Mathematical models and methods for solving some problems on the information security
Various mathematical models, methods and approaches are used to solve scientific problems in the field of information security of territorially distributed information computer systems (TDICS). The information security modelling toolkit is represented by the following three main directions: developm...
Збережено в:
| Дата: | 2023 |
|---|---|
| Автори: | , , |
| Формат: | Стаття |
| Мова: | Ukrainian |
| Опубліковано: |
Інститут проблем реєстрації інформації НАН України
2023
|
| Теми: | |
| Онлайн доступ: | http://drsp.ipri.kiev.ua/article/view/300525 |
| Теги: |
Додати тег
Немає тегів, Будьте першим, хто поставить тег для цього запису!
|
| Назва журналу: | Data Recording, Storage & Processing |
Репозитарії
Data Recording, Storage & Processing| id |
drspiprikievua-article-300525 |
|---|---|
| record_format |
ojs |
| spelling |
drspiprikievua-article-3005252024-08-24T18:20:40Z Mathematical models and methods for solving some problems on the information security Математичні моделі та методи для вирішення деяких питань інформаційної безпеки Никифоров, О. В. Путятін, В. Г. Куценко, С. А. алгоритм, засоби, захист інформації, інформаційна безпека, мережі, методи, моделі, нейромережі, онтологія algorithm, information protection, information security, networks, methods and mo-dels, neural networks, ontology Various mathematical models, methods and approaches are used to solve scientific problems in the field of information security of territorially distributed information computer systems (TDICS). The information security modelling toolkit is represented by the following three main directions: development of methods and models for monitoring the current state of the system and decision-making for operational management of information security; development of methods and models of decision-making support regarding organizational management and design of information security systems; development of methods and models of system self-organization. On the basis of the first group of methods and models (neural networks, data mining methods, matrix method and problem-oriented methods and models), a wide variety of corporate automated systems, commercial software platforms for information security management have been created. At the same time, there is a strong dependence of the software on the features of the object of protection and the subject area in which the information protection processes are modelled and evaluated. The second group of methods (cognitive maps, finite state machines, Markov and Bayesian networks, ontological models, Petri nets, and the matrix method) is presented to a greater extent in the field of systematic research on the development of information protection systems and the justification of requirements for them. The main scientific problem for this group is the problem of justifying the rational decomposition and linearization of problems when conducting research. It significantly depends on the nature of the subject area where research is conducted. The direction of TRIX research that adapts, changes its structure and parameters depending on external conditions and the transformation of the subject area, represented by the methods of conceptual design. On the basis of these methods, it is possible to solve problems of synthesis of structures of objects (systems) with defined properties. Tabl.: 1. Fig.: 10. Refs: 100 titles. Наведено інструментарій моделювання щодо інформаційної безпеки, представлений такими трьома основними напрямками: розроблення методів і моделей контролю поточного стану системи та прийняття рішень з оперативного управління інформаційною безпекою; розроблення методів і моделей підтримки прийняття рішень щодо організаційного управління і проєктування систем інформаційної безпеки; розроблення методів і моделей самоорганізації системи. Інститут проблем реєстрації інформації НАН України 2023-12-19 Article Article application/pdf http://drsp.ipri.kiev.ua/article/view/300525 10.35681/1560-9189.2023.25.2.300525 Data Recording, Storage & Processing; Vol. 25 No. 2 (2023); 27-65 Регистрация, хранение и обработка данных; Том 25 № 2 (2023); 27-65 Реєстрація, зберігання і обробка даних; Том 25 № 2 (2023); 27-65 1560-9189 uk http://drsp.ipri.kiev.ua/article/view/300525/301796 Авторське право (c) 2024 Реєстрація, зберігання і обробка даних |
| institution |
Data Recording, Storage & Processing |
| baseUrl_str |
|
| datestamp_date |
2024-08-24T18:20:40Z |
| collection |
OJS |
| language |
Ukrainian |
| topic |
algorithm information protection information security networks methods and mo-dels neural networks ontology |
| spellingShingle |
algorithm information protection information security networks methods and mo-dels neural networks ontology Никифоров, О. В. Путятін, В. Г. Куценко, С. А. Mathematical models and methods for solving some problems on the information security |
| topic_facet |
алгоритм засоби захист інформації інформаційна безпека мережі методи моделі нейромережі онтологія algorithm information protection information security networks methods and mo-dels neural networks ontology |
| format |
Article |
| author |
Никифоров, О. В. Путятін, В. Г. Куценко, С. А. |
| author_facet |
Никифоров, О. В. Путятін, В. Г. Куценко, С. А. |
| author_sort |
Никифоров, О. В. |
| title |
Mathematical models and methods for solving some problems on the information security |
| title_short |
Mathematical models and methods for solving some problems on the information security |
| title_full |
Mathematical models and methods for solving some problems on the information security |
| title_fullStr |
Mathematical models and methods for solving some problems on the information security |
| title_full_unstemmed |
Mathematical models and methods for solving some problems on the information security |
| title_sort |
mathematical models and methods for solving some problems on the information security |
| title_alt |
Математичні моделі та методи для вирішення деяких питань інформаційної безпеки |
| description |
Various mathematical models, methods and approaches are used to solve scientific problems in the field of information security of territorially distributed information computer systems (TDICS). The information security modelling toolkit is represented by the following three main directions: development of methods and models for monitoring the current state of the system and decision-making for operational management of information security; development of methods and models of decision-making support regarding organizational management and design of information security systems; development of methods and models of system self-organization. On the basis of the first group of methods and models (neural networks, data mining methods, matrix method and problem-oriented methods and models), a wide variety of corporate automated systems, commercial software platforms for information security management have been created. At the same time, there is a strong dependence of the software on the features of the object of protection and the subject area in which the information protection processes are modelled and evaluated. The second group of methods (cognitive maps, finite state machines, Markov and Bayesian networks, ontological models, Petri nets, and the matrix method) is presented to a greater extent in the field of systematic research on the development of information protection systems and the justification of requirements for them. The main scientific problem for this group is the problem of justifying the rational decomposition and linearization of problems when conducting research. It significantly depends on the nature of the subject area where research is conducted. The direction of TRIX research that adapts, changes its structure and parameters depending on external conditions and the transformation of the subject area, represented by the methods of conceptual design. On the basis of these methods, it is possible to solve problems of synthesis of structures of objects (systems) with defined properties. Tabl.: 1. Fig.: 10. Refs: 100 titles. |
| publisher |
Інститут проблем реєстрації інформації НАН України |
| publishDate |
2023 |
| url |
http://drsp.ipri.kiev.ua/article/view/300525 |
| work_keys_str_mv |
AT nikiforovov mathematicalmodelsandmethodsforsolvingsomeproblemsontheinformationsecurity AT putâtínvg mathematicalmodelsandmethodsforsolvingsomeproblemsontheinformationsecurity AT kucenkosa mathematicalmodelsandmethodsforsolvingsomeproblemsontheinformationsecurity AT nikiforovov matematičnímodelítametodidlâviríšennâdeâkihpitanʹínformacíjnoíbezpeki AT putâtínvg matematičnímodelítametodidlâviríšennâdeâkihpitanʹínformacíjnoíbezpeki AT kucenkosa matematičnímodelítametodidlâviríšennâdeâkihpitanʹínformacíjnoíbezpeki |
| first_indexed |
2025-07-17T10:58:52Z |
| last_indexed |
2025-07-17T10:58:52Z |
| _version_ |
1850411630794375168 |