Development of the approach for designing, modelling and research of critical IT infrastructure
DOI:
https://doi.org/10.15587/2312-8372.2017.112495Keywords:
critical IT infrastructure, hybrid extended open automaton, level of model abstractionAbstract
The object of research is a critical IT infrastructure. One of the most problematic places in the study of critical IT infrastructures is the complete lack of approaches, methodology and tools for designing, modeling and researching critical IT infrastructures that could be used in the form in which they are offered.
On the basis of expanded open hybrid automata, an approach is proposed that will allow to compactly describe the components, critical IT infrastructure systems and their interrelations, both internal and external. Its peculiarity is the use of an extended set of parameters, which makes it possible to provide probabilistic and qualitative features to models of components and systems of a critical IT infrastructure.
In the course of the research, the Matlab software package is used, which allows to check the proposed approach and models for workability.
The resulting models are fairly compact and completely reflect the necessary logic of the work of the relevant components and critical IT infrastructure systems. It is shown that this is achieved due to the flexibility of the proposed mathematical apparatus, namely the possibility of creating compositions from simple models for the formation of more complex ones.
In the future, the proposed approach and the creation of a library of models for all major systems and critical IT infrastructure components will provide a convenient tool for a wide range of researchers whose work is related to all aspects of researching critical IT infrastructures.
References
- Pro vnesennia zmin do deiakykh zakoniv Ukrainy shchodo zabezpechennia kibernetychnoi bezpeky Ukrainy. Draft Law No. 11125 from August 31, 2012. Official web portal of the Verkhovna Rada of Ukraine. Available at: http://w1.c1.rada.gov.ua/pls/zweb2/webproc4_1?id=&pf3511=44208
- Rinaldi, S. M., Peerenboom, J. P., Kelly, T. K. (2001). Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Systems Magazine, 21 (6), 11–25. doi:10.1109/37.969131
- Ouyang, M. (2014). Review on modeling and simulation of interdependent critical infrastructure systems. Reliability Engineering & System Safety, 121, 43–60. doi:10.1016/j.ress.2013.06.040
- Satumtira, G., Duenas-Osorio, L. (2010). Synthesis of Modeling and Simulation Methods on Critical Infrastructure Interdependencies Research. Sustainable and Resilient Critical Infrastructure Systems. Berlin, Heidelberg: Springer, 1–51. doi:10.1007/978-3-642-11405-2_1
- Hasan, S., Foliente, G. (2015). Modeling infrastructure system interdependencies and socioeconomic impacts of failure in extreme events: emerging R&D challenges. Natural Hazards, 78 (3), 2143–2168. doi:10.1007/s11069-015-1814-7
- Oliva, G., Panzieri, S., Setola, R. (2011). Fuzzy dynamic input–output inoperability model. International Journal of Critical Infrastructure Protection, 4 (3-4), 165–175. doi:10.1016/j.ijcip.2011.09.003
- Kaegi, M., Mock, R., Kroger, W. (2009). Analyzing maintenance strategies by agent-based simulations: A feasibility study. Reliability Engineering & System Safety, 94 (9), 1416–1421. doi:10.1016/j.ress.2009.02.002
- Rolik, A. I. (2012). Kontseptsiia upravleniia korporativnoi IT-infrastrukturoi. Visnyk NTUU «KPI». Informatics, operation and computer science, 56, 31–55.
- Svendsen, N. K., Wolthusen, S. D. (2007). Graph Models of Critical Infrastructure Interdependencies. Lecture Notes in Computer Science. Berlin, Heidelberg: Springer, 208–211. doi:10.1007/978-3-540-72986-0_27
- Wang, S., Hong, L., Ouyang, M., Zhang, J., Chen, X. (2013). Vulnerability analysis of interdependent infrastructure systems under edge attack strategies. Safety Science, 51 (1), 328–337. doi:10.1016/j.ssci.2012.07.003
- Gursesli, O., Desrochers, A. A. (2003). Modeling infrastructure interdependencies using Petri nets. SMC’03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme – System Security and Assurance (Cat. No.03CH37483). IEEE, 1506–1512. doi:10.1109/icsmc.2003.1244625
- Beccuti, M., Chiaradonna, S., Di Giandomenico, F., Donatelli, S., Dondossola, G., Franceschinis, G. (2012). Quantification of dependencies between electrical and information infrastructures. International Journal of Critical Infrastructure Protection, 5 (1), 14–27. doi:10.1016/j.ijcip.2012.01.003
- Di Giorgio, A., Liberati, F. (2012). A Bayesian Network-Based Approach to the Critical Infrastructure Interdependencies Analysis. IEEE Systems Journal, 6 (3), 510–519. doi:10.1109/jsyst.2012.2190695
- Dorogyy, Ya. Yu. (2016). TS-sumisna arkhitektura krytychnoi IT-infrastruktury. Visnyk NTUU «KPI». Informatics, operation and computer science, 65.
- Lee, J., Bohacek, S., Hespanha, J. P., Obraczka, K. (2007). Modeling Communication Networks With Hybrid Systems. IEEE/ACM Transactions on Networking, 15 (3), 630–643. doi:10.1109/tnet.2007.893090
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2017 Yaroslaw Y Dorogyy
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.