Method for Rational Management of the Cybersecurity and Reliability Radio Technical Systems

Authors

DOI:

https://doi.org/10.20535/RADAP.2020.83.62-68

Keywords:

hardware-software for information security, critical optimization, genetic algorithm, decision making system, Knapsack problems

Abstract

The urgent problem of creating a method for the rational choice of means and subsystems of cyber protection or ensuring the reliability of radio engineering (also, information) systems, optimizing the management of appropriate means in the context of the implementation of anthropogenic or technogenic threats is investigated. The article studies the possibility of using a modified genetic algorithm to solve the problem of rational choice of information security means (ISM) and dynamic configuration management of such means on various security segments of reliable radio engineering systems (RRS), as well as information systems (IS).The scientific novelty of the study is the use in the genetic algorithm as criteria for optimizing the configuration (composition) of the ISM total amount of risks of breach of confidentiality, integrity and availability of information resources, as well as the cost characteristics of the respective ISM. The genetic algorithm in the problem of optimizing the choice of ISM configuration for RRS (IS) and dynamic resource management of the cybersecurity subsystem is considered as a variant of solving the multi-choice problem. In this formulation, the problem of rational placement of ISM at the boundaries (levels) of RRS (IS) protection is considered as a variant of solving the NP-complete combinatorial optimization problem of backpacking (Knapsack problems). The proposed approach provides an opportunity, on the one hand, to perform rapid testing of different sets of ISM and options for their application in ISM, on the other hand, this creates prerequisites for combining the proposed algorithm with existing methods, models and algorithms to optimize the boundaries of RRS (IS) cybersecurity and dynamic management of cybersecurity resources for various objects of information activities. This combination of methods, models and algorithms creates the preconditions for a rapid change in the settings of the RRS (IS) protection subsystem, changing its configuration to take into account new threats and cyberattacks.

Author Biographies

H. M. Hulak, Institute of Mathematical Machines and Systems Problems, National Academy of Sciences of Ukraine

PhD, Associate Professor, head of the Cybersecurity Laboratory

V. А. Lakhno , National University of Life and Environmental Sciences of Ukraine

Doc. of Sci. (Tech), Professor, Head of the Department Computer Systems and Networks

S. A. Adiljanova , Al-Farabi Kazakh National University

Senior Lecturer of department  Information Systems

References

References

Okutan A., Yang S. J., McConky K., Werner G. (2019) CAPTURE: Cyberattack Forecasting Using Non-Stationary Features with Time Lags. IEEE Conference on Communications and Network Security (CNS), pp. 205-213. DOI: 10.1109/CNS.2019.8802639.

Barreto C., Koutsoukos X. (2019) Design of Load Forecast Systems Resilient Against Cyber-Attacks. In: Alpcan T., Vorobeychik Y., Baras J., Dán G. (eds) Decision and Game Theory for Security. GameSec 2019. Lecture Notes in Computer Science, vol 11836. Springer, Cham. DOI: 10.1007/978-3-030-32430-8_1.

Zinov'ev N.V., Kot M.A. (2017) Obzor metodov radioelektronnoi bor'by [Review of electronic warfare methods]. Issledovaniya i razrabotki v perspektivnykh nauchnykh oblastyakh, Sbornik materialov II Mezhdunarodnoi nauchno-prakticheskoi konferentsii. Novosibirsk, OOO ''Tsentr razvitiya nauchnogo sotrudnichestva'', pp. 59-62 [In Russian].

Zatuchnyy D. A. (2018) Methods of preventing unauthorized electronic attacks on navigation system of the aircraft of civil aviation. RELIABILITY & QUALITY OF COMPLEX SYSTEMS, Vol. 1 (21), pp. 21-27. DOI:10.21685/2307-4205-2018-1-3.

