Development of a fuzzy production model for assessing the degree of information security in international cooperation

Authors

DOI:

https://doi.org/10.15587/2706-5448.2024.318446

Keywords:

fuzzy production model, information security, international cooperation, potential risks, influence coefficients, risk categories

Abstract

The object of research is the methods of assessing the information security indicator in the process of international cooperation.

The problem of unification and simplification of the processes of assessing the degree of information security is considered in order to reduce the involvement of human and material resources in them, using the apparatus of fuzzy set theory to take into account the conclusions of competent experts.

A fuzzy production model of assessing the degree of information security is developed, which is based on the use of expert knowledge and fuzzy logic methods. A step-by-step approach is proposed for identifying potential risks, classifying them by categories and calculating influence coefficients. An iterative assessment method is created, which allows obtaining a numerical indicator of the degree of information security. Heuristic rules for determining the effective assessment of the degree of information security are developed, taking into account the criticality factor and influence coefficients of different risk categories.

A classification of potential information security risks in international IT projects is proposed. An example of constructing production rules for a fuzzy knowledge base is demonstrated.

The results are explained by the use of systems analysis to take into account the relationships between different risk categories and the use of fuzzy logic to work with uncertain and incomplete data. The model is based on production rules that integrate expert judgment and allow for adaptive analysis in changing conditions of international cooperation.

The developed model can be used to assess information security in small and medium-sized international projects, where it is necessary to provide a quick and effective assessment of the level of security without involving significant resources. The model is especially useful in conditions where the data is fuzzy or incomplete, and the risks vary depending on the specifics of cooperation between different countries and organizations.

Supporting Agency

  • The study was conducted within the framework of the implementation of the state budget topic DB-921M “Information security protection in the management of international cooperation projects on the basis of ensuring the national security of Ukraine” with the support of the Ministry of Education and Science of Ukraine.

