Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2021-5-30-35
V. Gribunin, A. Timonov
Purpose of the article: optimization of the choice of information security tools in a multi-level automated system, taking into account higher levels, quality indicators of information security tools, as well as the general financial budget. Demonstration of analogies of solving these problems with known problems from communication theory. Research method: optimal choice of information security tools based on risk analysis and the Lagrange multiplier method; Optimal bit budget allocation based on the Waterfilling optimization algorithm. Optimal placement of information security tools in a multilevel automated system based on bisectional search. Obtained result: the article shows analogies between some problems of communication theory and the optimal choice of information security tools. The well-known problem of the optimal choice of information security tools is solved using the rate-distortion theory, the well-known problem of the optimal budget allocation for their purchase is solved by analogy with the problem of distributing the power of transmitters. For the first time, the problem posed for the optimal placement of information security tools in a multilevel automated system was solved by analogy with the problem of distributing the total bit budget between quantizers.
{"title":"On the Analogy of the Problems of Optimizing the Choice of Information Security Controls with Some Problems of Communication Theory","authors":"V. Gribunin, A. Timonov","doi":"10.21681/2311-3456-2021-5-30-35","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-5-30-35","url":null,"abstract":"Purpose of the article: optimization of the choice of information security tools in a multi-level automated system, taking into account higher levels, quality indicators of information security tools, as well as the general financial budget. Demonstration of analogies of solving these problems with known problems from communication theory. Research method: optimal choice of information security tools based on risk analysis and the Lagrange multiplier method; Optimal bit budget allocation based on the Waterfilling optimization algorithm. Optimal placement of information security tools in a multilevel automated system based on bisectional search. Obtained result: the article shows analogies between some problems of communication theory and the optimal choice of information security tools. The well-known problem of the optimal choice of information security tools is solved using the rate-distortion theory, the well-known problem of the optimal budget allocation for their purchase is solved by analogy with the problem of distributing the power of transmitters. For the first time, the problem posed for the optimal placement of information security tools in a multilevel automated system was solved by analogy with the problem of distributing the total bit budget between quantizers.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"374 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124683253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2023-2-36-51
S. Dichenko, Dmitry Samoilenko, O. Finko, Konstantin Ryumshin
The purpose of the work is to develop a method for monitoring and restoring the integrity of information in secure multidimensional data storage systems that ensures the stability of the systems under consideration under the destructive influences of an intruder and disturbances in the operating environment. Research method: in the course of the research, the scientific and methodological apparatus of the theory of algebraic systems was used in conjunction with the methods of cryptographic information protection and the mathematical apparatus of coding theory to implement the procedures of crypto-code transformations. Models of reliable data storage systems were studied to justify the feasibility of procedures for ensuring the confirmed integrity of the processed information. Results of the study: a method for formalized representation of information in secure multidimensional data storage systems used in the interests of information and analytical systems, which makes it possible to visually describe the developed structures for monitoring and restoring data integrity under the destructive influences of an intruder and disturbances in the operating environment. A mathematical model of the process of monitoring and restoring data integrity based on crypto-code transformations based on the aggregation of cryptographic methods and methods of error-correcting coding is presented. Combining well-known classical solutions to ensure data integrity will reduce the introduced redundancy, as well as expand the functionality of secure information and analytical systems, which consists in confirming the reliability of restoring the integrity of distorted or lost data without additional costs of their repeated control by cryptographic methods. The proposed model takes into account the structure of multidimensional representation of information in the considered data storage systems of information and analytical systems. Scientific novelty: the developed method of parametric synthesis of crypto-code structures for monitoring and restoring the integrity of information in secure multidimensional data storage systems differs from the known ones by obtaining optimal crypto-code structures due to the rational aggregation of cryptographic and code transformations in the parameter space of the considered data storage systems. Crypto-code structures formed on the basis of building multidimensional hash codes and performing transformations in extended Galois fields provide cryptographic control and restoration of information integrity with the possibility of flexible introduction of redundancy and confirmation with cryptographic reliability of information integrity after the restoration procedure
