Keywords: countering threats to information security, special-purpose communications networks, integrated approach, fuzzy expert systems, security management
Model of complex flows address threats to information security in communication networks special purpose
UDC 004.056.53
DOI: 10.26102/2310-6018/2020.29.2.040
Currently, special-purpose communications networks are widely used in government bodies, bodies that carry out the functions of the country's defense, state security and law enforcement. In connection with the features of the functioning of infocommunication systems and communication networks for special purposes, it must be borne in mind that they are deployed and provide management and interaction within the existing departmental and interdepartmental communication systems. The article proposes a model for the formation of a set of means to counter threats to information security in communication networks for special purposes. A description of such complexes is given, situations and grounds for their application are considered. Attention is drawn to the identification of common technological features of the formation of a set of means to counter threats to information security in communication networks for special purposes. To formulate requirements for complexes of means of counteracting threats to information security in communication networks for special purposes, a rule base has been compiled on the basis of which certain countermeasures will be selected. The authors modeled the functioning of a complex of countermeasures using the apparatus of linguistic variables and fuzzy expert systems. Based on the results obtained, requirements can be proposed for creating a set of means to counter threats to information security in special communication networks. The mathematical apparatus used in this article, based on the use of linguistic variables and fuzzy expert systems, can fully characterize the dependence of the effectiveness of countermeasures on the totality of implemented protective measures.
1. About the connection: fed. Law dated 07.07.2003 No. 126-FZ. Available at: http://www.consultant.ru/cons/cgi/online.cgi?req = doc & base = LAW & n = 284635 & fld = 134 & dst = 1000000001.0 & rnd = 0.051152897698079736 # 08312366978414549 (accessed 03.06.2020).
2. Burenin AN, Legkov K. E. Security issues of infocommunication systems and networks for special purposes: the main threats, methods and means of ensuring integrated network security. H&ES Research. 2015;7(3):46-61.
3. Legkov K.E., Burenin A.N. Models of processes for organizing the processing of operational information by modern computing systems in the context of counteractions. Questions of defense technology. 2018;3:87-95.
4. Makarenko S.I. A dynamic model of a communication system under the conditions of a multilevel informational conflict of observation and suppression. Management, communication and security systems. 2015;3:122-185.
5. Makarenko S. I. Descriptive Model of a Special Purpose Communication Network. Management, communication and security systems. 2017;2:113-164.
6. Bogovik A. V., Ignatov V.V. The effectiveness of military communications and methods for its evaluation. St. Petersburg: VAS. 2006: 183.
7. Khokhlov N.S. Modeling and optimization of counteraction to information destruction in control and communication systems of internal affairs agencies in the context of countering information security threats: a monograph. Voronezh: Voronezh Institute of the Ministry of Internal Affairs of Russia. 2005:181.
8. Novoseltsev V.I., Kochedykov S.S., Orlova D.E. Crohn's tensor analysis and its applications: monograph. Voronezh: Scientific book. 2017:260.
9. Malyuk A.A. The basics of security policy for critical systems of information infrastructure: a course of lectures. M .: Hot line - Telecom. 2019:314.
10. Kanavin S.V. Gilev I.V., Popov A.V. Methods for the formation of elements of a complex to combat information destruction in special-purpose communication systems under destructive broadband influences. Federal Service for Intellectual Property: Certificate No. 2020611635; registered in the Register of computer programs of February 05, 2020
11. Khokhlov N.S., Kanavin S.V., Gilev I.V. The use of a multi-sector MIMO antenna system as an element of a set of means of counteracting destructive electromagnetic influences. The bulletin of Voronezh Institute of the Ministry of Internal Affairs of Russia. 2019;4:126-136.
12. Novikov D.A. Theory of management of organizational systems. - 2nd ed. M.: Fismalit. 2007:584.
13. Gilev I.V. A model for counteracting the destruction of information under destructive electromagnetic influences in special-purpose radio communication systems based on fuzzy expert systems. The bulletin of Voronezh Institute of the Ministry of Internal Affairs of Russia. 2020;1:158-168.
14. Khokhlov N.S., Dunin V.S. A model of information security threats of the Safe City integrated automated intellectual system. The bulletin of Voronezh Institute of the Ministry of Internal Affairs of Russia. 2011;1:74-79.
15. Khokhlov N.S., Kanavin S.V., Gilev I.V., Popov A.V. The program of choosing methods of counteracting destructive electromagnetic influences based on neural networks. Federal Service for Intellectual Property: Certificate No. 2020615923; registered in the Computer Software Registry of May 12,2020
16. Bokova O.I., Bondar K.M., Dunin V.S., Kanavin S.V., Skripko P.B. Modeling processes of the secondary geodynamic factors for ensuring the law-enforcement segment of the hardware and software complex «Safe city». Modeling, optimization and information technology. 2018; 4 (23). Available at: https://moit.vivt.ru/wpcontent/uploads/2018/10/BokovaSoavtori_4_18_1.pdf. DOI: 10.26102 /2310- 6018/2018.23.4.038 (accessed: 02.06.2020).
17. Khokhlov N.S., Kanavin S.V., Serpilin A.S. Requirements for the information security of radio monitoring systems, collection and processing of information of internal affairs bodies. Scientific and technical portal of the Ministry of Internal Affairs of Russia. M .: FKU NPO STIS Ministry of Internal Affairs of Russia. 2019;1:14-22.
18. Kanavin S., Gilev I. Modeling the Destructive Effect of Interference on Mobile Networks, Using the 3G Standard as an Example, Using a Noise Generator // Bulletin of the Lipetsk State Technical University. 1st International Conference on Control Systems, Mathematical Modeling, Automation and Energy Efficiency (SUMMA) – Lipetsk. 2019;407-410. DOI: 10.1109 / SUMMA48161.2019.8947533.
19. Goremykina G.I., Mastyaeva I.N., Gerasimova E.K. Modeling a system for evaluating the effectiveness of quality management based on Fuzzy technology in the Matlab environment. Fundamental research. 2013;6(8):1434-1439.
Keywords: countering threats to information security, special-purpose communications networks, integrated approach, fuzzy expert systems, security management
For citation: Bokova O.I., Zhayvoronok D.A., Kanavin S.V., Khokhlov N.S. Model of complex flows address threats to information security in communication networks special purpose. Modeling, Optimization and Information Technology. 2020;8(2). URL: https://moit.vivt.ru/wp-content/uploads/2020/05/BokovaSoavtors_2_20_1.pdf DOI: 10.26102/2310-6018/2020.29.2.040 (In Russ).
Published 30.06.2020