Development of a concept for building a critical infrastructure facilities security system
Serhii Yevseiev,Yevgen Melenti,Oleksandr Voitko,Vitalii Hrebeniuk,Anna Korchenko,Serhii Mykus,Oleksandr Milov,Oleksandr Prokopenko,Оleksand Sievierinov,Dmytro Chopenko +9 more
Reads0
Chats0
TLDR
In this article, the concept of building security systems based on a variety of models describing various CIF functioning aspects is presented, which can be used for all CIFs, which makes it possible to unify preventive measures and increase the security level.Abstract:
To effectively protect critical infrastructure facilities (CIF), it is important to understand the focus of cybersecurity efforts. The concept of building security systems based on a variety of models describing various CIF functioning aspects is presented.
The development of the concept is presented as a sequence of solving the following tasks. The basic concepts related to cyberattacks on CIF were determined, which make it possible to outline the boundaries of the problem and determine the level of formalization of the modeling processes. The proposed threat model takes into account possible synergistic/emergent features of the integration of modern target threats and their hybridity. A unified threat base that does not depend on CIF was formed. The concept of modeling the CIF security system was developed based on models of various classes and levels. A method to determine attacker's capabilities was developed. A concept for assessing the CIF security was developed, which allows forming a unified threat base, assessing the signs of their synergy and hybridity, identifying critical CIF points, determining compliance with regulatory requirements and the state of the security system. The mathematical tool and a variety of basic models of the concept can be used for all CIFs, which makes it possible to unify preventive measures and increase the security level. It is proposed to use post-quantum cryptography algorithms on crypto-code structures to provide security services. The proposed mechanisms provide the required stability (230–235 group operations), the rate of cryptographic transformation is comparable to block-symmetric ciphers (BSC) and reliability (Perr 10–9–10–12)read more
Citations
More filters
Journal ArticleDOI
Devising a method for segmenting complex structured images acquired from space observation systems based on the particle swarm algorithm
Hennadii Khudov,Oleksandr Makoveichuk,Irina Khizhnyak,Oleksandr Oleksenko,Yuriy Khazhanets,Yuriy Solomonenko,Iryna Yuzova,Yevhen Dudar,Stanislav Stetsiv,Vladyslav Khudov +9 more
TL;DR: The improved segmentation method based on the particle swarm algorithm makes it possible to segment complex structured images acquired from space surveillance systems and reduces segmentation errors of the first kind by an average of 12 % and that of the second kind by 8 %.
Journal ArticleDOI
Development of crypto-code constructs based on LDPC codes
Serhii Pohasii,Serhii Yevseiev,O. S. Zhuchenko,Oleksandr Milov,Volodymyr Lysechko,Oleksandr Kovalenko,Maryna Kostiak,Andrii Volkov,Aleksandr Lezik,Vitalii Susukailo +9 more
TL;DR: The results of developing post-quantum algorithms of McEliece and Niederreiter crypto-code constructs based on LDPC (Low-Density Parity-Check) codes are presented, which provide the required level of security services in a full-scale quantum computer.
Journal ArticleDOI
Development of a concept for cybersecurity metrics classification
Serhii Yevseiev,Oleksandr Milov,Ivan Opirskyy,Olha Dunaievska,Oleksandr Huk,Volodymyr Pogorelov,Kyrylo Bondarenko,Nataliia Zviertseva,Ye. Melenti,Bogdan Tomashevsky +9 more
TL;DR: The paper explores the possibility of defining a basic formal model (classifier) for analyzing security metrics, which takes into account not only the level of secrecy of information resources, thelevel of provision of security services, but also allows, based on the requirements put forward, forming the necessary set of security assessment metrics.
Proceedings ArticleDOI
Socio-Cyber-Physical Systems Security Concept
Serhii Yevseiev,Stanislav Milevskyi,L. N. Bortnik,V Monastyrsky Alexey,Kyrylo Bondarenko,Serhii Pohasii +5 more
TL;DR: The socio-cyber-physical systems security concept is proposed, which takes into account the Integration of technologies, security systems of individual components of a smart city and the integration of cyber threats into security components.
Development of security mechanisms for scada systems in the postquantium period
TL;DR: In this article , the authors proposed a post-quantum encryption algorithm for SCADA systems, which is the combination of algorithms (schemes) of crypto-code structures with cryptosystems on unprofitable codes, as well as the possibility of combining them with digital steganog-raphy methods.
References
More filters
Journal ArticleDOI
Emergence of Scaling in Random Networks
TL;DR: A model based on these two ingredients reproduces the observed stationary scale-free distributions, which indicates that the development of large networks is governed by robust self-organizing phenomena that go beyond the particulars of the individual systems.
Journal ArticleDOI
Statistical mechanics of complex networks
TL;DR: In this paper, a simple model based on the power-law degree distribution of real networks was proposed, which was able to reproduce the power law degree distribution in real networks and to capture the evolution of networks, not just their static topology.
Journal ArticleDOI
The Structure and Function of Complex Networks
TL;DR: Developments in this field are reviewed, including such concepts as the small-world effect, degree distributions, clustering, network correlations, random graph models, models of network growth and preferential attachment, and dynamical processes taking place on networks.
Journal ArticleDOI
Error and attack tolerance of complex networks
TL;DR: It is found that scale-free networks, which include the World-Wide Web, the Internet, social networks and cells, display an unexpected degree of robustness, the ability of their nodes to communicate being unaffected even by unrealistically high failure rates.
Book
A Course in Game Theory
TL;DR: A Course in Game Theory as discussed by the authors presents the main ideas of game theory at a level suitable for graduate students and advanced undergraduates, emphasizing the theory's foundations and interpretations of its basic concepts.