{"title":"A METHOD OF PARAMETRIC SYNTHESIS OF CRYPTO-CODE STRUCTURES FOR MONITORING AND RESTORING THE INTEGRITY OF INFORMATION","authors":"S. Dichenko, Dmitry Samoilenko, O. Finko, Konstantin Ryumshin","doi":"10.21681/2311-3456-2023-2-36-51","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-2-36-51","url":null,"abstract":"The purpose of the work is to develop a method for monitoring and restoring the integrity of information in secure multidimensional data storage systems that ensures the stability of the systems under consideration under the destructive influences of an intruder and disturbances in the operating environment. Research method: in the course of the research, the scientific and methodological apparatus of the theory of algebraic systems was used in conjunction with the methods of cryptographic information protection and the mathematical apparatus of coding theory to implement the procedures of crypto-code transformations. Models of reliable data storage systems were studied to justify the feasibility of procedures for ensuring the confirmed integrity of the processed information. Results of the study: a method for formalized representation of information in secure multidimensional data storage systems used in the interests of information and analytical systems, which makes it possible to visually describe the developed structures for monitoring and restoring data integrity under the destructive influences of an intruder and disturbances in the operating environment. A mathematical model of the process of monitoring and restoring data integrity based on crypto-code transformations based on the aggregation of cryptographic methods and methods of error-correcting coding is presented. Combining well-known classical solutions to ensure data integrity will reduce the introduced redundancy, as well as expand the functionality of secure information and analytical systems, which consists in confirming the reliability of restoring the integrity of distorted or lost data without additional costs of their repeated control by cryptographic methods. The proposed model takes into account the structure of multidimensional representation of information in the considered data storage systems of information and analytical systems. Scientific novelty: the developed method of parametric synthesis of crypto-code structures for monitoring and restoring the integrity of information in secure multidimensional data storage systems differs from the known ones by obtaining optimal crypto-code structures due to the rational aggregation of cryptographic and code transformations in the parameter space of the considered data storage systems. Crypto-code structures formed on the basis of building multidimensional hash codes and performing transformations in extended Galois fields provide cryptographic control and restoration of information integrity with the possibility of flexible introduction of redundancy and confirmation with cryptographic reliability of information integrity after the restoration procedure","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114456767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2022-3-2-22
Alexei Petrenko, S. Petrenko
Abstract Purpose of work is the development of a new method for estimating the quantum resilience of modern blockchain platforms based on the effective solution of cryptanalysis problems for asymmetric encryption schemes (RSA, El-Gamal) and digital signature (DSA, ECDSA or RSA-PSS), based on computationally difficult problems of factorization and discrete logarithm. Research method is the use of quantum algorithms providing exponential gain (eg Shor’s algorithm) and quadratic gain (eg Grover’s algorithm). Due to the fact that the class of problems solved by quantum algorithms in polynomial time cannot yet be significantly expanded, more attention is paid to cryptanalysis based on the quantum Shor algorithm and other polynomial algorithms. Results of the study include a classification of well-known algorithms and software packages for cryptanalysis of asymmetric encryption schemes (RSA, El-Gamal) and digital signature (DSA, ECDSA or RSA-PSS) based on computationally difficult problems of factorization and discrete logarithm has been built. A promising method for solving problems of cryptanalysis of asymmetric encryption schemes (RSA, ElGamal) and digital signature (DSA, ECDSA or RSA-PSS) of known blockchain platforms in polynomial time in a quantum computing model is proposed. Algorithms for solving problems of quantum cryptanalysis of two-key cryptography schemes of known blockchain platforms in polynomial time are developed, taking into account the security of the discrete algorithm (DLP) and the discrete elliptic curve algorithm (ECDLP). A structural and functional diagram