Optimal choice of information security in automated systems via Markov cyber-attack models

One of the main problems to provisioning the information security of automated systems is the absence of unify approaches to the quantitative evaluation of their efficiency and reliability. In this article, we consider one of the approaches to this problem, which is based on the use of cyber-attack...

Full description

Bibliographic Details
Main Author: Evgeny V. Trapeznikov
Format: Article
Language:English
Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 2023-12-01
Series:Безопасность информационных технологий
Subjects:
Online Access:https://bit.spels.ru/index.php/bit/article/view/1548
_version_ 1797403194718945280
author Evgeny V. Trapeznikov
author_facet Evgeny V. Trapeznikov
author_sort Evgeny V. Trapeznikov
collection DOAJ
description One of the main problems to provisioning the information security of automated systems is the absence of unify approaches to the quantitative evaluation of their efficiency and reliability. In this article, we consider one of the approaches to this problem, which is based on the use of cyber-attack models described in terms of Markov chains with absorbing states. In particular, we describe one of these models in detail, in which, in contrast to the similar models of other authors, the different duration of attacks is provided. Moreover, we also have provided for this model the different absorbing states that are associated with the successful implementations for every of cyber-attacks. These features allow us to introduce two security metrics, which can be use for evaluating efficiency of the security remedies applied: the mean time to security failure and the mean risk of the attack implementation. Using these metrics, we formulate, in this article, a few optimization problems, which are of interest in the development and design of the secured automated systems. It has shown that these problems belong to the class of non-linear integer programming problems, and therefore we also suggest an efficient algorithm of their solving based on the concept of sequent analysis of variants. A program has been developed for studying Markov security models taking into account the duration of a computer attack and an example of solving one is given optimization problems whose solution is some optimal set of security remedies. This solution minimizes the cost and expenses sent on the security remedies at some constraints on the mean time to security failure.
first_indexed 2024-03-09T02:35:00Z
format Article
id doaj.art-f45255a189414a7ba58f15af31ff5afd
institution Directory Open Access Journal
issn 2074-7128
2074-7136
language English
last_indexed 2024-03-09T02:35:00Z
publishDate 2023-12-01
publisher Joint Stock Company "Experimental Scientific and Production Association SPELS
record_format Article
series Безопасность информационных технологий
spelling doaj.art-f45255a189414a7ba58f15af31ff5afd2023-12-06T11:40:39ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362023-12-0130410211310.26583/bit.2023.4.061343Optimal choice of information security in automated systems via Markov cyber-attack modelsEvgeny V. Trapeznikov0Omsk state technical universityOne of the main problems to provisioning the information security of automated systems is the absence of unify approaches to the quantitative evaluation of their efficiency and reliability. In this article, we consider one of the approaches to this problem, which is based on the use of cyber-attack models described in terms of Markov chains with absorbing states. In particular, we describe one of these models in detail, in which, in contrast to the similar models of other authors, the different duration of attacks is provided. Moreover, we also have provided for this model the different absorbing states that are associated with the successful implementations for every of cyber-attacks. These features allow us to introduce two security metrics, which can be use for evaluating efficiency of the security remedies applied: the mean time to security failure and the mean risk of the attack implementation. Using these metrics, we formulate, in this article, a few optimization problems, which are of interest in the development and design of the secured automated systems. It has shown that these problems belong to the class of non-linear integer programming problems, and therefore we also suggest an efficient algorithm of their solving based on the concept of sequent analysis of variants. A program has been developed for studying Markov security models taking into account the duration of a computer attack and an example of solving one is given optimization problems whose solution is some optimal set of security remedies. This solution minimizes the cost and expenses sent on the security remedies at some constraints on the mean time to security failure.https://bit.spels.ru/index.php/bit/article/view/1548markov model, cyber-attack, security metrics, protection optimization, automated system, method of sequential analysis of variants.
spellingShingle Evgeny V. Trapeznikov
Optimal choice of information security in automated systems via Markov cyber-attack models
Безопасность информационных технологий
markov model, cyber-attack, security metrics, protection optimization, automated system, method of sequential analysis of variants.
title Optimal choice of information security in automated systems via Markov cyber-attack models
title_full Optimal choice of information security in automated systems via Markov cyber-attack models
title_fullStr Optimal choice of information security in automated systems via Markov cyber-attack models
title_full_unstemmed Optimal choice of information security in automated systems via Markov cyber-attack models
title_short Optimal choice of information security in automated systems via Markov cyber-attack models
title_sort optimal choice of information security in automated systems via markov cyber attack models
topic markov model, cyber-attack, security metrics, protection optimization, automated system, method of sequential analysis of variants.
url https://bit.spels.ru/index.php/bit/article/view/1548
work_keys_str_mv AT evgenyvtrapeznikov optimalchoiceofinformationsecurityinautomatedsystemsviamarkovcyberattackmodels