Bondaruk A. V., Hlukhov V. S., Yevtushenko K. S., Oliiarnyk B. O. (2008) Harantozdatna intehrovana systema navihatsii rukhomykh nazemnykh obiektiv [Guaranteed integrated navigation system for moving ground objects]. Kompiuterni systemy ta merezhi [Computer systems and networks], Vol. 630, pp. 24-30.

Chandra Y., Mishra P. K. (2019) Design of Cyber Warfare Testbed. In: Hoda M., Chauhan N., Quadri S., Srivastava P. (eds) Software Engineering. Advances in Intelligent Systems and Computing, Vol 731, pp. 249-256. Springer, Singapore. DOI:10.1007/978-981-10-8848-3_24.

Sándor H., Genge B., Szántó Z., Márton L., Haller P. (2019) Cyber attack detection and mitigation: Software Defined Survivable Industrial Control Systems. International Journal of Critical Infrastructure Protection, Vol. 25, pp. 152-168. DOI: 10.1016/j.ijcip.2019.04.002.

Chiba Z., Abghour N., Moussaid K., El Omri A., Rida M. (2019) New Anomaly Network Intrusion Detection System in Cloud Environment Based on Optimized Back Propagation Neural Network Using Improved Genetic Algorithm. International Journal of Communication Networks and Information Security (IJCNIS), Vol. 11, Iss. 1, pp. 61-84.

Nozaki Y., Yoshikawa M. (2019) Security Evaluation of Ring Oscillator PUF Against Genetic Algorithm Based Modeling Attack. In: Barolli L., Xhafa F., Hussain O. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing. IMIS 2019. Advances in Intelligent Systems and Computing, vol 994, pp. 338-347. Springer, Cham. DOI:10.1007/978-3-030-22263-5_33.

Dwivedi S., Vardhan M., Tripathi S. (2020) Incorporating evolutionary computation for securing wireless network against cyberthreats. The Journal of Supercomputing, Vol. 76, pp. 8691–8728. DOI:10.1007/s11227-020-03161-w.

Zhang F., Kodituwakku H. A. D. E., Hines J. W., Coble J. (2019) Multilayer Data-Driven Cyber-Attack Detection System for Industrial Control Systems Based on Network, System, and Process Data. IEEE Transactions on Industrial Informatics, Vol. 15, No. 7, pp. 4362-4369. DOI: 10.1109/TII.2019.2891261.

Sureshkumar T., Anand B., Premkumar T. (2019) Efficient Non-Dominated Multi-Objective Genetic Algorithm (NDMGA) and network security policy enforcement for Policy Space Analysis (PSA). Computer Communications, Vol. 138, pp. 90-97. DOI: 10.1016/j.comcom.2019.03.008.

Shang Q., Chen L., Wang D., Tong R., Peng P. (2020) Evolvable Hardware Design of Digital Circuits Based on Adaptive Genetic Algorithm. In: Abawajy J., Choo KK., Islam R., Xu Z., Atiquzzaman M. (eds) International Conference on Applications and Techniques in Cyber Intelligence ATCI 2019. ATCI 2019. Advances in Intelligent Systems and Computing, vol 1017, pp 791-800. Springer, Cham. DOI:10.1007/978-3-030-25128-4_97.

Yang Y. (2019) Yang Y. (2020) Research on Hybrid Quantum Genetic Algorithm Based on Cross-Docking Delivery Vehicle Scheduling. In: Xu Z., Choo KK., Dehghantanha A., Parizi R., Hammoudeh M. (eds) Cyber Security Intelligence and Analytics. CSIA 2019. Advances in Intelligent Systems and Computing, Vol. 928, pp. 893-900. Springer, Cham. DOI:10.1007/978-3-030-15235-2_119.

Saenko I., Kotenko I. (2019) A role-base approach and a genetic algorithm for VLAN design in large critical infrastructures. Proceedings of the Genetic and Evolutionary Computation Conference Companion, pp. 1643-1650. DOI:10.1145/3319619.3326853.

