Method for constructing a stabilization function for managing cybersecurity on the basis of the mathematical model of oscillations under the action of forces with a delay

DOI №______

Authors

  • Г. В. Шуклін, (Shuklin H. V.) State University of Telecommunications, Kyiv
  • О. В. Барабаш, (Barabash O. V.) State University of Telecommunications, Kyiv

Abstract

The article studies cyber security management systems, in which there is a downtime - a separate type of adaptive systems. Made the analysis of the reasons that influence the appearance of delay (downtime) in information security systems in cybernetic attacks. A mathematical model of a quantitative evaluation of the effectiveness of the information protection system is proposed, for example of oscillations that arise under the action of a force with delay. Cybernetic attacks are considered as continuous messages in the form of difference starting counting points, and have the following principles: sequential coding, regeneration, robustness, uncertainty. The firewall attack simulator shows the cyber security management technique. Making an evaluation of effectiveness of data security system must be counted delay (downtime), which attacks were in previous period of time and which managing security features were used. Existing of security windows give a possibility to get new information about disadvantages, which are in security system and in time eliminate them. Work in Internet now a days practical unbelievable without using firewall, which secures computer from outside attack and restrict application work according to task inserted by user his rules. Manufacturers of malicious programs, in turn apply different methods of struggle with firewall. Theme of the article is review of the most widespread methods to fight with firewall. For each method given technology of secure and methods of checking firewalls. The new approach makes it possible to influence the instability of the predatorprey oscillatory process by adjusting the delay time and at the same time to determine the parameters that affect the stability margin.

Keywords: cyber space, attacks, time delay, control function, firewall, oscillatory stability, intensity of attacks, trusted processes.

Reference (MLA)
1. Borsukovskii Y. V., and Borsukovska V. Y. "Applied Aspects of Protection of Information in Modern Conditions." Sychasnyi Zakhyst Informatsii 2(34) (2018): 6-11. Print.
2. Grishuk R.V. "Differential-Game Method For Evaluating The Effectiveness Of Information Security Systems." Sychasnyi Zakhyst Informatsii 1 (2012): 40-44. Print.
3. Grishuk R. V., Khoroshko V. O., and Hohlachova U. E. " Use of Differential Games to Optimize Control in Information Security Systems." Sychasnyi Zakhyst Informatsii 2 (2012): 21-26. Print.
4. Horoshko V.O., and Chernishev O. M., "An Algorithm for Detecting Attacks for Information Monitoring Tools." Sychasnyi Zakhyst Informatsii 1 (2012) : 49-56. Print.
5. Nevoyt Y. V., and Khoroshko V. O. " The Influence of Genetic Algorithms on the Effectiveness of Solving Information Security Problems." Sychasnyi Zakhyst Informatsii (2) (2012): 58-64. Print.
6. Tolubko V. B., Berkman L. N., Otroh S. I., and Kilmeninov O. A. "Model of the Combined System of Management of the Future Network." Naukovi Zapysky Ukrayinskoho Naukovo-Doslidnoho Instytutu Zviazku 1(49) (2018): 5-11. Print.
7. Dakhno N. B., Maisak T. V., and Shevchenko H. V. "Analysis of Information Security in Information and Communication Systems and Networks Modeled by Integrated Differential Equations with Low Non-Linearity Based on Modified Gradient Methods." Sychasnyi Zakhyst Informatsii (1) (2017): 115-119. Print.
8. Khoroshko V. O., Maisak T. V., and Dakhno N. B. "Analysis of Mathematical Models of Information and Communication Systems and Networks for the Protection of Information on the Basis of the Theory of Variational-Gradient Methods." Modelling and Information Methods in Economic 91 (2015): 246-255. Print.
9. Shuklin G.V. "About one problem of stabilization of the pendulum with delay." Visnyk Kyivskoho Universytetu (4) (2002): 275-283. Print.
10. http:// firewallleaktester.com. Web. 23 Feb. 2018

Published

2018-12-06

Issue

Section

Articles