SOCIOCYBERPHYSICAL SYSTEMS’ SECURITY MODELS

Authors

DOI:

https://doi.org/10.18372/2410-7840.25.18224

Keywords:

socio-cyberphysical systems, Lotka-Volterra model, hybridity, synergy, targeted attacks

Abstract

The object of the study is the process of building multi-contour systems for the protection infrastructure elements of socio-cyber-physical systems based on a modification of the Lotka-Volterra model. The article presents the formation of security models for socio-cyber-physical systems based on the Lotka-Volterra model, which allows deter­mining preventive measures of the security system against targeted (mixed) attacks with integration with social engineering methods and the possibility of hybridity and synergism signs. This approach allows, based on the initial data on the socio-political (economic) component, to determine the possibility of influencing the general opinion of both a separate society and certain age groups. In addition, the identification of signs of hybridity and synergism of cyber threats in the main components of socio-cyber-physical systems: social networks, the cloud and the physical component allows to determine the basic principles of building multi-contour security systems, considering the external and internal security contour systems on each platform. For the formation of multi-contour information protection systems of socio-cyber-physical systems, possible scenarios of the implementation of targeted attacks and their directionality are considered. And also, the possibility of influencing the socio-psychological state through social networks of formal and informal "leaders" of society.

References

IoT Security Maturity Model: Description and In-tended Use. URL: http: // www.iiconsortium.org / pdf / SMM_Description_and_Intended_Use_2018-04-09.pdf.

IoT Security Maturity Model: Practitioner’s Guide. URL: IoT Security Maturity Model: Practitioner’s Guide.

Edited by Serhii Yevseiev, Volodymir Ponomarenko, Oleksandr Laptiev, Oleksandr Milov. Synergy of building cybersecurity systems: monograph/S. Yevseiev, V. Ponomarenko, O. Laptiev, O. Milov and others. Kharkiv: PC TECHNOLOGY CENTER, 2021. 188 p.

Hryshchuk R. The synergetic approach for providing bank information security: the problem formulation // R. Hryshchuk , S. Yevseiev/Безпека інформації. 2016. № 22 (1). С. 64-74.

Грищук Р.В. Основи кібернетичної безпеки: Мо-нографія/Р.В. Грищук, Ю.Г. Даник; за заг. ред. Ю.Г. Данника. Житомир: ЖНАЕУ, 2016. 636 с.

O. Shmatko, S. Balakireva, А. Vlasov, N. Zagorodna, О. Korol, O. Milov, O. Petrov, S. Pohasii, Kh. Rza-yev, V. Khvostenko. Development of methodological foundations for a classifier of threats to cyberphysical systems design. Eastern-European Journal of Enterprise Technologies, 3/9 (105), 2020, pp. 6-19.

Modeling of security systems for critical infrastruc-ture facilities: monograph / S. Yevseiev, R. Hryshchuk, K. Molodetska, M. Nazarkevych and others. Kharkiv: PC TECHNOLOGY CENTER, 2022. 196 p.

Models of socio-cyber-physical systems security: monograph / S. Yevseiev, Yu. Khokhlachova, S. Ostapov, O. Laptiev and others. Kharkiv: PC TECHNOLOGY CENTER, 2023. 168 p.

І.В. Кононович. Динаміка кількості інцидентів інформаційної безпеки. Informatics and Mathematical Methods in Simulation. Vol. 4 (2014), № 1, pp. 35-43.

І.В. Кононович, Д.А. Маєвський, Р.С. Подобний. Моделі забезпечення кібербезпеки із запізнюванням реагування на інциденти. Informatics and Mathematical Methods in Simulation.Vol. 5 (2015), № 4, pp. 339-346.

Serhii Yevseiev, Pierre Murr, Stanislav Milevskyi, Olha Korol, Marharyta Melnyk. Development of a Sociocyberphysical Systems Cyber Threats Classifier. 2023 7th International Symposium on Multidiscipli-nary Studies and Innovative Technologies (ISMSIT).

Lippert, K.J.; Cloutier, R. Cyberspace: A Digital Ecosystem. // Systems 2021, 9, 48. URL: https://doi. org/10.3390/systems9030048.

Mazurczyk,W.; Drobniak, S.; Moore, S. Towards a Systematic View on Cybersecurity Ecology. URL: https: // arxiv.org/ftp/arxiv/papers/1505/1505.04207.pdf.

Gorman, S.P.; Kulkarni, R.G.; Schintler, L.A.; Stough, R.R. A Predator Prey Approach to the Network Structure of Cyberspace. URL: https://www.resea-rchgate.net/publication/255679706_A_predator_prey_approach_to_the_network_structure_of_cyberspace.

Crandall J R, Ladau J, Ensafi R, Shebaro B, Forrest S, The Ecology of Malware, Proceedings of the New security paradigms Workshop (NSPW '08), pp. 99-106, Lake Tahoe, CA, USA.

Fink, Glenn A., Haack, Jereme N., McKinnon, Archibald D., and Fulp, Errin W. Defense on the Move: Ant-Based Cyber Defense. United States, 2014. Web. doi:10.1109/MSP.2014.21.

Lifeng Wu and Yinao Wang. Estimation the parameters of Lotka-Volterra model based on grey direct modelling method and its application. Expert Syst. Appl. 38, 6 (2011), pp. 6412-6416. URL: http:// dx.doi.org/10.1016/j.eswa.2010.09.013.

Diz-Pita, É.; Otero-Espinar, M.V. Predator–Prey Models: A Review of Some Recent Advances. Mathematics 2021, 1783 p. URL: https://doi.org/ 10. 3390/math9151783.

S. Pohasii and other. Development of a method for assessing the security of cyber-physical systems based on the Lotka–Volterra model. Eastern-European Journal of Enterprise Technologies. 2021. 5/9 (113). pp. 30-47.

Serhii Yevseiev and other. Development of a method for assessing forecast of social impact in regional communities. Eastern-European Journal of Enterprise Technologies. 2021. 6/2 (114). pp. 30-47.

O. Shmatko and other. Development of methodological foundations for designing a classifier of threats to cyberphysical systems. Eastern-European Journal of Enterprise Technologies ISSN 1729-3774 3/9 (105) 2020. pp. 6-19.

Published

2023-12-24