Development of a method for synthesizing an information-analytical system for assessing the level of information transmission channels protection
DOI:
https://doi.org/10.15587/1729-4061.2024.302495Keywords:
leakage of information, information channel, information and measurement system, information protection, threat modelAbstract
The object of the study is the process of ensuring security during data transmission through information channels. To ensure high-quality indicators of information transmission channels protection, it is necessary to periodically monitor and, when detected, close possible data leakage channels. The effectiveness of measures to protect transmission channels depends on the quality of checking the presence of possible, valid or hidden, data leakage channels. A significant number of signs of information leakage complicates the control process and leads to additional economic costs for the use of control equipment. Therefore, it is necessary to develop a method of synthesis of an information-analytical system for assessing the level of transmission channels protection. It is proposed to develop such a method on the basis of determining the dependence between control signs of the presence of information leakage channels. The proposed method allows to ensure the necessary level of security. The basis of the method for synthesis of the information-analytical system for assessing the level of information transmission channels protection is the equation of the associative connection between the control features. The presence of a connection between control signs indicates the presence of information leakage channels. This is due to the loss of characteristics (for example, voltage or signal strength) of the useful information flow due to the redistribution of data during transmission. The benefit from the application of the obtained results depends on the number of discovered and, accordingly, closed channels of information leakage. Implementation of the proposed method allows to automate the process of finding a data leak in transmission channels. The given research results can be useful in the development of software for expert decision-making systems based on the formation of knowledge bases about the relationship between control features. Implementation of the obtained results will increase the reliability and security of information transmission channels
References
- Yevseiev, S., Hryshchuk, R., Molodetska, K., Nazarkevych, M., Hrytsyk, V., Milov, O. et al.; Yevseiev, S., Hryshchuk, R., Molodetska, K., Nazarkevych, M. (Eds.) (2022). Modeling of security systems for critical infrastructure facilities. Kharkiv: РС ТЕСHNOLOGY СЕNTЕR, 196. https://doi.org/10.15587/978-617-7319-57-2
- Yevseiev, S., Kuznietsov, O., Herasimov, S., Horielyshev, S., Karlov, A., Kovalov, I. et al. (2021). Development of an optimization method for measuring the Doppler frequency of a packet taking into account the fluctuations of the initial phases of its radio pulses. Eastern-European Journal of Enterprise Technologies, 2 (9 (110)), 6–15. https://doi.org/10.15587/1729-4061.2021.229221
- Sokolov, A. Y. (1999). Algebraic approach on fuzzy control. IFAC Proceedings Volumes, 32 (2), 5386–5391. https://doi.org/10.1016/s1474-6670(17)56917-7
- Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O., Korol, O., Milevskyi, S. et al.; Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O. (Eds.) (2021). Synergy of building cybersecurity systems. Kharkiv: РС ТЕСHNOLOGY СЕNTЕR, 188. https://doi.org/10.15587/978-617-7319-31-2
- Shao, R., Ding, C., Liu, L., He, Q., Qu, Y., Yang, J. (2024). High-fidelity multi-channel optical information transmission through scattering media. Optics Express, 32 (2), 2846. https://doi.org/10.1364/oe.514668
- Kumar, P., Saxena, V. (2024). Nested Levels of Hybrid Cryptographical Technique for Secure Information Exchange. Journal of Computer and Communications, 12 (02), 201–210. https://doi.org/10.4236/jcc.2024.122012
- Mikoni, S. V. (2023). Approach to assessing the level of intelligence of an information system. Ontology of Designing, 13 (1), 29–43. https://doi.org/10.18287/2223-9537-2023-13-1-29-43
- Ramsden, J. (2023). The Transmission of Information. Bioinformatics, 75–91. https://doi.org/10.1007/978-3-030-45607-8_7
- Laue, F., Jamali, V., Schober, R. (2023). RIS-Assisted Device Activity Detection With Statistical Channel State Information. IEEE Transactions on Wireless Communications, 22 (12), 9473–9487. https://doi.org/10.1109/twc.2023.3271365
