Modeling Conflicts Resulting from Sharing Telecommunication Resource between Antagonistic Control Systems
Abstract Today state-of-the-art communication systems, whilst being limited in resources, use a shared information and telecommunication network to provide integrated communication services; the resources of such a network are split between various control systems, some of which may conflict, resulting in a variety of malware attacks. This paper dwells upon a method for modeling conflicts resulting from sharing a telecommunication resource between antagonistic control systems; the method takes into account the use of such a shared resource (ITCN) and the following processes: data processing by cyber threat intelligence systems, and making decisions on executing MAs upon the elements of conflicting control systems; for each moment of simulation time, the method calculates the current potential of each conflicting system in order to find the average potential degradation time.