Methodology of modeling the behavior processes of antagonistic agents in security systems

Authors

  • Oleksandr Milov Simon Kuznets Kharkiv National University of Economics
  • Serhii Yevseiev Simon Kuznets Kharkiv National University of Economics

DOI:

https://doi.org/10.18372/2225-5036.25.14460

Keywords:

cybersecurity, antagonistic agents, modeling methodology, reflective agent, multi-agent systems, business process loop

Abstract

The problem is formulated and the need for developing a methodology for modeling the behavior of antagonistic agents in security systems is shown. The presented concept is implemented at three levels, namely: the level of the security system as a whole, the level of individual agents and the level of the group of agents. Five stages of the concept implementation are presented. At the first stage, it is proposed to analyze protected business processes and threats to these processes. An ontological model is proposed as a basic model of this stage as a carrier of knowledge about the studied prelet region. An approach to the automation of ontology construction is presented, focused on the intellectual analysis of texts in natural languages, namely, texts of articles published in scientific journals. At the second and third stages of constructing the methodology, models of individual and group behavior of agents of cybersecurity systems are proposed. The presented models reflect the reflective properties of agents that affect the decision-making and learning processes. The developed models made it possible to form a model basis for the self-organization of the security system. A practical application of the described models is an algorithm for determining the implementation of the most probable threat, based on the cost indicators of threats and the probabilities of their implementation. This can ensure the efficient distribution of limited financial investment in cybersecurity.

Author Biographies

Oleksandr Milov, Simon Kuznets Kharkiv National University of Economics

Associate Professor of Cyber Security and Information Technology Department

Serhii Yevseiev, Simon Kuznets Kharkiv National University of Economics

Head of Cyber Security and Information Technology Department

References

O. Milov, A. Voitko, I. Husarova, O. Domaskin, E. Ivanchenko, I. Ivanchenko, O. Korol, H. Kots, I. Opirskyy, O. Fraze-Frazenko, "Development of methodology for modeling the interaction of antagonistic agents in cybersecurity systems", Eastern-European Journal of Enterprise Technologies, vol. 9, no. 2, pp. 56-68, 2019.

O. Milov, S. Yevseiev, V. Aleksiyev, S. Balakireva, I. Tyshyk, O. Shmatko, "Development of a methodology for building an information security system in the corporate research and education system in the context of university autonomy", Eastern-Europe Journal of Enterprise Technologies, 3(9-99), pp. 49-63, 2019.

O. Milov, S. Milevsky, O. Korol, "Development of basic principles for corporate planning", Системи обробки інформації, випуск 1 (156), 2019.

С. Євсеєв, "Класифікатор кіберзагроз інформаційних ресурсів автоматизованих банківських систем", Кібербезпека: освіта, наука, техніка, № 2(2), 2018, С. 47-67.

О. Юдін, С. Бучик, А. Чунарьова, О. Варченко, "Методологія побудови класифікатора загроз державним інформаційним ресурсам", Наукоємні технології, № 2 (22), С. 200-210,2014.

О. Юдін, С. Бучик, "Класифікація загроз державним інформаційним ресурсам нормативно-правового спрямування. Методологія побудови класифікатора", Захист інформації, Том 17 (2), С. 108-116, 2015.

В. Городецкий, И. Котенко, О. Карсаев, "Многоагентная система защиты информации в компьютерных сетях: механизмы обучения и формирования решений для обнаружения вторжений", Проблемы информатизации, № 2, C. 67-73, 2000.

И. Котенко, О. Корсаев, "Использование многоагентных технологий для комплексной защиты информационных ресурсов в компьютерных сетях", Известия ТРТУ, №4, C. 38-50, 2002.

А. Милов, О. Король, "Разработка онтологии поведения взимодействующих агентов в системах безопасности", 4th International Congress on 3D Printing (Additive Manufacturing) Technologies and Digital Industry 2019 (11-14 April, 2019), pp. 832-842.

A. Maedche, S. Staab, "Discovering conceptual relations from text", Proceedings of the 14th European Conference on Artificial Intellignece (ECAI’2000), 2000.

A. Maedche, S. Staab, "Discovering conceptual relations from text", In Proceedings of ECAI-2000, IOS Press, Amsterdam, 2000.

A. Maedche, S. Staab, "Mining Ontologies from Text", In Proceedings of EKAW-2000, Springer Lecture Notes in Artificial Intelligence (LNAI-1937), Juan-Les-Pins, France, 2000. Springer, 2000.

A. Maedche, S. Staab, "Semi-automatic engineering of ontologies from text", In Proceedings of the 12th Internal Conference on Software and Knowledge Engineering. Chicago, USA, July, 5-7, 2000. KSI, 2000.

A. Maedche, S. Staab, "Semi-automatic engineering of ontologies from text", In Proceedings of the 12th Internal Conference on Software and Knowledge Engineering. Chicago, USA, July, 5-7, 2000. KSI, 2000.

Published

2019-12-27

Issue

Section

Cybersecurity & Critical Information Infrastructure Protection (CIIP)