Development of a method for synthesizing an information-analytical system for assessing the level of information transmission channels protection

Authors

DOI:

https://doi.org/10.15587/1729-4061.2024.302495

Keywords:

leakage of information, information channel, information and measurement system, information protection, threat model

Abstract

The object of the study is the process of ensuring security during data transmission through information channels. To ensure high-quality indicators of information transmission channels protection, it is necessary to periodically monitor and, when detected, close possible data leakage channels. The effectiveness of measures to protect transmission channels depends on the quality of checking the presence of possible, valid or hidden, data leakage channels. A significant number of signs of information leakage complicates the control process and leads to additional economic costs for the use of control equipment. Therefore, it is necessary to develop a method of synthesis of an information-analytical system for assessing the level of transmission channels protection. It is proposed to develop such a method on the basis of determining the dependence between control signs of the presence of information leakage channels. The proposed method allows to ensure the necessary level of security. The basis of the method for synthesis of the information-analytical system for assessing the level of information transmission channels protection is the equation of the associative connection between the control features. The presence of a connection between control signs indicates the presence of information leakage channels. This is due to the loss of characteristics (for example, voltage or signal strength) of the useful information flow due to the redistribution of data during transmission. The benefit from the application of the obtained results depends on the number of discovered and, accordingly, closed channels of information leakage. Implementation of the proposed method allows to automate the process of finding a data leak in transmission channels. The given research results can be useful in the development of software for expert decision-making systems based on the formation of knowledge bases about the relationship between control features. Implementation of the obtained results will increase the reliability and security of information transmission channels

Author Biographies

Olexander Shmatko, National Technical University “Kharkiv Polytechnic Institute”

PhD, Associate Professor

Department of Software Engineering and Management Intelligent Technologies

Serhii Yevseiev, National Technical University “Kharkiv Polytechnic Institute”

Doctor of Technical Science, Professor

Department of Cybersecurity

Valerii Dudykevych, Lviv Polytechnic National University

Doctor of Technical Sciences, Professor

Department of Information Security

Stanislav Milevskyi, National Technical University “Kharkiv Polytechnic Institute”

PhD, Associate Professor

Department of Cybersecurity

Svetlana Solnyshkova, Ivan Kozhedub Kharkiv National Air Force University

PhD, Associate Professor

Department of Physics and Electronics

Alla Havrylova, National Technical University “Kharkiv Polytechnic Institute”

