2023 IEEE 98th Vehicular Technology Conference (VTC2023-Fall), 1–6. https://arxiv.org/abs/2309.11476

MES and Security. Critical Manufacturing. (n. d.). https://www.criticalmanufacturing.com/blog/mes-and-security/?utm_source=chatgpt.com

MES Computing’s 10 Most-Viewed Stories In 2024. (2024). MES Computing - Daily Technology News for Midmarket IT Leaders. https://www.mescomputing.com/news/business/mes-computing-s-10-most-viewed-stories-in-2024?utm_source=chatgpt.com

Mosteiro-Sanchez, A., et al. (2020). Securing IIoT using Defence-in-Depth: Towards an End-to-End secure Industry 4.0. Journal of Manufacturing Systems, 57, 367–378. https://doi.org/10.1016/j.jmsy.2020.10.011

Motakatla Venkateswara Reddy, et al. (2023). Cybersecurity Anomaly Detection in SCADA-Assisted OT Networks Using Ensemble-Based State Prediction Model. U.S. Department of Energy Office of Scientific and Technical Information. https://doi.org/10.2172/1996392

Okur C., & Dener M. (2025). Symmetrical Resilience: Detection of Cyberattacks for SCADA Systems Used in IIoT in Big Data Environments. Symmetry, 17(4):480. https://doi.org/10.3390/sym17040480

Phillips, B., Gamess, E. & Krishnaprasad, S. (2020). An Evaluation of Machine Learning-based Anomaly Detection in a SCADA System Using the Modbus Protocol. Conference: ACM Southeast Conference At: Tampa, FL, USA. https://doi.org/10.1145/3374135.3385282

Poorazad, S. K., Benzaïd, C. & Taleb, T. (2023). Blockchain and deep learning-based ids for securing sdn-enabled industrial iot environments. In GLOBECOM 2023-2023 IEEE Global Communications Conference, 2760–2765. https://arxiv.org/abs/2401.00468

Shaporin, V. O., Tishin, P. M., & Shaporina, O. L. (2018). Vulnerability ontology in SCADA systems. Systems and Technologies, 1(56), 18–29. https://doi.org/10.32836/2521-6643-2018-1-56-2

Shulika, K. et al. (2024). A method of using modern endpoint detection and response (EDR) systems to protect against complex attacks. Innovative technologies and scientific solutions for industries, 2(28), 182–195. https://doi.org/10.30837/2522-9818.2024.2.182

Downloads


Abstract views: 104

Published

2025-06-26

How to Cite

Panovyk, U. (2025). INFORMATION PROTECTION IN AUTOMATED SYSTEMS BASED ON A CONCEPTUAL MODEL WITH FORMALIZED EFFICIENCY EVALUATION. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 4(28), 307–320. https://doi.org/10.28925/2663-4023.2025.28.798