Conditions of saddle point existence in multilevel information security systems
DOI:
https://doi.org/10.18372/2225-5036.19.4707Keywords:
information security, mathematical model, objective function, dynamic vulnerability, saddle pointAbstract
When planning the unified information security systems calculation of optimal resource amount needed for defence and their allocation between the objects, which differ in amount of information, vulnerability or attack probability, are important problems. Search for solution gets more complex over uncertainty of attackers actions. Under the circumstances appropriate is considered solution that match with saddle point of objective function, which express one of security system indicators – part of lost information, benefits of an investment in information security, investment efficiency – depending on correlation of attack and defence resources. Carried out calculations enable to analyse conditions of saddle point existence in one- and multilevel systems, which differ in quantity of objects and obstacles that defend them. It is demonstrated that saddle point exists in certain intervals of values Z=X/Y; intervals are determined by form of objects dynamic vulnerability and distribution of information between the objects.References
Вентцель Е.С. Исследование операций. – М.: Сов. Радио. – 1972. – 552 с.
Шикин Е.В., Шикина Г.Е. Исследование операций. – М.: Проспект. – 2006. – 280 с.
Лабскер Л.Г., Бабешко Л.О. Игровые методы в управлении экономикой и бизнесом. – М.: Дело, 2001. – 464 c.
Левченко Є.Г., Рабчун А.О. Оптимізаційні задачі менеджменту інформаційної безпеки // Сучасний захист інформації. – 2010. – №1. – С. 16-23.
Прус Р.Б. Оптимізація розподілу ресурсів захисту інформації в динамічному режимі // Безпека інформації. – 2012. – №1. – С. 26-32.
Gordon L.A., Loeb M.P. The Economics of Information Security Investment // ACM Transactions on Information and System Security, Nov. 2002. - Vol. 5. - №4. - P.438-457.
Matsuura K., Productivity Space of Information Security in an Extension of the Gordon-Loeb's Investment Model // The Seventh Workshop on the Economics of Information Security. June 25-28, Hanover, USA – 2008.
Liu W., Tanaka H., Matsuura K. Empirical-Analysis Methodology for Information-Security Investment and Application to Reliable Survey of Japanese Firms // IPSJ Journal, September 2007. – Vol. 48, № 9. – P. 3204-3218.
Левченко Є.Г., Демчишин М.В., Рабчун А.О. Математичні моделі економічного менеджменту інформаційної безпеки // Системні дослідження та інформаційні технології. – 2011. – №4. – С. 88-96.