scholarly journals A stochastic model of the security system's functional behavior for a critical infrastructure object

2021 ◽  
Vol 5 (1) ◽  
pp. 18-33
Author(s):  
Yurii Salnyk ◽  
Bohdan Volochiy

Context. Objects of critical infrastructure require adequate security. The security systems for such objects have a specific requirements. Fulfilment of part of these requirements can provide by an unattended ground sensor complex which uses seismic sensors. The second part of the requirements can be performed by an unmanned aircraft complex. Therefore, it is seen as practical feasibility to combine these two complexes in one security system with three control zones. The first (Further) and second (Hither) control zones are served by an unattended ground sensor complex. The third control zone (intruder escort zone) is assigned on the data from the unattended ground sensor complex: the type of intruder, his speed and direction of movement. The unmanned aircraft complex is used to perform a security system task in the intruder's tracking area on command from the unattended ground sensor complex. You need to know two question answers to implement such a security system. First, what is the efficiency indicator value of the security system will ensure the combination of the existing complexes with their functionality indicators. And the second, what should be the functionality indicators requirements of these complexes in order for the security system to provide the required performance indicator value. Objective. Therefore, the goal of the article is to show the potential value of the efficiency index of the security system formed from the existing complexes, as well as to assess the possibility of increasing its efficiency. Methods. This goal is achieved by the stochastic model of functional behavior, which should reproduce all variants of the security system components reaction to the crossing of three control zones by intruders. Results. The main result is a discrete-continuous stochastic model of the functional behavior of the critical infrastructure object security system in the form of 76 Kolmogorov-Chapman differential equations system. The grade of the stochastic model adequacy makes it possible, in addition to the analysis tasks of the security system effectiveness, to solve the synthesis tasks of functionality indicators of the complex components that are integrated into the security system. Conclusions. Research was conducted have shown that it is impractical to create a security system based on existing unattended ground sensor complexes and unmanned aircraft systems for critical infrastructure objects because of the unacceptably low system efficiency. Based on the synthesis task solution, the functionality indicators values of the each complex components, in particular those that will provide the required value of the security system efficiency indicator, are presented. The stochastic model of the functional behavior of the security system can be used in the information technology of its design to find compromise solutions between different variants of composition, structure and functional behavior of the security system.

Author(s):  
Volodymyr Hrabchak ◽  
Yuriy Salnyk ◽  
Bohdan Volochiy

In article presented theoretic generalization practical efficiency issues training and deployment of troops (armed forces) by improving the analysis system, generalization and implementation of combat experience (ASGIE) and an actual scientific problem was solved in a new way, consisting in the improvement of the scientific and methodological apparatus of its functioning. Performed analysis mathematical models for descriptions and assessment functioning system of training and use of troops (armed forces). In the same time, the results of researches in exercises and other activities of operational, combat training and daily activities of troops (armed forces) showed the absence of effective mathematical models for the functioning of ASGIE of troops (armed forces). The constituents for each of the three performance indicators have been substantiated and determined, which reproduce the corresponding reactions of the ASGIE to obtain a generalized experience. The connection of these constituents with the requirements for the mathematical model of the reaction of the ASGIE is shown. A discrete-continuous stochastic model of the ASGIE reaction has been developed to study the effectiveness of a promising ASGIE for various options for its implementation. A system of Kolmogorov-Chapman differential equations of the first order has been formed, the solution of which gives the opportunity to get the value of performance indicators ASGIE. Calculations performed for ASGI which includes the governing bodies of three military units and three OC with decision-making on the generalization of experience for the majority principle "2 with 3" show: acceptable values of the performance indicator "Experience is generalized" are achieved when the values of the probability of identifying experience and the probability of successful generalization of experience by the management body are greater than 0.9; with the values of the probability of experience identification and the probability of successful generalization of experience by the governing bodies in the range from 0.4 to 0.7 with a probability of not less than 0.7, it will be necessary to continue to accumulate generalized experience in order to make a decision on its dissemination; accordingly, a value in the range from 0.2 to 0.6 is unacceptable for organizing the process of generalizing experience for the developed ASGI.


2021 ◽  
Vol 3 (9(111)) ◽  
pp. 63-83
Author(s):  
Serhii Yevseiev ◽  
Yevgen Melenti ◽  
Oleksandr Voitko ◽  
Vitalii Hrebeniuk ◽  
Anna Korchenko ◽  
...  

