Development of the automated decision-making system synthesis method in the management of information security channels

Authors

DOI:

https://doi.org/10.15587/1729-4061.2023.293511

Keywords:

information channel, information protection, logical-linguistic model, production rules, information leakage

Abstract

In the process of transmission channels functioning, the results of the work of bodies for detecting and blocking information leakage channels are not sufficiently taken into account. Management of information protection channels is actually the collection and display of data followed by the assignment of influence on each information channel separately and is carried out in manual mode. In decision support systems, the tasks of identifying information leakage channels are not solved. There is a contradiction between the requirements for the automation of the management of information protection channels and the possibility of meeting these requirements at the expense of the available automation tools. Classical theory considers the decision-making process as a choice of one of many alternatives. The development of rational forms and methods of managing information protection channels should prevent threats and challenges. Therefore, the object of research is the process of ensuring security during data transmission through information channels. The main threats and challenges are man-made and natural cataclysms, terrorism, aggression by a number of states or individual groups of people, which are not taken into account in the complex in the decision-making system during the management of information protection channels. A structural diagram of information exchange based on the description of a weakly formalized process under conditions of non-stochastic uncertainty is proposed. It is proposed to use the logical-linguistic production model. For a hierarchically organized structure based on classification features, it is proposed to build a hierarchy tree that takes into account the relationships of partially ordered sets. The formed production rules for determining appropriate strategies for the planned detection of information leakage channels based on predicted values allow to proceed to knowledge processing for the synthesis of an automated decision-making system during the management of protection channels

Author Biographies

Olexander Shmatko, National Technical University “Kharkiv polytechnic institute”

PhD, Associate Professor

Department of Software Engineering and Management Intelligent Technologies

Serhii Herasymov, National Technical University “Kharkiv polytechnic institute”

Doctor of Technical Sciences, Professor

Department of Cybersecurity

Yurii Lysetskyi, SNT Ukraine

Doctor of Technical Sciences

General Director

Serhii Yevseiev, National Technical University “Kharkiv polytechnic institute”

Doctor of Technical Sciences, Professor

Department of Cybersecurity

Оleksandr Sievierinov, Kharkiv National University of Radio Electronics

PhD, Associate Professor

Department of Information Technology Security

Tetiana Voitko, The National Defence University of Ukraine

Researcher

Research Department

Institute of Information and Communication Technologies and Cyber Defense

Andrii Zakharzhevskyi, The National Defence University of Ukraine

PhD

The National Security and Defence Strategy Department

Helen Makogon, Military Institute for Tank Troops of the National Technical University “Kharkiv Polytechnic Institute”

PhD, Associate Professor

Department of Armored Vehicles and Military Equipment

Alexander Nesterov, Kruty Heroes Military Institute of Telecommunications and Information Technology

PhD, Deputy Chief of the Department

Department of Combat Application of Communication Units

Kyrylo Bondarenko, National Technical University “Kharkiv polytechnic institute”