of the software package for quantum cryptanalysis of modern blockchain platforms “Kvant-K”, adapted to work in a hybrid computing environment of the IBM Q quantum computer (20 and 100 qubits) and the IBM BladeCenter (2022) supercomputer, has been designed. A methodology has been developed for using the “Kvant-K” software package to assess the quantum stability of blockchain platforms: InnoChain (Innopolis University), Waves Enterprise (Waves, Vostok), Hyperledger Fabric (Linux, IBM), Corda Enterprise, Bitfury Exonum, Blockchain Industrial Alliance, Exonum (Bitfury CIS), NodesPlus (b41), Masterchain (Sberbank), Microsoft Azure Blockchain, Enterprise Ethereum Alliance, etc. Practical relevance: The developed new solution for computationally difficult problems of factorization and discrete logarithm, given over finite commutative (and non-commutative) associative algebras, in a quantum model of computing in polynomial time. It is essential that the obtained scientific results formed the basis for the development of the corresponding software and hardware complex “Kvant-K”, which was tested in a hybrid computing environment (quantum computer IBM Q (20 and 100 qubits) and/or 5th generation supercomputer: IBM BladeCenter (2022), RCS based on FPGA Virtex UltraScale (2020), RFNC-VNIIEF (2022) and SKIF P-0.5 (2021). An appropriate method for estimating the quantum stability of these b
{"title":"Quantum Resilience Estimation Method Blockchain","authors":"Alexei Petrenko, S. Petrenko","doi":"10.21681/2311-3456-2022-3-2-22","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-3-2-22","url":null,"abstract":"Abstract Purpose of work is the development of a new method for estimating the quantum resilience of modern blockchain platforms based on the effective solution of cryptanalysis problems for asymmetric encryption schemes (RSA, El-Gamal) and digital signature (DSA, ECDSA or RSA-PSS), based on computationally difficult problems of factorization and discrete logarithm. Research method is the use of quantum algorithms providing exponential gain (eg Shor’s algorithm) and quadratic gain (eg Grover’s algorithm). Due to the fact that the class of problems solved by quantum algorithms in polynomial time cannot yet be significantly expanded, more attention is paid to cryptanalysis based on the quantum Shor algorithm and other polynomial algorithms. Results of the study include a classification of well-known algorithms and software packages for cryptanalysis of asymmetric encryption schemes (RSA, El-Gamal) and digital signature (DSA, ECDSA or RSA-PSS) based on computationally difficult problems of factorization and discrete logarithm has been built. A promising method for solving problems of cryptanalysis of asymmetric encryption schemes (RSA, ElGamal) and digital signature (DSA, ECDSA or RSA-PSS) of known blockchain platforms in polynomial time in a quantum computing model is proposed. Algorithms for solving problems of quantum cryptanalysis of two-key cryptography schemes of known blockchain platforms in polynomial time are developed, taking into account the security of the discrete algorithm (DLP) and the discrete elliptic curve algorithm (ECDLP). A structural and functional diagram of the software package for quantum cryptanalysis of modern blockchain platforms “Kvant-K”, adapted to work in a hybrid computing environment of the IBM Q quantum computer (20 and 100 qubits) and the IBM BladeCenter (2022) supercomputer, has been designed. A methodology has been developed for using the “Kvant-K” software package to assess the quantum stability of blockchain platforms: InnoChain (Innopolis University), Waves Enterprise (Waves, Vostok), Hyperledger Fabric (Linux, IBM), Corda Enterprise, Bitfury Exonum, Blockchain Industrial Alliance, Exonum (Bitfury CIS), NodesPlus (b41), Masterchain (Sberbank), Microsoft Azure Blockchain, Enterprise Ethereum Alliance, etc. Practical relevance: The developed new solution for computationally difficult problems of factorization and discrete logarithm, given over finite commutative (and non-commutative) associative algebras, in a quantum model of computing in polynomial time. It is essential that the obtained scientific results formed the basis for the development of the corresponding software and hardware complex “Kvant-K”, which was tested in a hybrid computing environment (quantum computer IBM Q (20 and 100 qubits) and/or 5th generation supercomputer: IBM BladeCenter (2022), RCS based on FPGA Virtex UltraScale (2020), RFNC-VNIIEF (2022) and SKIF P-0.5 (2021). An appropriate method for estimating the quantum stability of these b","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120964237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2019-5-57-62
R. Astrakhantsev, Alexey Los, R. Muhamadieva
{"title":"Analysis of Modern Tendencies of Development of the Technology «Blockchain» and Digital Currencies","authors":"R. Astrakhantsev, Alexey Los, R. Muhamadieva","doi":"10.21681/2311-3456-2019-5-57-62","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-5-57-62","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126615167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2022-1-76-86
P. Zakalkin
