Threat ranging for determination of costs to ensure the security of the information protection system based on the theory of fuzzy relations

Authors

  • Ольга Володимирівна Салієва Vinnytsia National Technical University
  • Юрій Євгенович Яремчук Vinnytsia National Technical University

DOI:

https://doi.org/10.18372/2410-7840.22.14664

Keywords:

information security, security threats, fuzzy relation, tran-sitive circuit

Abstract

For the construction and effective functioning of the information protection system it is necessary to analyze the possible threats to the level of their impact on the studied system and determine the allowable costs to ensure its security. The vast majority of this issue is solved using statistical analysis methods, which require consideration of a significant amount of information, complex calculations and take a long time to process. Therefore, the paper proposes the ranking of threats to the information security system using the theory of fuzzy relations. The initial information about the system is given in the form of a vague relationship of the impact of threats on non-compliance with the established criteria. Based on the defined ranks, the set of threats to the information protection system is divided into classes that do not intersect and are equivalent in weight. The division into classes is carried out using a transitive closure of the fuzzy similarity relationship and makes it possible to build a clear plan for the protection of the information space, taking into account the degree of influence of each class of threats. A decomposition tree for equivalence classes is also constructed, which clearly represents the number of classes and the list of threats belonging to this class at each level. To ensure the security of the information security system, it is proposed to distribute the eligible costs in proportional equivalence to the ranks of threats. This will promote the rational use of resources and tools to prevent, eliminate or reduce the impact of probable threats to the information security system, provide a balance between the level of information risk and the eligible costs of information security measures.

Author Biographies

Ольга Володимирівна Салієва, Vinnytsia National Technical University

graduate student of the Department of Management and Security of Information Systems, Vinnytsia National Technical University

Юрій Євгенович Яремчук, Vinnytsia National Technical University

Director of the Center for Information Technologies and Information Protection, Professor of the Department of Management and Security of Information Systems, Vinnytsia National Technical University

References

И. Ажмухамедов, "Моделирование на основе экспертных суджений процесса оценки инфор-мационной безопасности", Вестник АГТУ. Серия: «Управление, вычислительная техника и інформатика», №2, С. 101-109, 2009.

A. Кащенко, "Многокритериальная оценка и ран-жирование информационных рисков на основе алгоритма Мамдани", Кибернетика и технологи XXI века: материалы V Международной научно-технической конференции, С. 81-85, 2004.

Класифікація загроз інформаційній безпеці. Ін-формаційна безпека особистості. [Електронний ресурс]. Режим доступу: https://sites.google.com/ site/infobezosob/klasifikacia-zagroz-informacijnij-bezpeci (дата звернення: 25.03.2020).

А. Ротштейн, "Ранжирование элементов системы на основе нечеткого отношения влияния и тран-зитивного замыкания", Кибернетика и системный анализ, Том 53, №1, С. 68-78, 2017.

А. Ротштейн, "Нечеткие когнитивные карты в анализе надежности систем", Надежность, №4, С. 24-31, 2019.

В. Ярочкин, Информационная безопасность, М.: Ака-демический Проект; Гаудеамус, 2004, 544 с.

L. Zadeh, "Similarity relations and fuzzy orderings", Information Sciences, Vol. 3, pp. 177-200, 1971.

Published

2020-03-31

Issue

Section

Articles