Postgraduate Student

Department of Cybersecurity

References

  1. Petrunia, Yu. Ye., Litovchenko, B. V., Pasichnyk, T. O. et al.; Petrunia, Yu. Ye. (Ed.) (2020). Pryiniattia upravlinskykh rishen. Dnipro: Universytet mytnoi spravy ta finansiv, 276. Available at: http://biblio.umsf.dp.ua/jspui/bitstream/123456789/4070/1/Прийняття%20упр%20рішень%202020.pdf
  2. Yevseiev, S., Hryshchuk, R., Molodetska, K., Nazarkevych, M., Hrytsyk, V., Milov, O. et al.; Yevseiev, S., Hryshchuk, R., Molodetska, K., Nazarkevych, M. (Eds.) (2022). Modeling of security systems for critical infrastructure facilities. Kharkiv: РС ТЕСHNOLOGY СЕNTЕR, 196. doi: https://doi.org/10.15587/978-617-7319-57-2
  3. Butko, M. P., Butko, I. M., Mashchenko, V. P. et al.; Butko, M. P. (Ed.) (2015). Teoriya pryiniattia rishen. Kyiv: «Tsentr uchbovoi literatury», 360. Available at: https://duikt.edu.ua/uploads/l_101_88535923.pdf
  4. Sokolov, A. Y. (1999). Algebraic approach on fuzzy control. IFAC Proceedings Volumes, 32 (2), 5386–5391. doi: https://doi.org/10.1016/s1474-6670(17)56917-7
  5. Yevseiev, S., Herasymov, S., Kuznietsov, O., Opirskyy, I., Volkov, A., Peleshok, Y. et al. (2023). Method of assessment of frequency resolution for aircraft. Eastern-European Journal of Enterprise Technologies, 2 (9 (122)), 34–45. doi: https://doi.org/10.15587/1729-4061.2023.277898
  6. Bidiuk, P. I., Tymoshchuk, O. L., Kovalenko, A. Ye., Korshevniuk, L. O. (2022). Systemy i metody pidtrymky pryiniattia rishen. Kyiv: KPI, 610. Available at: https://ela.kpi.ua/bitstream/123456789/48418/1/Systemy_i_metody_pidtrymky_pryiniattia_rishen.pdf
  7. Yevseiev, S., Kuznietsov, O., Herasimov, S., Horielyshev, S., Karlov, A., Kovalov, I. et al. (2021). Development of an optimization method for measuring the Doppler frequency of a packet taking into account the fluctuations of the initial phases of its radio pulses. Eastern-European Journal of Enterprise Technologies, 2 (9 (110)), 6–15. doi: https://doi.org/10.15587/1729-4061.2021.229221
  8. Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O., Korol, O., Milevskyi, S. et al.; Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O. (Eds.) (2021). Synergy of building cybersecurity systems. Kharkiv: РС ТЕСHNOLOGY СЕNTЕR, 188. doi: https://doi.org/10.15587/978-617-7319-31-2
  9. Komeylian, S., Paolini, C., Sarkar, M. (2023). Beamforming Technique for Improving Physical Layer Security in an MIMO-OFDM Wireless Channel. Advances in Distributed Computing and Machine Learning, 127–134. doi: https://doi.org/10.1007/978-981-99-1203-2_11
  10. Li, Z., Lin, Q., Wu, Y.-C., Ng, D. W. K., Nallanathan, A. (2023). Enhancing Physical Layer Security with RIS under Multi-Antenna Eavesdroppers and Spatially Correlated Channel Uncertainties. IEEE Transactions on Communications, 1–1. doi: https://doi.org/10.1109/tcomm.2023.3333919
  11. Qu, K., Wang, Z., Li, Z., Li, Z. (2023). Vectorial‐Manipulating Encryption for Multi‐Channel Capacity and Security Enhancement. Laser & Photonics Reviews, 17 (10). doi: https://doi.org/10.1002/lpor.202300105
  12. Mizuno, T., Nishikawa, H., Kong, X., Tomiyama, H. (2023). Empirical analysis of power side-channel leakage of high-level synthesis designed AES circuits. International Journal of Reconfigurable and Embedded Systems (IJRES), 12 (3), 305. doi: https://doi.org/10.11591/ijres.v12.i3.pp305-319
  13. Qiu, X., Yu, J., Zhuang, W., Li, G., Sun, X. (2023). Channel Prediction-Based Security Authentication for Artificial Intelligence of Things. Sensors, 23 (15), 6711. doi: https://doi.org/10.3390/s23156711
  14. Culbreth, S., Graham, S. (2023). Demonstrating Redundancy Advantages of a Three-Channel Communication Protocol. International Conference on Cyber Warfare and Security, 18 (1), 513–522. doi: https://doi.org/10.34190/iccws.18.1.964
  15. Marabissi, D., Abrardo, A., Mucchi, L. (2023). A new framework for Physical Layer Security in HetNets based on Radio Resource Allocation and Reinforcement Learning. Mobile Networks and Applications. doi: https://doi.org/10.1007/s11036-023-02149-z
  16. Masure, L., Cassiers, G., Hendrickx, J., Standaert, F.-X. (2023). Information Bounds and Convergence Rates for Side-Channel Security Evaluators. IACR Transactions on Cryptographic Hardware and Embedded Systems, 522–569. doi: https://doi.org/10.46586/tches.v2023.i3.522-569
  17. Masure, L., Standaert, F.-X. (2023). Prouff and Rivain’s Formal Security Proof of Masking, Revisited. Lecture Notes in Computer Science, 343–376. doi: https://doi.org/10.1007/978-3-031-38548-3_12
  18. Díaz, Á., Kaschel, H. (2023). Scalable Electronic Health Record Management System Using a Dual-Channel Blockchain Hyperledger Fabric. Systems, 11 (7), 346. doi: https://doi.org/10.3390/systems11070346
  19. Wichelmann, J., Peredy, C., Sieck, F., Pätschke, A., Eisenbarth, T. (2023). MAMBO–V: Dynamic Side-Channel Leakage Analysis on RISC–V. Lecture Notes in Computer Science, 3–23. doi: https://doi.org/10.1007/978-3-031-35504-2_1
  20. Fedushko, S., Molodetska, K., Syerov, Y. (2023). Analytical method to improve the decision-making criteria approach in managing digital social channels. Heliyon, 9 (6), e16828. doi: https://doi.org/10.1016/j.heliyon.2023.e16828
  21. Mookerjee, R., Samuel, J. (2023). Managing the security of information systems with partially observable vulnerability. Production and Operations Management, 32 (9), 2902–2920. doi: https://doi.org/10.1111/poms.14015
  22. Grant, D. G., Behrends, J., Basl, J. (2023). What we owe to decision-subjects: beyond transparency and explanation in automated decision-making. Philosophical Studies. doi: https://doi.org/10.1007/s11098-023-02013-6
Development of the automated decision-making system synthesis method in the management of information security channels

Downloads

Published

2023-12-21

How to Cite

Shmatko, O., Herasymov, S., Lysetskyi, Y., Yevseiev, S., Sievierinov О., Voitko, T., Zakharzhevskyi, A., Makogon, H., Nesterov, A., & Bondarenko, K. (2023). Development of the automated decision-making system synthesis method in the management of information security channels. Eastern-European Journal of Enterprise Technologies, 6(9 (126), 39–49. https://doi.org/10.15587/1729-4061.2023.293511

Issue

Section

Information and controlling system