FEATURES OF ENSURING WARRANTY AND CYBER RESISTANCE OF INFORMATION EXCHANGE IN COMPLEX CONDITIONS

DOI: 10.31673/2412-4338.2024.022128

Authors

  • І. М. Оксанич, (Oksanych I. M.) Institute of Problems of Mathematical Machines and Systems of NAS of Ukraine, Kyiv
  • В. Ф. Гречанінов, (Grechaninov V. F.) Research Department of IPMS of NAS of Ukraine, Kyiv
  • В. А. Литвинов, (Lytvynov V. A.) Institute of Problems of Mathematical Machines and Systems of NAS of Ukraine, Kyiv
  • П. М. Складанний, (Skladannyy P. M.) Borys Grinchenko Kyiv Metropolitan University, Kyiv

Abstract

The article examines the problems and tasks of ensuring sustainable information exchange (SIE) when responding to incidents of increased complexity of a natural and military nature, such as earthquakes, large-scale fires, volcanic eruptions, intense combat operations, etc. The specificity of emergency events is the restriction of human access to certain regions, the complication of SIE with the central bodies of force management and the means of responding to them due to the partial destruction or failure of the information infrastructure, potential threats of the negative impact of anthropogenic nature on the guarantee capacity of this infrastructure. In these conditions, the implementation of a set of organizational and technical measures in the management plan of the SIE, including the formation and implementation at the stage of its design of relevant requirements and the implementation of certain tasks directly during the incident, becomes of key importance. The work considers two levels of incident response management - the level of the response control center (RCC), as the level of the main SC, and the level of the incident zone, where work is carried out to respond and eliminate the consequences of an emergency situation. For each of the levels, the tasks to be solved are outlined. The main goal of SIE with the SDGs is to build a guarantee-capable cyber-resistant system of situational awareness and modeling of the processes taking place and the nature of their further course. The result of such modeling can be recommendations to support decision making by decision makers (DMPs). At the RCC level, all incident information is stored for future use to respond to other possible incidents of the same type. The means of communication and the types of information transmitted are defined. The main tasks that must be solved at the level of the incident are data collection, data transformation, ensuring secure data transmission over the network and the use of appropriate protocols. It is noted that despite all types of communication that can be used in the area of the incident, satellite communication still remains a priority. Therefore, the need to use cloud technologies for SIE is emphasized. The use of a role-oriented user interface of cloud services is proposed as a means of demarcating access and an additional (along with encryption) means of strengthening the protection of information transmitted over the network.

Keywords: situation center, information exchange, warranty capacity, cyber resistance, information protection, access control, role-oriented interface, cloud technologies.

References
1. Joint Doctrine Publication (JDP) 6-00 Communications and Information Systems Support to Joint Operations (3rd Edition) dated January 2008. URL: https://assets.publishing.service.gov.uk/media/5a78d1e840f0b6324769a6ad/20111221JDP600_Ed3_inc_Chg1.pdf .
2. National Information Exchange Model (NIEM). Military Operations Domain Strategic Plan. Aug, 2017. URL: http://niem.github.io/community/milops/educational/MilOpsStraPlanv7.pdf.
3. Civilian-Military Information Sharing Guidebook for Mission Planning in a Federated Mission Networking Environment. MCDC 2017-2018: CMIS Guidebook. URL: https://www.cimic-coe.org/resources/handbooks/final-cmis-guidebook-oct2018-cek.pdf.
4. D. Taylor. The evolution of real-time data-sharing in naval warfare. Military Embedded Systems, September 06, 2023. URL: https://militaryembedded.com/comms/communications/the-evolution-of-real-time-data-sharing-in-naval-warfare.
5. What are military data links. Bundeswehr, 2023. URL: https://www.bundeswehr.de/en/military-data-links-5676750#:~:text=Military%20data%20links%20are%20special,and%20command%20and%20control%20systems .
6. Infrastructure Resilience Planning Framework (IRPF). CISA (March 25, 2024) URL: https://www.cisa.gov/resources-tools/resources/infrastructure-resilience-planning-framework-irpf
7. Romaniuk, O., Skladannyi, P., & Shevchenko, S. (2022). Comparative analysis of solutions to ensure control and management of privileged access in the IT environment. Electronic specialized scientific publication "Cybersecurity: education, science, technology", 4(16), 98–112.
8. Sokolov, V. Y., & Kurbanmuradov, D. M. (2018). Methods of countering social engineering at the objects of information activity. Electronic professional scientific publication "Cybersecurity: education, science, technology", 1(1), 6–16.
9. Vladymyrenko, M., Sokolov, V., & Astapenya, V. (2019). Study of stability of peer-to-peer wireless networks with self-organization. Electronic professional scientific publication "Cybersecurity: education, science, technology", 3(3), 6–26.
10. Tolyupa, S., Samokhvalov, Yu., Husainov, P., & Shtanenko, S. (2023). Self-diagnosis as a way to increase the cyber resistance of the terminal components of the technological system. Electronic specialized scientific publication "Cybersecurity: education, science, technology", 2(22), 134–147.
11. Kryuchkova, L., Skladanniy, P., & Vorohob, M. (2023). Pre-project solutions for building an authorization system based on the Zero Trust concept. Electronic specialized scientific publication "Cybersecurity: education, science, technology", 3(19), 226–242.
12. Bovda E.M. Conceptual bases of the synthesis of the automated military communication control system / Yu.A. Plugovyi, V.A Romanyuk // Collection of scientific works of VITI - 2016. - No. 1. – pp. 6-18.
13. Grechaninov, V., et al. (2021). Decentralized Access Demarcation System Construction in Situational Center Network. In Cybersecurity Providing in Information and Telecommunication Systems II, 3188 (2), 197–206.
14. Grechaninov, V., et al. (2022). Formation of Dependability and Cyber Protection Model in Information Systems of Situational Center. In Emerging Technology Trends on the Smart Industry and the Internet of Things, 3149,107–117.
15. I.M. Oksanych Using ontologies to build a role-oriented user interface in automated systems of service-oriented architecture. Proceedings of the XV International Scientific and Practical Conference "The main directions of the development of scientific research" (April 18 - 21, 2023) Helsinki, Finland. pp. 375-377. URL: https://isg-konf.com/the-main-directions-of-the-development-of-scientific-research/.

Published

2024-07-25

Issue

Section

Articles