К вопросу выбора стратегии защиты системы связи специального назначения при угрозах информационной безопасности
Работая с нашим сайтом, вы даете свое согласие на использование файлов cookie. Это необходимо для нормального функционирования сайта, показа целевой рекламы и анализа трафика. Статистика использования сайта отправляется в «Яндекс» и «Google»
Научный журнал Моделирование, оптимизация и информационные технологииThe scientific journal Modeling, Optimization and Information Technology
Online media
issn 2310-6018

To the question of choosing a defense strategy communication systems for special purposes in case of information security threats

idKanavin S.V.

UDC УДК 004.056.53
DOI: 10.26102/2310-6018/2021.34.3.020

  • Abstract
  • List of references
  • About authors

Abstract: The challenges of modern information security threats that have a destabilizing effect on special purpose communication systems (SSSN) require a response. At the same time, counteraction in the SSSN is considered as a complex, multilevel hierarchical process, and the information conflict is considered as a way of interaction between the components of the system, the result of which is not predetermined in advance. As a result, it is possible to implement various strategies for protecting information systems based on possible options for action. When analyzing the information conflict in the SSSN, the models of conflicts based on control theory, game theory, and the probabilistic-temporal approach are considered. On the basis of the principle of direct modeling of the conflict process, a model of conflict interaction "СССН-intruder" is proposed. The proposed model of the conflict "СССН-intruder" at the conceptual level is structurally presented in the form of a system with two control loops, having a common object of influence СССН and directly opposite goals of functioning, and the dynamics of their interaction is presented in the form of a scheme "impact-response" with the possibility of making a decision on the application of measures to counter conflict impact both after the fact of impact, and after establishing the fact of active scanning of vulnerabilities. The counteraction strategy in this case involves the use of the available resource, according to a certain algorithm, for the response of the system to the impact. It is shown that the choice of the countermeasures strategy, as well as the conflict interaction itself, depends on the operating conditions and parameters of the SCCH. As a result of modeling, it was shown that the conflict interaction over the entire time interval is cyclical, i.e. there is a predominance of the conflict impact or the strategy of counteraction to the conflict impact, at each step of the conflicting interaction of the parties.

1. About communication: Feder. Law of 07.07.2003 No. 126-FZ Available at: http://www.consultant.ru/cons/cgi/online.cgi?req=doc&base=LAW&n=284635&fld=134&dst=1000000001,0&rnd=0.051152897698079736#08312366978414549. (date of access : 08/10/2021).

2. Yazov Yu. K., Burushkin A. A., Ivanov S. M. Basic information security strategies in computer systems. Information and security. 2008;1:118-121.

3. Severin D. V., Pakhomenkova D. V., Drozdov D. V. Review of strategies for ensuring information security in information systems. Science and Business: Ways of Development. 2019;10(100):137-140.

4. Maltsev G. N., Lesnyak D. A. Application of strategies for maintaining security in information systems. Information and Control Systems. 2017;3(88):67-74.

5. Vakhniy T. V., Guts A. K. Game-theoretic approach to the choice of optimal strategies for protecting information resources. Mathematical Structures and Modeling. 2009;19:104-107.

6. Atif A., Sean B., Sangseo P. Information Security Strategies: Towards an Organizational Multi-Strategy Perspective. Journal of Intelligent Manufacturing. 2014;2(25). DOI: 10.1007 / s10845-012-0683-0. Available at: http://dx.doi.org/10.1007/s 10845-012-0683-0 (date accessed 10.08.2021).

7. Makarenko S. I. A dynamic model of a communication system in the context of a functional multilevel information conflict of observation and suppression. Systems of Control, Communication and Security. 2015;3:122-183.

8. Khokhlov N. S. Modeling and optimization of counteraction to information destruction in control and communication systems of internal affairs bodies in conditions of counteraction to information security threats. Voronezh. 2005.

9. Novikov D. A. Hierarchical models of military operations. Large-Scale Systems Control. 2012;37:25–62.

10. Makarenko S. I. Model of dynamic multilateral information conflict with different strategies of participants. Radiopromyslennost. 2021;2(31):35-48.

11. Koziratskiy Yu. L. Methodical approach to the construction of probabilistic models of the conflict of groups on the basis of semi-Markov processes. Vestnik of Voronezh Institute of the Ministry of Interior of Russia. 2017;4:135-143.

12. Shakirova A. E. Simulation models in the contour of managing organizational conflicts. Engineering journal of Don. 2020;8:268-279.

13. Khokhlov N. S., Naumets A. V. Composition and structure of the control system of communication networks in conditions of conflict interaction of the parties. Vestnik of Voronezh Institute of the Ministry of Interior of Russia. 2007;4:132-136.

14. Bokova O. I., Zhayvoronok D. A., Kanavin S. V., Khokhlov N. S. Model of a complex of means of counteracting threats to information security in special purpose communication networks. Modeling, optimization and information technology. 2020; 2 (29): 41-42. Available at: https://moit.vivt.ru/wp-content/uploads/2020/05/BokovaSoavtors_2_20_1.pdf DOI: 10.26102 / 2310-6018 / 2020.29.2.040 (date of access: 08/10/2021).

15. Gilev I. V., Kanavin S. V., Popov A. V., Khokhlov N. S. Method of counteracting destructive electromagnetic influences based on additional modulation using wavelet transform in special purpose communication networks. Modeling, optimization and information technology. 2020; 2 (29): 12-13. Available at: https://moit.vivt.ru/wp-content/uploads/2020/05/GilevSoavtors_2_20_1.pdf. DOI: 10.26102 / 2310-6018 / 2020.29. 2.039 (date of access: 08/10/2021).

16. Bokova O. I., Kanavin S. V., Khokhlov N. S. Assessment of possible damage and reaction time of a complex of countermeasures to the implementation of threats to information security of a special-purpose communication network. Modeling, optimization and information technology. 2020; 8 (4). Available at: https://moitvivt.ru/ru/journal/pdf?id=887. DOI: 10.26102 / 2310-6018 / 2020.31.4.037. DOI: 10.26102 / 2310-6018 / 2020.31.4.037 (date accessed: 10.08.2021).

Kanavin Sergei Vladimirovich
Candidate of Technical Sciences
Email: sergejj-kanavin@rambler.ru

ORCID | eLibrary |

Voronezh Institute of the Ministry of the Interior of Russia

Voronezh, Russian Federation

Keywords: protection strategies, threats to information security, communication system of special purpose, information conflict, conflict interaction, management of the information security system

For citation: Kanavin S.V. To the question of choosing a defense strategy communication systems for special purposes in case of information security threats. Modeling, Optimization and Information Technology. 2021;9(3). Available from: https://moitvivt.ru/ru/journal/pdf?id=1033 DOI: 10.26102/2310-6018/2021.34.3.020 (In Russ).


Full text in PDF

Received 11.08.2021

Revised 15.09.2021

Accepted 17.09.2021

Published 11.10.2021