Development of the automated decision-making system synthesis method in the management of information security channels
DOI:
https://doi.org/10.15587/1729-4061.2023.293511Keywords:
information channel, information protection, logical-linguistic model, production rules, information leakageAbstract
In the process of transmission channels functioning, the results of the work of bodies for detecting and blocking information leakage channels are not sufficiently taken into account. Management of information protection channels is actually the collection and display of data followed by the assignment of influence on each information channel separately and is carried out in manual mode. In decision support systems, the tasks of identifying information leakage channels are not solved. There is a contradiction between the requirements for the automation of the management of information protection channels and the possibility of meeting these requirements at the expense of the available automation tools. Classical theory considers the decision-making process as a choice of one of many alternatives. The development of rational forms and methods of managing information protection channels should prevent threats and challenges. Therefore, the object of research is the process of ensuring security during data transmission through information channels. The main threats and challenges are man-made and natural cataclysms, terrorism, aggression by a number of states or individual groups of people, which are not taken into account in the complex in the decision-making system during the management of information protection channels. A structural diagram of information exchange based on the description of a weakly formalized process under conditions of non-stochastic uncertainty is proposed. It is proposed to use the logical-linguistic production model. For a hierarchically organized structure based on classification features, it is proposed to build a hierarchy tree that takes into account the relationships of partially ordered sets. The formed production rules for determining appropriate strategies for the planned detection of information leakage channels based on predicted values allow to proceed to knowledge processing for the synthesis of an automated decision-making system during the management of protection channels
References
- Petrunia, Yu. Ye., Litovchenko, B. V., Pasichnyk, T. O. et al.; Petrunia, Yu. Ye. (Ed.) (2020). Pryiniattia upravlinskykh rishen. Dnipro: Universytet mytnoi spravy ta finansiv, 276. Available at: http://biblio.umsf.dp.ua/jspui/bitstream/123456789/4070/1/Прийняття%20упр%20рішень%202020.pdf
- Yevseiev, S., Hryshchuk, R., Molodetska, K., Nazarkevych, M., Hrytsyk, V., Milov, O. et al.; Yevseiev, S., Hryshchuk, R., Molodetska, K., Nazarkevych, M. (Eds.) (2022). Modeling of security systems for critical infrastructure facilities. Kharkiv: РС ТЕСHNOLOGY СЕNTЕR, 196. doi: https://doi.org/10.15587/978-617-7319-57-2
- Butko, M. P., Butko, I. M., Mashchenko, V. P. et al.; Butko, M. P. (Ed.) (2015). Teoriya pryiniattia rishen. Kyiv: «Tsentr uchbovoi literatury», 360. Available at: https://duikt.edu.ua/uploads/l_101_88535923.pdf
- Sokolov, A. Y. (1999). Algebraic approach on fuzzy control. IFAC Proceedings Volumes, 32 (2), 5386–5391. doi: https://doi.org/10.1016/s1474-6670(17)56917-7
- Yevseiev, S., Herasymov, S., Kuznietsov, O., Opirskyy, I., Volkov, A., Peleshok, Y. et al. (2023). Method of assessment of frequency resolution for aircraft. Eastern-European Journal of Enterprise Technologies, 2 (9 (122)), 34–45. doi: https://doi.org/10.15587/1729-4061.2023.277898
- Bidiuk, P. I., Tymoshchuk, O. L., Kovalenko, A. Ye., Korshevniuk, L. O. (2022). Systemy i metody pidtrymky pryiniattia rishen. Kyiv: KPI, 610. Available at: https://ela.kpi.ua/bitstream/123456789/48418/1/Systemy_i_metody_pidtrymky_pryiniattia_rishen.pdf
- Yevseiev, S., Kuznietsov, O., Herasimov, S., Horielyshev, S., Karlov, A., Kovalov, I. et al. (2021). Development of an optimization method for measuring the Doppler frequency of a packet taking into account the fluctuations of the initial phases of its radio pulses. Eastern-European Journal of Enterprise Technologies, 2 (9 (110)), 6–15. doi: https://doi.org/10.15587/1729-4061.2021.229221
- Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O., Korol, O., Milevskyi, S. et al.; Yevseiev, S., Ponomarenko, V., Laptiev, O., Milov, O. (Eds.) (2021). Synergy of building cybersecurity systems. Kharkiv: РС ТЕСHNOLOGY СЕNTЕR, 188. doi: https://doi.org/10.15587/978-617-7319-31-2