Aleksieva Y., Valchanov H., Aleksieva V. (2019) An approach for host based botnet detection system. 16th Conference on Electrical Machines, Drives and Power Systems (ELMA), pp. 1-4. DOI: 10.1109/ELMA.2019.8771644.

Vinayakumar R., Alazab M., Soman K. P., Poornachandran P., Al-Nemrat A., Venkatraman S. (2019) Deep Learning Approach for Intelligent Intrusion Detection System. IEEE Access, Vol. 7, pp. 41525-41550. DOI:10.1109/ACCESS.2019.2895334.

Malarvizhi N., Selvarani P., Raj P. (2020) Adaptive fuzzy genetic algorithm for multi biometric authentication. Multimedia Tools and Applications, Vol. 79, pp. 9131–9144. DOI:10.1007/s11042-019-7436-4.

Alhijawi B., Kilani Y., Alsarhan A. (2020) Improv-ing recommendation quality and performance of genetic-based recommender system. International Journal of Advanced Intelligence Paradigms, Vol. 15, Iss. 1, pp. 77-88. DOI:10.1504/IJAIP.2020.104108.

Baroudi U., Bin-Yahya M., Alshammari M., Yaqoub,U. (2019) Ticket-based QoS routing optimization using genetic algorithm for WSN applications in smart grid. Journal of Ambient Intelligence and Humanized Comput-ing, Vol. 10, pp. 1325-1338. DOI: 10.1007/s12652-018-0906-0.

Llansó T., McNeil M., Noteboom C. (2019) Multi-Criteria Selection of Capability-Based Cybersecurity Solutions. Hawaii International Conference on System Sciences, pp. 7322-7330. DOI: 10.24251/HICSS.2019.879.

Kong T., Wang L., Ma D., Xu Z., Yang Q., Chen,K. (2019) A Secure Container Deployment Strategy by Genetic Algorithm to Defend against Co-Resident Attacks in Cloud Computing. IEEE 21st International Conference on High Performance Computing and Communications; IEEE 17th International Conference on Smart City; IEEE 5th International Conference on Data Science and Systems (HPCC/SmartCity/DSS), pp. 1825-1832. DOI: 10.1109/HPCC/SmartCity/DSS.2019.00251.

Lakshmanaprabu S. K., Mohanty S. N., Krishnamoorthy,S., Uthayakumar J., Shankar K. (2019) Online clinical decision support system using optimal deep neural networks. Applied Soft Computing, Vol. 81, pp. 1-10. DOI:10.1016/j.asoc.2019.105487 105487.

Yan D., Liu F., Zhang Y., Jia K., Zhang Y. (2018) Characterizing the Optimal Attack Strategy Decision in Cyber Epidemic Attacks with Limited Resources. In: Liu F., Xu S., Yung M. (eds) Science of Cyber Security. SciSec 2018. Lecture Notes in Computer Science, vol 11287. Springer, Cham. DOI:10.1007/978-3-030-03026-1_5.

Lee Y., Choi T. J., Ahn C. W. (2019) Multi-objective evolutionary approach to select security solutions. CAAI Transactions on Intelligence Technology, Vol. 2, Iss. 2, pp. 64-67. DOI:10.1049/trit.2017.0002.

Akhmetov B., Lakhno V., Akhmetov B., Alimseitova Z. (2018) Development of Sectoral Intellectualized Expert Systems and Decision Making Support Systems in Cybersecurity. In book: Intelligent Systems in Cybernetics and Automation Control Theory, pp.162-171, Springer, Cham. DOI: 10.1007/978-3-030-00184-1_15.

Published

2020-12-30

How to Cite

Гулак, Г. М., Лахно , В. А. . and Адилжанова, С. А. (2020) “Method for Rational Management of the Cybersecurity and Reliability Radio Technical Systems”, Visnyk NTUU KPI Seriia - Radiotekhnika Radioaparatobuduvannia, (83), pp. 62-68. doi: 10.20535/RADAP.2020.83.62-68.

Issue

Section

Information Security