Associate Professor

Department of Cybersecurity

Yanina Shestak, Taras Shevchenko National University of Kyiv

PhD

Department of Cyber Security and Information Protection

Serhii Oriekhov, Ivan Kozhedub Kharkiv National Air Force University

PhD, Associate Professor

Department of Air Defense Forces tactics of the Land Forces

Serhii Korsunov, Ivan Kozhedub Kharkiv National Air Force University

Associate Professor

Department of Air Defense Forces tactics of the Land Forces

Serhii Kravchenko, The National Defence University of Ukraine

PhD, Associate Professor

Department of Land Forces

References

  1. Yevseiev, S., Hryshchuk, R., Molodetska, K., Nazarkevych, M., Hrytsyk, V., Milov, O. et al.; Yevseiev, S., Hryshchuk, R., Molodetska, K., Nazarkevych, M. (Eds.) (2022). Modeling of security systems for critical infrastructure facilities. Kharkiv: РС ТЕСHNOLOGY СЕNTЕR, 196. https://doi.org/10.15587/978-617-7319-57-2
  2. Yevseiev, S., Kuznietsov, O., Herasimov, S., Horielyshev, S., Karlov, A., Kovalov, I. et al. (2021). Development of an optimization method for measuring the Doppler frequency of a packet taking into account the fluctuations of the initial phases of its radio pulses. Eastern-European Journal of Enterprise Technologies, 2 (9 (110)), 6–15. https://doi.org/10.15587/1729-4061.2021.229221
  3. Sokolov, A. Y. (1999). Algebraic approach on fuzzy control. IFAC Proceedings Volumes, 32 (2), 5386–5391. https://doi.org/10.1016/s1474-6670(17)56917-7
  4. Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O., Korol, O., Milevskyi, S. et al.; Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O. (Eds.) (2021). Synergy of building cybersecurity systems. Kharkiv: РС ТЕСHNOLOGY СЕNTЕR, 188. https://doi.org/10.15587/978-617-7319-31-2
  5. Shao, R., Ding, C., Liu, L., He, Q., Qu, Y., Yang, J. (2024). High-fidelity multi-channel optical information transmission through scattering media. Optics Express, 32 (2), 2846. https://doi.org/10.1364/oe.514668
  6. Kumar, P., Saxena, V. (2024). Nested Levels of Hybrid Cryptographical Technique for Secure Information Exchange. Journal of Computer and Communications, 12 (02), 201–210. https://doi.org/10.4236/jcc.2024.122012
  7. Mikoni, S. V. (2023). Approach to assessing the level of intelligence of an information system. Ontology of Designing, 13 (1), 29–43. https://doi.org/10.18287/2223-9537-2023-13-1-29-43
  8. Ramsden, J. (2023). The Transmission of Information. Bioinformatics, 75–91. https://doi.org/10.1007/978-3-030-45607-8_7
  9. Laue, F., Jamali, V., Schober, R. (2023). RIS-Assisted Device Activity Detection With Statistical Channel State Information. IEEE Transactions on Wireless Communications, 22 (12), 9473–9487. https://doi.org/10.1109/twc.2023.3271365
  10. Vähä-Savo, Lauri, Veggi, L., Vitucci, E. M., Icheln, C., Degli-Esposti, V., Haneda, K. (2023). Analytical Characterization of a Transmission Loss of an Antenna-Embedded Wall. https://doi.org/10.36227/techrxiv.170244520.01558910/v1
  11. Elzinga, R., Janssen, M. J., Wesseling, J., Negro, S. O., Hekkert, M. P. (2023). Assessing mission-specific innovation systems: Towards an analytical framework. Environmental Innovation and Societal Transitions, 48, 100745. https://doi.org/10.1016/j.eist.2023.100745
  12. Kramer, G. (2023). Information Rates for Channels with Fading, Side Information and Adaptive Codewords. Entropy, 25 (5), 728. https://doi.org/10.3390/e25050728
  13. Dos Santos, A., Barros, M. T. C. de, Correia, P. F. (2015). Transmission line protection systems with aided communication channels – Part II: Comparative performance analysis. Electric Power Systems Research, 127, 339–346. https://doi.org/10.1016/j.epsr.2015.05.010
  14. Enquist, M., Ghirlanda, S., Lind, J. (2023). Acquisition and Transmission of Sequential Information. The Human Evolutionary Transition, 167–176. https://doi.org/10.23943/princeton/9780691240770.003.0012
  15. Menezes, T. S., Barra, P. H. A., Dizioli, F. A. S., Lacerda, V. A., Fernandes, R. A. S., Coury, D. V. (2023). A Survey on the Application of Phasor Measurement Units to the Protection of Transmission and Smart Distribution Systems. Electric Power Components and Systems, 52 (8), 1379–1396. https://doi.org/10.1080/15325008.2023.2240320
  16. Ribeiro, E. P. A., Lopes, F. V., Silva, K. M., Martins-Britto, A. G. (2023). Assessment of communication channel effects on time-domain protection functions tripping times. Electric Power Systems Research, 223, 109589. https://doi.org/10.1016/j.epsr.2023.109589
  17. Shmatko, O., Herasymov, S., Lysetskyi, Y., Yevseiev, S., Sievierinov, О., Voitko, T. et al. (2023). Development of the automated decision-making system synthesis method in the management of information security channels. Eastern-European Journal of Enterprise Technologies, 6 (9 (126)), 39–49. https://doi.org/10.15587/1729-4061.2023.293511
  18. Herasymov, S., Tkachov, A., Bazarnyi, S. (2024). Complex method of determining the location of social network agents in the interests of information operations. Advanced Information Systems, 8 (1), 31–36. https://doi.org/10.20998/2522-9052.2024.1.04
  19. Gerasimov, S. V., Slupskiy, P. S., Feklistov, A. A., Chuykov, D. V. (2005). Metod opredeleniya koeffitsientov zavisimosti kontroliruemyh parametrov na osnove atributirovannogo binarnogo dereva. Systemy obrobky informatsiyi, 3 (43), 48–55. Available at: http://nbuv.gov.ua/UJRN/soi_2005_3_9
  20. Fedushko, S., Molodetska, K., Syerov, Y. (2023). Analytical method to improve the decision-making criteria approach in managing digital social channels. Heliyon, 9 (6), e16828. https://doi.org/10.1016/j.heliyon.2023.e16828
  21. Mookerjee, R., Samuel, J. (2023). Managing the security of information systems with partially observable vulnerability. Production and Operations Management, 32 (9), 2902–2920. https://doi.org/10.1111/poms.14015
  22. Marabissi, D., Abrardo, A., Mucchi, L. (2023). A new framework for Physical Layer Security in HetNets based on Radio Resource Allocation and Reinforcement Learning. Mobile Networks and Applications. https://doi.org/10.1007/s11036-023-02149-z
Development of a method for synthesizing an information-analytical system for assessing the level of information transmission channels protection

Downloads

Published

2024-04-30

How to Cite

Shmatko, O., Yevseiev, S., Dudykevych, V., Milevskyi, S., Solnyshkova, S., Havrylova, A., Shestak, Y., Oriekhov, S., Korsunov, S., & Kravchenko, S. (2024). Development of a method for synthesizing an information-analytical system for assessing the level of information transmission channels protection. Eastern-European Journal of Enterprise Technologies, 2(9 (128), 36–43. https://doi.org/10.15587/1729-4061.2024.302495

Issue

Section

Information and controlling system