Method for Rational Management of the Cybersecurity and Reliability Radio Technical Systems
Keywords:hardware-software for information security, critical optimization, genetic algorithm, decision making system, Knapsack problems
The urgent problem of creating a method for the rational choice of means and subsystems of cyber protection or ensuring the reliability of radio engineering (also, information) systems, optimizing the management of appropriate means in the context of the implementation of anthropogenic or technogenic threats is investigated. The article studies the possibility of using a modified genetic algorithm to solve the problem of rational choice of information security means (ISM) and dynamic configuration management of such means on various security segments of reliable radio engineering systems (RRS), as well as information systems (IS).The scientific novelty of the study is the use in the genetic algorithm as criteria for optimizing the configuration (composition) of the ISM total amount of risks of breach of confidentiality, integrity and availability of information resources, as well as the cost characteristics of the respective ISM. The genetic algorithm in the problem of optimizing the choice of ISM configuration for RRS (IS) and dynamic resource management of the cybersecurity subsystem is considered as a variant of solving the multi-choice problem. In this formulation, the problem of rational placement of ISM at the boundaries (levels) of RRS (IS) protection is considered as a variant of solving the NP-complete combinatorial optimization problem of backpacking (Knapsack problems). The proposed approach provides an opportunity, on the one hand, to perform rapid testing of different sets of ISM and options for their application in ISM, on the other hand, this creates prerequisites for combining the proposed algorithm with existing methods, models and algorithms to optimize the boundaries of RRS (IS) cybersecurity and dynamic management of cybersecurity resources for various objects of information activities. This combination of methods, models and algorithms creates the preconditions for a rapid change in the settings of the RRS (IS) protection subsystem, changing its configuration to take into account new threats and cyberattacks.
Okutan A., Yang S. J., McConky K., Werner G. (2019) CAPTURE: Cyberattack Forecasting Using Non-Stationary Features with Time Lags. IEEE Conference on Communications and Network Security (CNS), pp. 205-213. DOI: 10.1109/CNS.2019.8802639.
Barreto C., Koutsoukos X. (2019) Design of Load Forecast Systems Resilient Against Cyber-Attacks. In: Alpcan T., Vorobeychik Y., Baras J., Dán G. (eds) Decision and Game Theory for Security. GameSec 2019. Lecture Notes in Computer Science, vol 11836. Springer, Cham. DOI: 10.1007/978-3-030-32430-8_1.
Zinov'ev N.V., Kot M.A. (2017) Obzor metodov radioelektronnoi bor'by [Review of electronic warfare methods]. Issledovaniya i razrabotki v perspektivnykh nauchnykh oblastyakh, Sbornik materialov II Mezhdunarodnoi nauchno-prakticheskoi konferentsii. Novosibirsk, OOO ''Tsentr razvitiya nauchnogo sotrudnichestva'', pp. 59-62 [In Russian].
Zatuchnyy D. A. (2018) Methods of preventing unauthorized electronic attacks on navigation system of the aircraft of civil aviation. RELIABILITY & QUALITY OF COMPLEX SYSTEMS, Vol. 1 (21), pp. 21-27. DOI:10.21685/2307-4205-2018-1-3.
Bondaruk A. V., Hlukhov V. S., Yevtushenko K. S., Oliiarnyk B. O. (2008) Harantozdatna intehrovana systema navihatsii rukhomykh nazemnykh obiektiv [Guaranteed integrated navigation system for moving ground objects]. Kompiuterni systemy ta merezhi [Computer systems and networks], Vol. 630, pp. 24-30.
Chandra Y., Mishra P. K. (2019) Design of Cyber Warfare Testbed. In: Hoda M., Chauhan N., Quadri S., Srivastava P. (eds) Software Engineering. Advances in Intelligent Systems and Computing, Vol 731, pp. 249-256. Springer, Singapore. DOI:10.1007/978-981-10-8848-3_24.
Sándor H., Genge B., Szántó Z., Márton L., Haller P. (2019) Cyber attack detection and mitigation: Software Defined Survivable Industrial Control Systems. International Journal of Critical Infrastructure Protection, Vol. 25, pp. 152-168. DOI: 10.1016/j.ijcip.2019.04.002.
Chiba Z., Abghour N., Moussaid K., El Omri A., Rida M. (2019) New Anomaly Network Intrusion Detection System in Cloud Environment Based on Optimized Back Propagation Neural Network Using Improved Genetic Algorithm. International Journal of Communication Networks and Information Security (IJCNIS), Vol. 11, Iss. 1, pp. 61-84.
Nozaki Y., Yoshikawa M. (2019) Security Evaluation of Ring Oscillator PUF Against Genetic Algorithm Based Modeling Attack. In: Barolli L., Xhafa F., Hussain O. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing. IMIS 2019. Advances in Intelligent Systems and Computing, vol 994, pp. 338-347. Springer, Cham. DOI:10.1007/978-3-030-22263-5_33.
Dwivedi S., Vardhan M., Tripathi S. (2020) Incorporating evolutionary computation for securing wireless network against cyberthreats. The Journal of Supercomputing, Vol. 76, pp. 8691–8728. DOI:10.1007/s11227-020-03161-w.
