SOCIOCYBERPHYSICAL SYSTEMS’ SECURITY MODELS
DOI:
https://doi.org/10.18372/2410-7840.25.18224Keywords:
socio-cyberphysical systems, Lotka-Volterra model, hybridity, synergy, targeted attacksAbstract
The object of the study is the process of building multi-contour systems for the protection infrastructure elements of socio-cyber-physical systems based on a modification of the Lotka-Volterra model. The article presents the formation of security models for socio-cyber-physical systems based on the Lotka-Volterra model, which allows determining preventive measures of the security system against targeted (mixed) attacks with integration with social engineering methods and the possibility of hybridity and synergism signs. This approach allows, based on the initial data on the socio-political (economic) component, to determine the possibility of influencing the general opinion of both a separate society and certain age groups. In addition, the identification of signs of hybridity and synergism of cyber threats in the main components of socio-cyber-physical systems: social networks, the cloud and the physical component allows to determine the basic principles of building multi-contour security systems, considering the external and internal security contour systems on each platform. For the formation of multi-contour information protection systems of socio-cyber-physical systems, possible scenarios of the implementation of targeted attacks and their directionality are considered. And also, the possibility of influencing the socio-psychological state through social networks of formal and informal "leaders" of society.
References
IoT Security Maturity Model: Description and In-tended Use. URL: http: // www.iiconsortium.org / pdf / SMM_Description_and_Intended_Use_2018-04-09.pdf.
IoT Security Maturity Model: Practitioner’s Guide. URL: IoT Security Maturity Model: Practitioner’s Guide.
Edited by Serhii Yevseiev, Volodymir Ponomarenko, Oleksandr Laptiev, Oleksandr Milov. Synergy of building cybersecurity systems: monograph/S. Yevseiev, V. Ponomarenko, O. Laptiev, O. Milov and others. Kharkiv: PC TECHNOLOGY CENTER, 2021. 188 p.
Hryshchuk R. The synergetic approach for providing bank information security: the problem formulation // R. Hryshchuk , S. Yevseiev/Безпека інформації. 2016. № 22 (1). С. 64-74.
Грищук Р.В. Основи кібернетичної безпеки: Мо-нографія/Р.В. Грищук, Ю.Г. Даник; за заг. ред. Ю.Г. Данника. Житомир: ЖНАЕУ, 2016. 636 с.
O. Shmatko, S. Balakireva, А. Vlasov, N. Zagorodna, О. Korol, O. Milov, O. Petrov, S. Pohasii, Kh. Rza-yev, V. Khvostenko. Development of methodological foundations for a classifier of threats to cyberphysical systems design. Eastern-European Journal of Enterprise Technologies, 3/9 (105), 2020, pp. 6-19.
Modeling of security systems for critical infrastruc-ture facilities: monograph / S. Yevseiev, R. Hryshchuk, K. Molodetska, M. Nazarkevych and others. Kharkiv: PC TECHNOLOGY CENTER, 2022. 196 p.
Models of socio-cyber-physical systems security: monograph / S. Yevseiev, Yu. Khokhlachova, S. Ostapov, O. Laptiev and others. Kharkiv: PC TECHNOLOGY CENTER, 2023. 168 p.
І.В. Кононович. Динаміка кількості інцидентів інформаційної безпеки. Informatics and Mathematical Methods in Simulation. Vol. 4 (2014), № 1, pp. 35-43.
І.В. Кононович, Д.А. Маєвський, Р.С. Подобний. Моделі забезпечення кібербезпеки із запізнюванням реагування на інциденти. Informatics and Mathematical Methods in Simulation.Vol. 5 (2015), № 4, pp. 339-346.
Serhii Yevseiev, Pierre Murr, Stanislav Milevskyi, Olha Korol, Marharyta Melnyk. Development of a Sociocyberphysical Systems Cyber Threats Classifier. 2023 7th International Symposium on Multidiscipli-nary Studies and Innovative Technologies (ISMSIT).
Lippert, K.J.; Cloutier, R. Cyberspace: A Digital Ecosystem. // Systems 2021, 9, 48. URL: https://doi. org/10.3390/systems9030048.
Mazurczyk,W.; Drobniak, S.; Moore, S. Towards a Systematic View on Cybersecurity Ecology. URL: https: // arxiv.org/ftp/arxiv/papers/1505/1505.04207.pdf.
Gorman, S.P.; Kulkarni, R.G.; Schintler, L.A.; Stough, R.R. A Predator Prey Approach to the Network Structure of Cyberspace. URL: https://www.resea-rchgate.net/publication/255679706_A_predator_prey_approach_to_the_network_structure_of_cyberspace.
Crandall J R, Ladau J, Ensafi R, Shebaro B, Forrest S, The Ecology of Malware, Proceedings of the New security paradigms Workshop (NSPW '08), pp. 99-106, Lake Tahoe, CA, USA.
Fink, Glenn A., Haack, Jereme N., McKinnon, Archibald D., and Fulp, Errin W. Defense on the Move: Ant-Based Cyber Defense. United States, 2014. Web. doi:10.1109/MSP.2014.21.
Lifeng Wu and Yinao Wang. Estimation the parameters of Lotka-Volterra model based on grey direct modelling method and its application. Expert Syst. Appl. 38, 6 (2011), pp. 6412-6416. URL: http:// dx.doi.org/10.1016/j.eswa.2010.09.013.
Diz-Pita, É.; Otero-Espinar, M.V. Predator–Prey Models: A Review of Some Recent Advances. Mathematics 2021, 1783 p. URL: https://doi.org/ 10. 3390/math9151783.
S. Pohasii and other. Development of a method for assessing the security of cyber-physical systems based on the Lotka–Volterra model. Eastern-European Journal of Enterprise Technologies. 2021. 5/9 (113). pp. 30-47.
Serhii Yevseiev and other. Development of a method for assessing forecast of social impact in regional communities. Eastern-European Journal of Enterprise Technologies. 2021. 6/2 (114). pp. 30-47.
O. Shmatko and other. Development of methodological foundations for designing a classifier of threats to cyberphysical systems. Eastern-European Journal of Enterprise Technologies ISSN 1729-3774 3/9 (105) 2020. pp. 6-19.
Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).