To effectively protect critical infrastructure facilities (CIF), it is important to understand the focus of cybersecurity efforts. The concept of building security systems based on a variety of models describing various CIF functioning aspects is presented. The development of the concept is presented as a sequence of solving the following tasks. The basic concepts related to cyberattacks on CIF were determined, which make it possible to outline the boundaries of the problem and determine the level of formalization of the modeling processes. The proposed threat model takes into account possible synergistic/emergent features of the integration of modern target threats and their hybridity. A unified threat base that does not depend on CIF was formed. The concept of modeling the CIF security system was developed based on models of various classes and levels. A method to determine attacker's capabilities was developed. A concept for assessing the CIF security was developed, which allows forming a unified threat base, assessing the signs of their synergy and hybridity, identifying critical CIF points, determining compliance with regulatory requirements and the state of the security system. The mathematical tool and a variety of basic models of the concept can be used for all CIFs, which makes it possible to unify preventive measures and increase the security level. It is proposed to use post-quantum cryptography algorithms on crypto-code structures to provide security services. The proposed mechanisms provide the required stability (230–235 group operations), the rate of cryptographic transformation is comparable to block-symmetric ciphers (BSC) and reliability (Perr 10–9–10–12)


2021 ◽  
Vol 0 (0) ◽  
Author(s):  
Xiangwei Qi ◽  
Haifang Li ◽  
Bingcai Chen ◽  
Gulila Altenbek

Abstract With ever increasing complexity and intelligence of the modern cities, protecting key public facilities and important targets from any damage is a major challenge for the security sector. In all types of anti-terrorism prediction models, the prediction of attack behaviour is indispensable. Therefore, the attack behaviour model plays an important role in the anti-terrorism security system. This paper builds the attacker’s behaviour model, and carries out the prediction about the possible attack behaviour by the attacker model based on random strategy. According to the attack strategies, analysis and construction of the attack tree and attack graph are carried out based on the state-based stochastic model. The paper describes the security system in detail taking use of the state-based stochastic model method, so as to clarify the state distribution and the transfer relationship between the states of various security resources after threatened by attacks. At the same time, this paper applies the state-based stochastic model to establish the attacker model through the impact of attack on the security system.


2020 ◽  
Vol 18 (2) ◽  
pp. 166-179 ◽  
Author(s):  
Svitlana Fedulova ◽  
Oleksandr Pivovarov ◽  
Veronika Khudolei ◽  
Vitalina Komirna ◽  
Andrii Kalynovskyi

The correlation between the development of a regional economy and the degree of infrastructural development of a country or its territory is a common practice. Considering this, the paper is aimed at studying the impact of water infrastructure on the economic security of regional socio-economic systems in order to develop a water security system for them. A variety of threats against key waterworks can seriously undermine the national economy and water security of regions and cities. Thus, the study analyzes the process of transformation of water infrastructure in the context of ensuring the economic security of regional socio-economic systems. It offers the definition of such categories as “water infrastructure” and “water security of a regional socio-economic system” to formulate a relevant economic policy in Ukraine based on world experience. The study proves the need to attribute water infrastructure to the critical infrastructure sectors of Ukraine and its regions, based on the best world practices in managing water resources and protecting the water infrastructure itself from technogenic, physical, and cyber-physical threats. According to the study results, conceptual bases for ensuring the economic security of regional socio-economic systems are developed, which differ in view of the water security system of the regional socio-economic system, giving priority to the engineering and technical infrastructure of a region.


Safety ◽  
2018 ◽  
Vol 4 (3) ◽  
pp. 36 ◽  
Author(s):  
Sakdirat Kaewunruen ◽  
Hamad Alawad ◽  
Silviu Cotruta

This paper highlights a risk-based decision-making framework on a basis of probabilistic risk assessment (PRA). Its aim is to enable stakeholders of transport infrastructures to systematically and effectively allocate their limited resources and consequently improve resilience when facing the potential risk of a terrorist attack. The potential risk of a terrorist attack affects the inter-operation of transportation infrastructures including airports and rail stations, the regional economy, and imposes additional costs of security or any countermeasures. This novel framework is thus established in order to model the security system, to consider a multitude of threat scenarios, and to assess the decisions and choices taken by the aggressors during various stages of their attack. The framework has capability to identify the state of partial neutralization, which reveals the losses incurred when the terrorist could not reach the primary target. In this study, an underground railway station interconnected to an international airport has been used as a case study to demonstrate the effectiveness of this novel framework. By the rigorous assessment of potential losses during a variety of threat scenarios, four countermeasures that could minimise losses are proposed: screening of passengers by observation techniques (SPOT), a surveillance system, increase of the cargo screening rate, and blast-resistant cargo containers. The cost and efficiency assessment is employed to determine the most suitable countermeasures when the value of the security measures equal their cost. Note that ongoing research is still needed to establish better countermeasures since there is no end to the creativity of terrorists. The new technology, such as wireless sensors, will play an important role in the security system in the future. In particular, this study will help insurance and rail industries to model and manage risk profiles at critical infrastructure.


2021 ◽  
Vol 12 (5-2021) ◽  
pp. 104-116
Author(s):  
Darya N. Khaliullina ◽  
◽  
Vitaliy V. Bystrov ◽  

The article is devoted to the development of the concept of regional security management based on the principles of ensuring the resilience of critical infrastructures. The article is a problem statement and considers general theoretical issues in the field of resilience of complex systems. The authors identify two main approaches to the model of representation of the regional security system from the perspective of ensuring its resilience.


Sign in / Sign up

Export Citation Format

Share Document