Preview

Modern Science and Innovations

Advanced search

MATHEMATICAL MODEL OF COMPLEX PROTECTION OF AN INFOCOMMUNICATION OBJECT BASED ON "PLAYING WITH NATURE"

https://doi.org/10.37493/2307-910X.2022.1.4

Abstract

Theoretical and methodological approaches to the complex protection of info-communication objects, which are based on game theory, determine the relevance and practical significance of the development of mathematical models of real systems in the format offinite matrix games. The algorithm of formalization of protection processes is proposed, which ensures efficient use of resources when detecting possible incidents of violation of the protection system and/or unauthorized access. The article is devoted to the application of game theory to solving the problem of finding the optimal strategy of behavior and justification of choice in conditions of uncertainty. The essence of the problem investigated by the author is that the choice of a strategy for protecting an infocommunication object must be carried out in conditions of active opposition from a potential attacker. The relevance of the problem under consideration, according to the author, is determined by the fact that in the context of global digitalization, new approaches are needed to ensure the security of objects engaged in data collection, processing, storage and transmission. The article begins with an introduction, which sets out the goals and objectives of the study, gives a general description of the problem of using game theory as a tool that determines the norm of behavior of participants in a conflict situation. In the article, the author highlights the following problems: the expediency of using antagonistic games to solve the problem of ensuring the safety of an object, an argument is given in favor of a single-player game, supported by calculations. The article also touches upon the application of expert assessments and the method of active sociological testing, analysis and control for modeling behavior strategies. In conclusion, the author argues that the game-theoretic approach to modeling complex protection of infocommunication objects expands the capabilities of decision makers and ensures effective decision-making in conditions of uncertainty. The article provides exhaustive coverage of algorithms for choosing the optimal strategy and norms of behavior in a situation with a mismatch of interests. The main value of the work lies in the analysis of the possibilities that game theory provides in modeling complex systems, both in terms of determining private protection strategies and in terms of developing an integrated approach to ensuring the integrity of an infocommunication object. From a practical point of view, the algorithms proposed by the author for calculating possible winnings in the game are of interest. The issues discussed in the article are of interest not only for researchers of information security problems, but also for practitioners in the field of designing information security systems.

About the Author

I. S. Klimenko
Stavropol State Pedagogical Institute
Russian Federation


References

1. Басалова Г.В., Сычугов А.А. Применение методов теории игр для оптимизации выбора средств защиты информации //Известия Тульского государственного университета. Технические науки. 2016. № 11-1. С. 122-129.

2. Воробьев А.А., Сергеев А.Г. Динамическая модель процессов защиты информации от несанкционированного доступа в автоматизированных системах// Наукоемкие технологии в космических исследованиях Земли. 2019. Т. 11. № 4. С. 72-79.

3. Соснин Ю.В., Куликов Г.В., Непомнящих А.В. Комплекс математических моделей оптимизации конфигурации средств защиты информации от несанкционированного доступа//Программные системы и вычислительные методы. 2015. № 1. С. 32-44.

4. Волошин И.П. Построение математической модели конфликта угроз и комплексной системы защиты информации в информационно-коммуникационных сетях// Информационная безопасность регионов. 2017. № 2 (27). С. 5-8.

5. Кудря Р.А., Песоцкий В.О., Киркиж Д.С. Определение оптимальной конфигурации ложных сетевых информационных объектов на основе деревьев решений/ Сборник статей Международной научно-практической конференции «Совершенствование методологии познания в целях развития науки». Волгоград, 2019. С. 74-78.

6. Клименко И.С. Информационная безопасность и защита информации: модели и методы управления. Монография/ Москва: ИНФРА-М, 2020-180 c-DOI-10.12737

7. Воробьев Н.Н. Основы теории игр./ М.: Физматлит, 1984. 496 с.

8. Клименко И.С. Модели и методы управления. Экономическая кибернетика: экономико-математическое моделирование./М.: «КДУ», «Добросвет», 2019.186 с. doi: 10.31453/kdu.ru.91304.0023.

9. Клименко И.С. Комплексная защита объектов информатизации: системный анализ и модели управления./ «КДУ», «Добросвет», 2019.147 с. doi: 10.31453/kdu.ru.91304.0085.

10. Клименко И.С. Исследование операций в комплексной защите инфокоммуникационных объектов// Известия Тульского государственного университета. Технические науки. Выпуск 2. 2021.С.369-375.


Review

For citations:


Klimenko I.S. MATHEMATICAL MODEL OF COMPLEX PROTECTION OF AN INFOCOMMUNICATION OBJECT BASED ON "PLAYING WITH NATURE". Modern Science and Innovations. 2022;(1):34-43. https://doi.org/10.37493/2307-910X.2022.1.4

Views: 165


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2307-910X (Print)