The purpose of the study: to identify the main systems that control cyberspace and the key elements whose management will allow controlling a given segment of cyberspace. Research method: theory of complex systems; synergetic. Result: The paper considers the main control systems that play a key role in the management of cyberspace, highlights the structural elements of cyberspace and their interrelations with each other. Regional and local Internet registrars are considered, their coherence graph is presented, as well as the coherence graph by country. Based on the study, the author’s vision of the organizational structure of the cyberspace management system (in relation to domain names and IP addresses). Autonomous systems and traffic exchange points are considered, the structure of external connectivity of autonomous systems and its change over time are given on examples. The largest telecommunication alliances are presented, which have an impact on the activities of telecom operators (directly or indirectly) and, as a result, on the set of resources and services (as well as their cost) received by end users provided by telecommunication operators. Scientific novelty: the considered structure of the cyberspace management system made it possible to identify the main systems that control cyberspace and the key elements whose management will allow controlling a given segment of cyberspace.
{"title":"EVOLUTION OF CYBERSPACE MANAGEMENT SYSTEMS","authors":"P. Zakalkin","doi":"10.21681/2311-3456-2022-1-76-86","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-1-76-86","url":null,"abstract":"The purpose of the study: to identify the main systems that control cyberspace and the key elements whose management will allow controlling a given segment of cyberspace. Research method: theory of complex systems; synergetic. Result: The paper considers the main control systems that play a key role in the management of cyberspace, highlights the structural elements of cyberspace and their interrelations with each other. Regional and local Internet registrars are considered, their coherence graph is presented, as well as the coherence graph by country. Based on the study, the author’s vision of the organizational structure of the cyberspace management system (in relation to domain names and IP addresses). Autonomous systems and traffic exchange points are considered, the structure of external connectivity of autonomous systems and its change over time are given on examples. The largest telecommunication alliances are presented, which have an impact on the activities of telecom operators (directly or indirectly) and, as a result, on the set of resources and services (as well as their cost) received by end users provided by telecommunication operators. Scientific novelty: the considered structure of the cyberspace management system made it possible to identify the main systems that control cyberspace and the key elements whose management will allow controlling a given segment of cyberspace.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"11 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129190205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2019-4-22-34
Dmitry Bikonov, A. Puzikov, A. Sivtsov, L. Eisymont
{"title":"Three-Level Parallel Programming System for the Hybrid 21-Core Scalar-Vector Microprocessor NM6408MP","authors":"Dmitry Bikonov, A. Puzikov, A. Sivtsov, L. Eisymont","doi":"10.21681/2311-3456-2019-4-22-34","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-4-22-34","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"325 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128456097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2023-1-2-12
A. Markov
{"title":"Major milestone in open source security","authors":"A. Markov","doi":"10.21681/2311-3456-2023-1-2-12","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-1-2-12","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116661658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2021-1-80-89
S. Petrenko
Purpose of the article: development of tools for building a cyber-stable private cloud. The relevance of building a cyber-resilient private cloud is confirmed by the dynamics of growth in the market volume of relevant solutions. According to PRnewswire, the market for private cloud solutions will reach 183 billion USD by 2025. At the same time, the average annual growth rate of the CAGR will be 29.4% during the forecast period. According to the analytical company Grand view research, the global market for private cloud solutions in 2018 was estimated at 30.24 billion US dollars, and it is expected that in the period from 2019 to 2025, the CAGR will be 29.6%. Research methods: It uses a set of open-source solutions that applies the advanced cloud technologies, including distributed data processing models and methods, container orchestration technologies, softwaredefined data storage architecture, and a universal database. Results: Developed tools for building a cyber-stable private cloud. Considered a possible approach to building a cyber-resilient private cloud based on the well-known and proprietary models and methods of the artificial immune systems (AIS), as well as technologies for distributed data processing, container orchestration, and others. In addition, the unique centralized fault-tolerant logging and monitoring subsystem has been developed for the described platform, as well as an innovative cybersecurity subsystem based on the following original technologies.