- Komeylian, S., Paolini, C., Sarkar, M. (2023). Beamforming Technique for Improving Physical Layer Security in an MIMO-OFDM Wireless Channel. Advances in Distributed Computing and Machine Learning, 127–134. doi: https://doi.org/10.1007/978-981-99-1203-2_11
- Li, Z., Lin, Q., Wu, Y.-C., Ng, D. W. K., Nallanathan, A. (2023). Enhancing Physical Layer Security with RIS under Multi-Antenna Eavesdroppers and Spatially Correlated Channel Uncertainties. IEEE Transactions on Communications, 1–1. doi: https://doi.org/10.1109/tcomm.2023.3333919
- Qu, K., Wang, Z., Li, Z., Li, Z. (2023). Vectorial‐Manipulating Encryption for Multi‐Channel Capacity and Security Enhancement. Laser & Photonics Reviews, 17 (10). doi: https://doi.org/10.1002/lpor.202300105
- Mizuno, T., Nishikawa, H., Kong, X., Tomiyama, H. (2023). Empirical analysis of power side-channel leakage of high-level synthesis designed AES circuits. International Journal of Reconfigurable and Embedded Systems (IJRES), 12 (3), 305. doi: https://doi.org/10.11591/ijres.v12.i3.pp305-319
- Qiu, X., Yu, J., Zhuang, W., Li, G., Sun, X. (2023). Channel Prediction-Based Security Authentication for Artificial Intelligence of Things. Sensors, 23 (15), 6711. doi: https://doi.org/10.3390/s23156711
- Culbreth, S., Graham, S. (2023). Demonstrating Redundancy Advantages of a Three-Channel Communication Protocol. International Conference on Cyber Warfare and Security, 18 (1), 513–522. doi: https://doi.org/10.34190/iccws.18.1.964
- Marabissi, D., Abrardo, A., Mucchi, L. (2023). A new framework for Physical Layer Security in HetNets based on Radio Resource Allocation and Reinforcement Learning. Mobile Networks and Applications. doi: https://doi.org/10.1007/s11036-023-02149-z
- Masure, L., Cassiers, G., Hendrickx, J., Standaert, F.-X. (2023). Information Bounds and Convergence Rates for Side-Channel Security Evaluators. IACR Transactions on Cryptographic Hardware and Embedded Systems, 522–569. doi: https://doi.org/10.46586/tches.v2023.i3.522-569
- Masure, L., Standaert, F.-X. (2023). Prouff and Rivain’s Formal Security Proof of Masking, Revisited. Lecture Notes in Computer Science, 343–376. doi: https://doi.org/10.1007/978-3-031-38548-3_12
- Díaz, Á., Kaschel, H. (2023). Scalable Electronic Health Record Management System Using a Dual-Channel Blockchain Hyperledger Fabric. Systems, 11 (7), 346. doi: https://doi.org/10.3390/systems11070346
- Wichelmann, J., Peredy, C., Sieck, F., Pätschke, A., Eisenbarth, T. (2023). MAMBO–V: Dynamic Side-Channel Leakage Analysis on RISC–V. Lecture Notes in Computer Science, 3–23. doi: https://doi.org/10.1007/978-3-031-35504-2_1
- Fedushko, S., Molodetska, K., Syerov, Y. (2023). Analytical method to improve the decision-making criteria approach in managing digital social channels. Heliyon, 9 (6), e16828. doi: https://doi.org/10.1016/j.heliyon.2023.e16828
- Mookerjee, R., Samuel, J. (2023). Managing the security of information systems with partially observable vulnerability. Production and Operations Management, 32 (9), 2902–2920. doi: https://doi.org/10.1111/poms.14015
- Grant, D. G., Behrends, J., Basl, J. (2023). What we owe to decision-subjects: beyond transparency and explanation in automated decision-making. Philosophical Studies. doi: https://doi.org/10.1007/s11098-023-02013-6
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Olexander Shmatko, Serhii Herasymov, Yurii Lysetskyi, Serhii Yevseiev, Оleksandr Sievierinov, Tetiana Voitko, Andrii Zakharzhevskyi, Helen Makogon, Alexander Nesterov, Kyrylo Bondarenko
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.
A license agreement is a document in which the author warrants that he/she owns all copyright for the work (manuscript, article, etc.).
The authors, signing the License Agreement with TECHNOLOGY CENTER PC, have all rights to the further use of their work, provided that they link to our edition in which the work was published.
According to the terms of the License Agreement, the Publisher TECHNOLOGY CENTER PC does not take away your copyrights and receives permission from the authors to use and dissemination of the publication through the world's scientific resources (own electronic resources, scientometric databases, repositories, libraries, etc.).
In the absence of a signed License Agreement or in the absence of this agreement of identifiers allowing to identify the identity of the author, the editors have no right to work with the manuscript.
It is important to remember that there is another type of agreement between authors and publishers – when copyright is transferred from the authors to the publisher. In this case, the authors lose ownership of their work and may not use it in any way.