THE METHODOLOGY FOR EVALUATING THE FUNCTIONAL STABILITY OF THE PROTECTION SYSTEM OF SPECIAL NETWORKS
Keywords:network, information security, wireless networks, cyber security guard, functional stability, quantitative assessment, sensor network
Information systems function under the influence of external and internal destabilizing factors. Under negative influence, system modules may fail. However, the systems must function offline for a specified time. Such a condition of functioning can be fulfilled by ensuring the property of functional stability. The property of functional stability was introduced due to the observation of the behavior of biological systems, organisms with the inherent property to fulfill given goals with physical damage due to biological redundancy: sets of sense organs, physiological analyzers, nerve fibers, the configuration of the brain as a control and information processing system, as well as symmetry body The main feature of functionally stable systems is their ability to degrade at the structural level until the system completely fails, that is, to exclude defective elements from the structure, to rebuild the structure, to adjust the system parameters. adapt to new operating conditions. The main means of ensuring functional stability is the introduction of redundancy (structural, software, time, etc.) during their design. The paper analyzes the existing scientifically based approaches to increasing the efficiency of complex technical systems, which include an intelligent automated control system. A technique for determining the features and indicators of the functional stability of the special purpose network structure, which provides communication between the UAV group and the operator, is proposed. Quantitative methods for assessing functional stability based on the above indicators are proposed. On the basis of these assessments, recommendations can be made on the construction of the structure or reasonable requirements for the structure of the wireless sensor network that will be designed and operated can be formulated. the main feature of functionally stable systems. It has been established that this is their ability to degrade at the structural level until the complete failure of the system, that is, to exclude defective elements from the structure, rebuild the structure, and adjust the system parameters to adapt to new operating conditions. It has been proven that the main means of ensuring functional stability is the introduction of excesses into their construction: structural, program, time, etc.
R. Shorey, A. Ananda, Mun Choon Chan, Wei Tsang Ooi. "Mobile, wireless, and sensor networks: technology, applications, and future directions", USA: A John Wiley & Sons, Inc. 2011. 430 p.
V. Mukhin, H. Loutskii, O. Barabash, Ya. Kornaga, V. Steshyn "Models for Analysis and Prognostication of the Indicators of the Distributed Computer Systems’ Characteristics" International Review on Computers and Software (IRECOS), 2015. – Vol. 10, N 12, рр. 1216–1224. ISSN 1828-6003.
V. Mashkov, J. Barilla, P. Simr "Applying Petri Nets to Modeling of Many-Core Processor Self Testing when Tests are Performed Randomly". Journal of Electronic Testing Theory and Applications (JETTA), 2013, Volume 29, Issue 1, pp. 25–34.
O. V. Barabash, D. M. Obidin, A. P. Musienko "Knowledge base model of intellectual control system of high-speed moving objects based on its verification", Information processing systems, № 5(121), Kharkiv, 2014, pp. 3–6.
V. M. Sineglazov and V. P. Ischenko, "Integrated navigation complex of UAV on basis of flight controller," 2015 IEEE International Conference Actual Problems of Unmanned Aerial Vehicles Developments (APUAVD), Kiev, 2015, pp. 20–25.
A. P. Musienko, A. S. Serdyuk "Lebesgue-type inequalities for the de la Vallée poussin sums on sets of entire functions" Ukrainian Mathematical Journal, October 2013, Volume 65, Issue 5, pp. 709–722.
V. A. Efymushkyn T. V. Ledovskyh, D. M. Korabelnykov, D. N. Yazykov "Overview of solutions of SDN / NFV foreign manufacturers". T-Comm: Telecommunications and transport. 2015. Vol. 9. № 8. pp. 5–13.  O. Barabash, N. Lukova-Chuiko, A. Musienko, I. Salanda "Diagnostic Model of Wireless Sensor Network Based on Mutual Inspection of Network Elements", Proceedings of 14 International Conference the Experience of Designing and Application of Cad Systems in Microelectronics (CADSM 2017), (21–25 February, 2017, Polyana Svalyava (Zakarpattya), Ukraine). Lviv: Lviv Polytechnic National University, 2017. pp. 303–305.
O. R. Laponina, V. A. Suhomlin, "Networks transformation methods to SDN-Architecture", International Journal of Open Information Technologies. Vol. 3, No. 4, 2015. pp. 8–17. ISSN: 2307-8162.
N. Pashynska, V. Snytyuk, V. Putrenko, A. Musienko "A decision tree in a classification of fire hazard factors ", Еastern-European Journal of Enterprise Technologies. Kharkov, 2016. № 5/10(83). pp. 32–37.
О. Laptiev, V. Sobchuk, A. Sobchuk, S. Laptev, T. Lapteva. Application of periodic solutions of nonlinear differential equations with impulse action in models of information network protection systems. Collection of scientific materials "I International scientific and theoretical conference" (Internet). 04/23/2021. Krakow, Poland. P. 138–141.
O. A. Laptiev, A. V. Sobchuk, A. O. Barabash, A. S. Yuzva The use of sensor networks in the construction of functionally stable information systems. Mathematics. Information Technology. Education. 2021: collection of supplementary materials. member. X International science and practice conference, (June 4–6, 2021. Lutsk– Svityaz: Lesya Ukrainka State University), 2019. pp. 43–44.
Oleksandr Laptiev, Valentyn Sobchuk, Andrii Sobchuk, Serhii Laptiev, Tеtiana Laptieva. Удосконалена модель оцінювання економічних витрат на систему захисту інформації в соціальних мережах. Кібербезпека: освіта, наука, техніка. Том 4, № 12 (2021), рр. 19–28.
V. O. Breslavskyi, O. A. Laptiev, A. M. Pravdyviy, S. A. Zozulya Development of a routing algorithm for self-organized radio networks. Scientific and practical magazine "Zvyazok". K.: DUT, 2020. No. 6, pp. 54–57.
O. Laptiev, V. Savchenko, Y. Kravchenko, O. Barabash. Improving the method of searching digital illegal means obtaining information based on cluster analysis. Scientific Journal of Astana IT University, V 3, Septemder 2020. pp 63-71.
O. A. Laptiev, R. V. Babenko, A. M. Pravdyviy, S. A. Zozulya, O. R. Stefurak. An improved technique for choosing the sequence of priorities for servicing information flows. Scientific and practical magazine "Zvyazok". K.: DUT, 2020. No. 4 (146), pp. 27–31.
Roman Kyrychok, Oleksandr Laptiev, Rostyslav Lisnevsky, Valeri Kozlovsky, Vitaliy Klobukov. Development of a method for checking vulnerabilities of a corporate network using bernstein transformations. Eastern-European journal of enterprise technologies. Vol.1№9 (115), 2022, рр. 93–101. ISSN (print)1729-3774. ISSN (on-line) 1729-4061. DOI: 10.15587/1729- 4061.2022.253530.