Development of the approach for designing, modelling and research of critical IT infrastructure

Authors

DOI:

https://doi.org/10.15587/2312-8372.2017.112495

Keywords:

critical IT infrastructure, hybrid extended open automaton, level of model abstraction

Abstract

The object of research is a critical IT infrastructure. One of the most problematic places in the study of critical IT infrastructures is the complete lack of approaches, methodology and tools for designing, modeling and researching critical IT infrastructures that could be used in the form in which they are offered.

On the basis of expanded open hybrid automata, an approach is proposed that will allow to compactly describe the components, critical IT infrastructure systems and their interrelations, both internal and external. Its peculiarity is the use of an extended set of parameters, which makes it possible to provide probabilistic and qualitative features to models of components and systems of a critical IT infrastructure.

In the course of the research, the Matlab software package is used, which allows to check the proposed approach and models for workability.

The resulting models are fairly compact and completely reflect the necessary logic of the work of the relevant components and critical IT infrastructure systems. It is shown that this is achieved due to the flexibility of the proposed mathematical apparatus, namely the possibility of creating compositions from simple models for the formation of more complex ones.

In the future, the proposed approach and the creation of a library of models for all major systems and critical IT infrastructure components will provide a convenient tool for a wide range of researchers whose work is related to all aspects of researching critical IT infrastructures.

Author Biography

Yaroslaw Dorogyy, National Technical University of Ukraine «Igor Sikorsky Kyiv Polytechnic Institute», 37, Peremohy ave., Kyiv, Ukraine, 03056

PhD, Associate Professor

Department of Automation and Control in Technical Systems

References

  1. Pro vnesennia zmin do deiakykh zakoniv Ukrainy shchodo zabezpechennia kibernetychnoi bezpeky Ukrainy. Draft Law No. 11125 from August 31, 2012. Official web portal of the Verkhovna Rada of Ukraine. Available at: http://w1.c1.rada.gov.ua/pls/zweb2/webproc4_1?id=&pf3511=44208
  2. Rinaldi, S. M., Peerenboom, J. P., Kelly, T. K. (2001). Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Systems Magazine, 21 (6), 11–25. doi:10.1109/37.969131
  3. Ouyang, M. (2014). Review on modeling and simulation of interdependent critical infrastructure systems. Reliability Engineering & System Safety, 121, 43–60. doi:10.1016/j.ress.2013.06.040
  4. Satumtira, G., Duenas-Osorio, L. (2010). Synthesis of Modeling and Simulation Methods on Critical Infrastructure Interdependencies Research. Sustainable and Resilient Critical Infrastructure Systems. Berlin, Heidelberg: Springer, 1–51. doi:10.1007/978-3-642-11405-2_1
  5. Hasan, S., Foliente, G. (2015). Modeling infrastructure system interdependencies and socioeconomic impacts of failure in extreme events: emerging R&D challenges. Natural Hazards, 78 (3), 2143–2168. doi:10.1007/s11069-015-1814-7
  6. Oliva, G., Panzieri, S., Setola, R. (2011). Fuzzy dynamic input–output inoperability model. International Journal of Critical Infrastructure Protection, 4 (3-4), 165–175. doi:10.1016/j.ijcip.2011.09.003
  7. Kaegi, M., Mock, R., Kroger, W. (2009). Analyzing maintenance strategies by agent-based simulations: A feasibility study. Reliability Engineering & System Safety, 94 (9), 1416–1421. doi:10.1016/j.ress.2009.02.002
  8. Rolik, A. I. (2012). Kontseptsiia upravleniia korporativnoi IT-infrastrukturoi. Visnyk NTUU «KPI». Informatics, operation and computer science, 56, 31–55.
  9. Svendsen, N. K., Wolthusen, S. D. (2007). Graph Models of Critical Infrastructure Interdependencies. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 208–211. doi:10.1007/978-3-540-72986-0_27
  10. Wang, S., Hong, L., Ouyang, M., Zhang, J., Chen, X. (2013). Vulnerability analysis of interdependent infrastructure systems under edge attack strategies. Safety Science, 51 (1), 328–337. doi:10.1016/j.ssci.2012.07.003
  11. Gursesli, O., Desrochers, A. A. (2003). Modeling infrastructure interdependencies using Petri nets. SMC’03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme – System Security and Assurance (Cat. No.03CH37483). IEEE, 1506–1512. doi:10.1109/icsmc.2003.1244625
  12. Beccuti, M., Chiaradonna, S., Di Giandomenico, F., Donatelli, S., Dondossola, G., Franceschinis, G. (2012). Quantification of dependencies between electrical and information infrastructures. International Journal of Critical Infrastructure Protection, 5 (1), 14–27. doi:10.1016/j.ijcip.2012.01.003
  13. Di Giorgio, A., Liberati, F. (2012). A Bayesian Network-Based Approach to the Critical Infrastructure Interdependencies Analysis. IEEE Systems Journal, 6 (3), 510–519. doi:10.1109/jsyst.2012.2190695
  14. Dorogyy, Ya. Yu. (2016). TS-sumisna arkhitektura krytychnoi IT-infrastruktury. Visnyk NTUU «KPI». Informatics, operation and computer science, 65.
  15. Lee, J., Bohacek, S., Hespanha, J. P., Obraczka, K. (2007). Modeling Communication Networks With Hybrid Systems. IEEE/ACM Transactions on Networking, 15 (3), 630–643. doi:10.1109/tnet.2007.893090

Published

2017-09-21

How to Cite

Dorogyy, Y. (2017). Development of the approach for designing, modelling and research of critical IT infrastructure. Technology Audit and Production Reserves, 5(2(37), 34–41. https://doi.org/10.15587/2312-8372.2017.112495

Issue

Section

Information Technologies: Original Research