Author Biographies

Oksana Mulesa, University of Presov; Uzhhorod National University

Doctor of Technical Science, Professor

Department of Physics, Mathematics and Technologies

Department of Software System

Yurii Bohdan, Uzhhorod National University

PhD Student

Department of Software System

References

  1. Mulesa, O., Yakob, E., Valko, P., Sviezhentseva, O., Marhitych, D. (2024). Development of decision-making technology for the provision of services in project implementation. Technology Audit and Production Reserves, 2 (2 (76)), 13–17. https://doi.org/10.15587/2706-5448.2024.301317
  2. Mulesa, O., Horvat, P., Radivilova, T., Sabadosh, V., Baranovskyi, O., Duran, S. (2023). Design of mechanisms for ensuring the execution of tasks in project planning. Eastern-European Journal of Enterprise Technologies, 2 (4 (122)), 16–22. https://doi.org/10.15587/1729-4061.2023.277585
  3. Vedadi, A., Warkentin, M., Dennis, A. (2021). Herd behavior in information security decision-making. Information & Management, 58 (8), 103526. https://doi.org/10.1016/j.im.2021.103526
  4. Georg-Schaffner, L., Prinz, E. (2021). Corporate management boards’ information security orientation: an analysis of cybersecurity incidents in DAX 30 companies. Journal of Management and Governance, 26 (4), 1375–1408. https://doi.org/10.1007/s10997-021-09588-4
  5. Banitalebi Dehkordi, A., Soltanaghaei, M., Boroujeni, F. Z. (2020). The DDoS attacks detection through machine learning and statistical methods in SDN. The Journal of Supercomputing, 77 (3), 2383–2415. https://doi.org/10.1007/s11227-020-03323-w
  6. Ashok, K., Gopikrishnan, S. (2023). Statistical Analysis of Remote Health Monitoring Based IoT Security Models & Deployments From a Pragmatic Perspective. IEEE Access, 11, 2621–2651. https://doi.org/10.1109/access.2023.3234632
  7. Radivilova, T., Kirichenko, L., Alghawli, A. S., Ageyev, D., Mulesa, O., Baranovskyi, O. et al.; Oliynykov, R., Kuznetsov, O., Lemeshko, O., Radivilova, T. (Eds.) (2022). Statistical and Signature Analysis Methods of Intrusion Detection. Information Security Technologies in the Decentralized Distributed Networks. Vol. 115. Cham: Springer International Publishing, 115–131. https://doi.org/10.1007/978-3-030-95161-0_5
  8. Viktoriia, H., Hnatienko, H., Babenko, T. (2021). An intelligent model to assess information systems security level. 2021 Fifth World Conference on Smart Trends in Systems Security and Sustainability (WorldS4). London, 128–133. https://doi.org/10.1109/worlds451998.2021.9514019
  9. Ganguli, C., Shandilya, S. K., Izonin, I. (2023). Design and implementation of adaptive network stabilization based on artificial bees colony optimization for nature inspired cyber security. Journal of King Saud University – Science, 35 (5), 102713. https://doi.org/10.1016/j.jksus.2023.102713
  10. Jin, X., Lü, S., Qin, J., Zheng, W. X., Liu, Q. (2023). Adaptive ELM-Based Security Control for a Class of Nonlinear-Interconnected Systems With DoS Attacks. IEEE Transactions on Cybernetics, 53 (8), 5000–5012. https://doi.org/10.1109/tcyb.2023.3257133
  11. Chen, H., Galteland, Y. J., Liang, K.; Guo, J., Steinfeld, R. (Eds.) (2023). CCA-1 Secure Updatable Encryption with Adaptive Security. Advances in Cryptology – ASIACRYPT 2023. Vol. 14442. Singapore: Springer Nature Singapore, 374–406. https://doi.org/10.1007/978-981-99-8733-7_12
  12. Lizunov, P., Biloshchytskyi, A., Kuchansky, A., Andrashko, Y., Biloshchytska, S. (2019). Improvement of the method for scientific publications clustering based on n-gram analysis and fuzzy method for selecting research partners. Eastern-European Journal of Enterprise Technologies, 4 (4 (100)), 6–14. https://doi.org/10.15587/1729-4061.2019.175139
  13. Saatchi, R. (2024). Fuzzy Logic Concepts, Developments and Implementation. Information, 15 (10), 656. https://doi.org/10.3390/info15100656
  14. Kerimkhulle, S., Dildebayeva, Z., Tokhmetov, A., Amirova, A., Tussupov, J., Makhazhanova, U., Adalbek, A., Taberkhan, R., Zakirova, A., Salykbayeva, A. (2023). Fuzzy Logic and Its Application in the Assessment of Information Security Risk of Industrial Internet of Things. Symmetry, 15 (10), 1958. https://doi.org/10.3390/sym15101958
  15. Vaidya, O. S., Kumar, S. (2006). Analytic hierarchy process: An overview of applications. European Journal of Operational Research, 169 (1), 1–29. https://doi.org/10.1016/j.ejor.2004.04.028
  16. Paz, F., Moquillaza, A., Lecaros, A., Falconi, F., Aguirre, J., Ramos, C. (2023). Applying Heuristic Evaluation with Different Evaluator Profiles: A Comparative Study Between Novice and Expert Specialists. Proceedings of the XI Latin American Conference on Human Computer Interaction. Puebla: ACM, 1–7. https://doi.org/10.1145/3630970.3631063
  17. Zhu, Y., Tian, D., Yan, F. (2020). Effectiveness of Entropy Weight Method in Decision-Making. Mathematical Problems in Engineering, 2020, 1–5. https://doi.org/10.1155/2020/3564835
  18. Božanić, D., Pamučar, D., Milić, A., Marinković, D., Komazec, N. (2022). Modification of the Logarithm Methodology of Additive Weights (LMAW) by a Triangular Fuzzy Number and Its Application in Multi-Criteria Decision Making. Axioms, 11 (3), 89. https://doi.org/10.3390/axioms11030089
  19. Balboa, A., Cuesta, A., González-Villa, J., Ortiz, G., Alvear, D. (2024). Logistic regression vs machine learning to predict evacuation decisions in fire alarm situations. Safety Science, 174, 106485. https://doi.org/10.1016/j.ssci.2024.106485
  20. Herrera-Viedma, E., Palomares, I., Li, C.-C., Cabrerizo, F. J., Dong, Y., Chiclana, F., Herrera, F. (2021). Revisiting Fuzzy and Linguistic Decision Making: Scenarios and Challenges for Making Wiser Decisions in a Better Way. IEEE Transactions on Systems, Man, and Cybernetics: Systems, 51 (1), 191–208. https://doi.org/10.1109/tsmc.2020.3043016
Development of a fuzzy production model for assessing the degree of information security in international cooperation

Downloads

Published

2024-12-23

How to Cite

Mulesa, O., & Bohdan, Y. (2024). Development of a fuzzy production model for assessing the degree of information security in international cooperation. Technology Audit and Production Reserves, 6(2(80), 6–10. https://doi.org/10.15587/2706-5448.2024.318446

Issue

Section

Information Technologies