Mathematical models and methods for solving some problems on the information security

Various mathematical models, methods and approaches are used to solve scientific problems in the field of information security of territorially distributed information computer systems (TDICS). The information security modelling toolkit is represented by the following three main directions: developm...

Повний опис

Збережено в:
Бібліографічні деталі
Дата:2023
Автори: Никифоров, О. В., Путятін, В. Г., Куценко, С. А.
Формат: Стаття
Мова:Ukrainian
Опубліковано: Інститут проблем реєстрації інформації НАН України 2023
Теми:
Онлайн доступ:http://drsp.ipri.kiev.ua/article/view/300525
Теги: Додати тег
Немає тегів, Будьте першим, хто поставить тег для цього запису!
Назва журналу:Data Recording, Storage & Processing

Репозитарії

Data Recording, Storage & Processing
id drspiprikievua-article-300525
record_format ojs
spelling drspiprikievua-article-3005252024-08-24T18:20:40Z Mathematical models and methods for solving some problems on the information security Математичні моделі та методи для вирішення деяких питань інформаційної безпеки Никифоров, О. В. Путятін, В. Г. Куценко, С. А. алгоритм, засоби, захист інформації, інформаційна безпека, мережі, методи, моделі, нейромережі, онтологія algorithm, information protection, information security, networks, methods and mo-dels, neural networks, ontology Various mathematical models, methods and approaches are used to solve scientific problems in the field of information security of territorially distributed information computer systems (TDICS). The information security modelling toolkit is represented by the following three main directions: development of methods and models for monitoring the current state of the system and decision-making for operational management of information security; development of methods and models of decision-making support regarding organizational management and design of information security systems; development of methods and models of system self-organization. On the basis of the first group of methods and models (neural networks, data mining methods, matrix method and problem-oriented methods and models), a wide variety of corporate automated systems, commercial software platforms for information security management have been created. At the same time, there is a strong dependence of the software on the features of the object of protection and the subject area in which the information protection processes are modelled and evaluated. The second group of methods (cognitive maps, finite state machines, Markov and Bayesian networks, ontological models, Petri nets, and the matrix method) is presented to a greater extent in the field of systematic research on the development of information protection systems and the justification of requirements for them. The main scientific problem for this group is the problem of justifying the rational decomposition and linearization of problems when conducting research. It significantly depends on the nature of the subject area where research is conducted. The direction of TRIX research that adapts, changes its structure and parameters depending on external conditions and the transformation of the subject area, represented by the methods of conceptual design. On the basis of these methods, it is possible to solve problems of synthesis of structures of objects (systems) with defined properties. Tabl.: 1. Fig.: 10. Refs: 100 titles. Наведено інструментарій моделювання щодо інформаційної безпеки, представлений такими трьома основними напрямками: розроблення методів і моделей контролю поточного стану системи та прийняття рішень з оперативного управління інформаційною безпекою; розроблення методів і моделей підтримки прийняття рішень щодо організаційного управління і проєктування систем інформаційної безпеки; розроблення методів і моделей самоорганізації системи. Інститут проблем реєстрації інформації НАН України 2023-12-19 Article Article application/pdf http://drsp.ipri.kiev.ua/article/view/300525 10.35681/1560-9189.2023.25.2.300525 Data Recording, Storage & Processing; Vol. 25 No. 2 (2023); 27-65 Регистрация, хранение и обработка данных; Том 25 № 2 (2023); 27-65 Реєстрація, зберігання і обробка даних; Том 25 № 2 (2023); 27-65 1560-9189 uk http://drsp.ipri.kiev.ua/article/view/300525/301796 Авторське право (c) 2024 Реєстрація, зберігання і обробка даних
institution Data Recording, Storage & Processing
baseUrl_str
datestamp_date 2024-08-24T18:20:40Z
collection OJS
language Ukrainian
topic algorithm
information protection
information security
networks
methods and mo-dels
neural networks
ontology
spellingShingle algorithm
information protection
information security
networks
methods and mo-dels
neural networks
ontology
Никифоров, О. В.
Путятін, В. Г.
Куценко, С. А.
Mathematical models and methods for solving some problems on the information security
topic_facet алгоритм
засоби
захист інформації
інформаційна безпека
мережі
методи
моделі
нейромережі
онтологія
algorithm
information protection
information security
networks
methods and mo-dels
neural networks
ontology
format Article
author Никифоров, О. В.
Путятін, В. Г.
Куценко, С. А.
author_facet Никифоров, О. В.
Путятін, В. Г.
Куценко, С. А.
author_sort Никифоров, О. В.
title Mathematical models and methods for solving some problems on the information security
title_short Mathematical models and methods for solving some problems on the information security
title_full Mathematical models and methods for solving some problems on the information security
title_fullStr Mathematical models and methods for solving some problems on the information security
title_full_unstemmed Mathematical models and methods for solving some problems on the information security
title_sort mathematical models and methods for solving some problems on the information security
title_alt Математичні моделі та методи для вирішення деяких питань інформаційної безпеки
description Various mathematical models, methods and approaches are used to solve scientific problems in the field of information security of territorially distributed information computer systems (TDICS). The information security modelling toolkit is represented by the following three main directions: development of methods and models for monitoring the current state of the system and decision-making for operational management of information security; development of methods and models of decision-making support regarding organizational management and design of information security systems; development of methods and models of system self-organization. On the basis of the first group of methods and models (neural networks, data mining methods, matrix method and problem-oriented methods and models), a wide variety of corporate automated systems, commercial software platforms for information security management have been created. At the same time, there is a strong dependence of the software on the features of the object of protection and the subject area in which the information protection processes are modelled and evaluated. The second group of methods (cognitive maps, finite state machines, Markov and Bayesian networks, ontological models, Petri nets, and the matrix method) is presented to a greater extent in the field of systematic research on the development of information protection systems and the justification of requirements for them. The main scientific problem for this group is the problem of justifying the rational decomposition and linearization of problems when conducting research. It significantly depends on the nature of the subject area where research is conducted. The direction of TRIX research that adapts, changes its structure and parameters depending on external conditions and the transformation of the subject area, represented by the methods of conceptual design. On the basis of these methods, it is possible to solve problems of synthesis of structures of objects (systems) with defined properties. Tabl.: 1. Fig.: 10. Refs: 100 titles.
publisher Інститут проблем реєстрації інформації НАН України
publishDate 2023
url http://drsp.ipri.kiev.ua/article/view/300525
work_keys_str_mv AT nikiforovov mathematicalmodelsandmethodsforsolvingsomeproblemsontheinformationsecurity
AT putâtínvg mathematicalmodelsandmethodsforsolvingsomeproblemsontheinformationsecurity
AT kucenkosa mathematicalmodelsandmethodsforsolvingsomeproblemsontheinformationsecurity
AT nikiforovov matematičnímodelítametodidlâviríšennâdeâkihpitanʹínformacíjnoíbezpeki
AT putâtínvg matematičnímodelítametodidlâviríšennâdeâkihpitanʹínformacíjnoíbezpeki
AT kucenkosa matematičnímodelítametodidlâviríšennâdeâkihpitanʹínformacíjnoíbezpeki
first_indexed 2025-07-17T10:58:52Z
last_indexed 2025-07-17T10:58:52Z
_version_ 1850411630794375168