Zhang F., Kodituwakku H. A. D. E., Hines J. W., Coble J. (2019) Multilayer Data-Driven Cyber-Attack Detection System for Industrial Control Systems Based on Network, System, and Process Data. IEEE Transactions on Industrial Informatics, Vol. 15, No. 7, pp. 4362-4369. DOI: 10.1109/TII.2019.2891261.
Sureshkumar T., Anand B., Premkumar T. (2019) Efficient Non-Dominated Multi-Objective Genetic Algorithm (NDMGA) and network security policy enforcement for Policy Space Analysis (PSA). Computer Communications, Vol. 138, pp. 90-97. DOI: 10.1016/j.comcom.2019.03.008.
Shang Q., Chen L., Wang D., Tong R., Peng P. (2020) Evolvable Hardware Design of Digital Circuits Based on Adaptive Genetic Algorithm. In: Abawajy J., Choo KK., Islam R., Xu Z., Atiquzzaman M. (eds) International Conference on Applications and Techniques in Cyber Intelligence ATCI 2019. ATCI 2019. Advances in Intelligent Systems and Computing, vol 1017, pp 791-800. Springer, Cham. DOI:10.1007/978-3-030-25128-4_97.
Yang Y. (2019) Yang Y. (2020) Research on Hybrid Quantum Genetic Algorithm Based on Cross-Docking Delivery Vehicle Scheduling. In: Xu Z., Choo KK., Dehghantanha A., Parizi R., Hammoudeh M. (eds) Cyber Security Intelligence and Analytics. CSIA 2019. Advances in Intelligent Systems and Computing, Vol. 928, pp. 893-900. Springer, Cham. DOI:10.1007/978-3-030-15235-2_119.
Saenko I., Kotenko I. (2019) A role-base approach and a genetic algorithm for VLAN design in large critical infrastructures. Proceedings of the Genetic and Evolutionary Computation Conference Companion, pp. 1643-1650. DOI:10.1145/3319619.3326853.
Aleksieva Y., Valchanov H., Aleksieva V. (2019) An approach for host based botnet detection system. 16th Conference on Electrical Machines, Drives and Power Systems (ELMA), pp. 1-4. DOI: 10.1109/ELMA.2019.8771644.
Vinayakumar R., Alazab M., Soman K. P., Poornachandran P., Al-Nemrat A., Venkatraman S. (2019) Deep Learning Approach for Intelligent Intrusion Detection System. IEEE Access, Vol. 7, pp. 41525-41550. DOI:10.1109/ACCESS.2019.2895334.
Malarvizhi N., Selvarani P., Raj P. (2020) Adaptive fuzzy genetic algorithm for multi biometric authentication. Multimedia Tools and Applications, Vol. 79, pp. 9131–9144. DOI:10.1007/s11042-019-7436-4.
Alhijawi B., Kilani Y., Alsarhan A. (2020) Improv-ing recommendation quality and performance of genetic-based recommender system. International Journal of Advanced Intelligence Paradigms, Vol. 15, Iss. 1, pp. 77-88. DOI:10.1504/IJAIP.2020.104108.
Baroudi U., Bin-Yahya M., Alshammari M., Yaqoub,U. (2019) Ticket-based QoS routing optimization using genetic algorithm for WSN applications in smart grid. Journal of Ambient Intelligence and Humanized Comput-ing, Vol. 10, pp. 1325-1338. DOI: 10.1007/s12652-018-0906-0.
Llansó T., McNeil M., Noteboom C. (2019) Multi-Criteria Selection of Capability-Based Cybersecurity Solutions. Hawaii International Conference on System Sciences, pp. 7322-7330. DOI: 10.24251/HICSS.2019.879.
Kong T., Wang L., Ma D., Xu Z., Yang Q., Chen,K. (2019) A Secure Container Deployment Strategy by Genetic Algorithm to Defend against Co-Resident Attacks in Cloud Computing. IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), pp. 1825-1832. DOI: 10.1109/HPCC/SmartCity/DSS.2019.00251.
Lakshmanaprabu S. K., Mohanty S. N., Krishnamoorthy,S., Uthayakumar J., Shankar K. (2019) Online clinical decision support system using optimal deep neural networks. Applied Soft Computing, Vol. 81, pp. 1-10. DOI:10.1016/j.asoc.2019.105487 105487.
Yan D., Liu F., Zhang Y., Jia K., Zhang Y. (2018) Characterizing the Optimal Attack Strategy Decision in Cyber Epidemic Attacks with Limited Resources. In: Liu F., Xu S., Yung M. (eds) Science of Cyber Security. SciSec 2018. Lecture Notes in Computer Science, vol 11287. Springer, Cham. DOI:10.1007/978-3-030-03026-1_5.
Lee Y., Choi T. J., Ahn C. W. (2019) Multi-objective evolutionary approach to select security solutions. CAAI Transactions on Intelligence Technology, Vol. 2, Iss. 2, pp. 64-67. DOI:10.1049/trit.2017.0002.
Akhmetov B., Lakhno V., Akhmetov B., Alimseitova Z. (2018) Development of Sectoral Intellectualized Expert Systems and Decision Making Support Systems in Cybersecurity. In book: Intelligent Systems in Cybernetics and Automation Control Theory, pp.162-171, Springer, Cham. DOI: 10.1007/978-3-030-00184-1_15.
How to Cite
Copyright (c) 2020 Геннадій Гулак
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).