Kuzmenko L. Methods and models for creating the advanced guaranteed automated systems for managing critical infrastructure

Українська версія

Thesis for the degree of Candidate of Sciences (CSc)

State registration number

0421U100511

Applicant for

Specialization

  • 05.13.06 - Інформаційні технології

11-03-2021

Specialized Academic Board

Д 26.255.01

Institute of telecommunications and global information space of National Academy of Sciences of Ukraine

Essay

The dissertation is devoted to the solution of the actual scientific problem, which consists in theoretical and applied bases of construction of information technology for creation of perspective guaranteeable (GHG) automated control systems (ACS) of objects of critical infrastructure (CIF), and also definition of influence on processes of functioning of such systems and man-made interventions and threats. The paper develops new and improved existing models, procedures and algorithms that form the basis for two methods - the method of forming a typical construction option and the method of determining the impact of threats on the operation of GHG ACS CIF. In the course of work on them, the procedures for selecting a prototype of network infrastructure topology (MI), selection of a typical automated workstation (AWP) of rational configuration and rational choice of software, as well as a semantic model of confrontation of ACS protection system were developed. CIF with the attacking side, models for assessing the state of protection of the system from threats of integrity, confidentiality and availability and the algorithm for detecting and recovering data in the GHG ACS CIF. The simulation experiments on the comparative evaluation and selection of the prototype of the MI topology, the configuration of the workstation and the software of the GHG ACS of the CIF of the applied level are carried out. The possibilities of application of cluster analysis for parallelization of processes of search of vulnerabilities or true values of keys used for data encryption, and also estimation of stability of cryptosystems from external cybernetic influence and cryptocurrencies are investigated in the work. A comprehensive solution in the dissertation research is information technology to create promising guaranteed ACS CIF, the implementation of which, in contrast to existing: allows you to assess events that may affect the information and technological processes on the CIF and cause damage to both owners and users; provides guaranteed provision to subscribers of necessary services and / or services, which in the given modes and conditions of application, taking into account the state of protection of such systems from threats of violation of integrity, confidentiality and availability, may be reasonably trusted. The implementation of this IT also contributes to: increase, due to the prompt identification of the set of possible most significant threats, the effectiveness of the actions of persons responsible for ensuring the safety of GHG ACS CIF; reduction of time for making well-considered management decisions on the construction of GHG ACS CIF.

Files

Similar theses