MANAGEMENT OF INFORMATION FLOWS IN A CYBERSECURITY SYSTEM
DOI:
https://doi.org/10.18372/2410-7840.26.20016Keywords:
cybersecurity, information flows, Markov chains, information characteristics, compression coefficient, regularization, adaptive control, quasi-stationarity, forecasting, optimization, data transfer systemsAbstract
Methods for controlling information flows in cybersecurity systems using probabilistic models and optimization algorithms have been studied. A mathematical framework has been developed for analyzing and stabilizing data flows in multichannel systems. Markov chains have been used to model the phase states of flows, and the information characteristics of the system, compression coefficients, and quasi-stationarity intervals have been mathematically estimated. The influence of tolerance parameters, phase state probabilities, and discretization levels on information transfer has been considered. Regularization mechanisms have been introduced to prevent singularities and ensure system stability. An adaptive approach to flow control has been proposed, allowing for dynamic adjustment of system parameters in the face of changing threats while maintaining the accuracy of data transmission.
References
Козюра В.Д. Захист інформації в комп’ютерних мережах/В.Д. Козюра, В.О. Хорошко, М.Є. Шелест та інші – Ніжин: ТПК «Орхідея», 2020, – 236с.
Козюра В.Д. Процеси та технології в інформаційних системах/ В.Д. Козюра, Л.М. Скачек, Ю.М. Ткач та інші – Ніжин: ТПК «Орхідея», 2020, – 278с.
Юр’єв Ю.М. Концепція мережі авіаційного електрозв’язку /Ю.М. Юр’єв//Проблеми підвищення ефективності інфраструктури. Збірник наукових праць – К:НАУ, Вип.6, 2001 – С:118-125.
Литвинов В.В. Математическое обеспечение проектирования в вычислительных сетей//В.В. Литвинов – К: Техніка ,1982. – 216с.
Згуровський М.З. Основи системного аналізу/М.З. Згуровський, Н.Д. Панкратова – К:Вид. група BHV, 2007. – 544с.
Дибкін Є.Б. Марківські процеси/Є.Б. Дибкін – К:Наукова думка, 1999. – 860с.
Стратонович Р.Л. Умовні марківські процеси та їх застосування/Р.Л. Стратонович – К:КНУ ім. Татарса Шевченка, 2001. – 322с.
Шульга В.П., Іванченко Є.В., Вишневська Н.С., Бербер А.С. Дослідження методів та моделей оцінювання кіберзахисту критичної інфраструктури держави/ Сучасний захист інформації., 2024, №3(59), https:// DOI: 10.31673/2409-7292.2024.030001.

Downloads
Published
Issue
Section
License
Authors who publish with this journal agree to the following terms:- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).