{"title":"Self-Healing Cloud Computing","authors":"S. Petrenko","doi":"10.21681/2311-3456-2021-1-80-89","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-1-80-89","url":null,"abstract":"Purpose of the article: development of tools for building a cyber-stable private cloud. The relevance of building a cyber-resilient private cloud is confirmed by the dynamics of growth in the market volume of relevant solutions. According to PRnewswire, the market for private cloud solutions will reach 183 billion USD by 2025. At the same time, the average annual growth rate of the CAGR will be 29.4% during the forecast period. According to the analytical company Grand view research, the global market for private cloud solutions in 2018 was estimated at 30.24 billion US dollars, and it is expected that in the period from 2019 to 2025, the CAGR will be 29.6%. Research methods: It uses a set of open-source solutions that applies the advanced cloud technologies, including distributed data processing models and methods, container orchestration technologies, softwaredefined data storage architecture, and a universal database. Results: Developed tools for building a cyber-stable private cloud. Considered a possible approach to building a cyber-resilient private cloud based on the well-known and proprietary models and methods of the artificial immune systems (AIS), as well as technologies for distributed data processing, container orchestration, and others. In addition, the unique centralized fault-tolerant logging and monitoring subsystem has been developed for the described platform, as well as an innovative cybersecurity subsystem based on the following original technologies.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126886244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2023-1-82-92
O. Atakishchev, V. Gribunin, Igor Borisenkov, Mikhail Lysachev
The purpose of the work is to analyze the features of the application of the integrated metagrammar approach of hierarchy analysis to solve the problem of structural-parametric synthesis of information security systems of automated control systems of low-power nuclear power plants.Research method: in order to achieve the goal of the work, the metagrammar approach of hierarchy analysis was used, which is an integration of the metagrammar approach and the Saati hierarchy analysis method.The result of the research: the metagrammar approach of hierarchy analysis is presented in the paper, the features of its application to solve the problem of structural-parametric synthesis of information security systems of automated control systems of low-power nuclear power plants are considered in detail.The scientific novelty lies in the development and analysis of the scientific and applied features of a new integrated metagrammar approach to hierarchy analysis, which allows the synthesis of complex structured information security systems in conditions of partial uncertainty.
{"title":"Metagrammatic Approach to the Analysis of Hierarchies for Synthesis of Security Systems nuclear Power Plants","authors":"O. Atakishchev, V. Gribunin, Igor Borisenkov, Mikhail Lysachev","doi":"10.21681/2311-3456-2023-1-82-92","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-1-82-92","url":null,"abstract":"The purpose of the work is to analyze the features of the application of the integrated metagrammar approach of hierarchy analysis to solve the problem of structural-parametric synthesis of information security systems of automated control systems of low-power nuclear power plants.Research method: in order to achieve the goal of the work, the metagrammar approach of hierarchy analysis was used, which is an integration of the metagrammar approach and the Saati hierarchy analysis method.The result of the research: the metagrammar approach of hierarchy analysis is presented in the paper, the features of its application to solve the problem of structural-parametric synthesis of information security systems of automated control systems of low-power nuclear power plants are considered in detail.The scientific novelty lies in the development and analysis of the scientific and applied features of a new integrated metagrammar approach to hierarchy analysis, which allows the synthesis of complex structured information security systems in conditions of partial uncertainty.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"31 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120984522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}