- Vähä-Savo, Lauri, Veggi, L., Vitucci, E. M., Icheln, C., Degli-Esposti, V., Haneda, K. (2023). Analytical Characterization of a Transmission Loss of an Antenna-Embedded Wall. https://doi.org/10.36227/techrxiv.170244520.01558910/v1
- Elzinga, R., Janssen, M. J., Wesseling, J., Negro, S. O., Hekkert, M. P. (2023). Assessing mission-specific innovation systems: Towards an analytical framework. Environmental Innovation and Societal Transitions, 48, 100745. https://doi.org/10.1016/j.eist.2023.100745
- Kramer, G. (2023). Information Rates for Channels with Fading, Side Information and Adaptive Codewords. Entropy, 25 (5), 728. https://doi.org/10.3390/e25050728
- Dos Santos, A., Barros, M. T. C. de, Correia, P. F. (2015). Transmission line protection systems with aided communication channels – Part II: Comparative performance analysis. Electric Power Systems Research, 127, 339–346. https://doi.org/10.1016/j.epsr.2015.05.010
- Enquist, M., Ghirlanda, S., Lind, J. (2023). Acquisition and Transmission of Sequential Information. The Human Evolutionary Transition, 167–176. https://doi.org/10.23943/princeton/9780691240770.003.0012
- Menezes, T. S., Barra, P. H. A., Dizioli, F. A. S., Lacerda, V. A., Fernandes, R. A. S., Coury, D. V. (2023). A Survey on the Application of Phasor Measurement Units to the Protection of Transmission and Smart Distribution Systems. Electric Power Components and Systems, 52 (8), 1379–1396. https://doi.org/10.1080/15325008.2023.2240320
- Ribeiro, E. P. A., Lopes, F. V., Silva, K. M., Martins-Britto, A. G. (2023). Assessment of communication channel effects on time-domain protection functions tripping times. Electric Power Systems Research, 223, 109589. https://doi.org/10.1016/j.epsr.2023.109589
- Shmatko, O., Herasymov, S., Lysetskyi, Y., Yevseiev, S., Sievierinov, О., Voitko, T. et al. (2023). Development of the automated decision-making system synthesis method in the management of information security channels. Eastern-European Journal of Enterprise Technologies, 6 (9 (126)), 39–49. https://doi.org/10.15587/1729-4061.2023.293511
- Herasymov, S., Tkachov, A., Bazarnyi, S. (2024). Complex method of determining the location of social network agents in the interests of information operations. Advanced Information Systems, 8 (1), 31–36. https://doi.org/10.20998/2522-9052.2024.1.04
- Gerasimov, S. V., Slupskiy, P. S., Feklistov, A. A., Chuykov, D. V. (2005). Metod opredeleniya koeffitsientov zavisimosti kontroliruemyh parametrov na osnove atributirovannogo binarnogo dereva. Systemy obrobky informatsiyi, 3 (43), 48–55. Available at: http://nbuv.gov.ua/UJRN/soi_2005_3_9
- Fedushko, S., Molodetska, K., Syerov, Y. (2023). Analytical method to improve the decision-making criteria approach in managing digital social channels. Heliyon, 9 (6), e16828. https://doi.org/10.1016/j.heliyon.2023.e16828
- Mookerjee, R., Samuel, J. (2023). Managing the security of information systems with partially observable vulnerability. Production and Operations Management, 32 (9), 2902–2920. https://doi.org/10.1111/poms.14015
- Marabissi, D., Abrardo, A., Mucchi, L. (2023). A new framework for Physical Layer Security in HetNets based on Radio Resource Allocation and Reinforcement Learning. Mobile Networks and Applications. https://doi.org/10.1007/s11036-023-02149-z
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2024 Olexander Shmatko, Serhii Yevseiev, Valerii Dudykevych, Stanislav Milevskyi, Svetlana Solnyshkova, Alla Havrylova, Yanina Shestak, Serhii Oriekhov, Serhii Korsunov, Serhii Kravchenko
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.
A license agreement is a document in which the author warrants that he/she owns all copyright for the work (manuscript, article, etc.).
The authors, signing the License Agreement with TECHNOLOGY CENTER PC, have all rights to the further use of their work, provided that they link to our edition in which the work was published.
According to the terms of the License Agreement, the Publisher TECHNOLOGY CENTER PC does not take away your copyrights and receives permission from the authors to use and dissemination of the publication through the world's scientific resources (own electronic resources, scientometric databases, repositories, libraries, etc.).
In the absence of a signed License Agreement or in the absence of this agreement of identifiers allowing to identify the identity of the author, the editors have no right to work with the manuscript.
It is important to remember that there is another type of agreement between authors and publishers – when copyright is transferred from the authors to the publisher. In this case, the authors lose ownership of their work and may not use it in any way.