Methods for assessing the connectivity of an undirected bipolar labeled graph taking into account the destructive impact of external threats on its vertices

V. Voevodin, N. A. Krahotin
{"title":"Methods for assessing the connectivity of an undirected bipolar labeled graph taking into account the destructive impact of external threats on its vertices","authors":"V. Voevodin, N. A. Krahotin","doi":"10.21822/2073-6185-2024-51-1-46-60","DOIUrl":null,"url":null,"abstract":"Objective. The main arguments that position the problem of assessing the connectivity of the bipolar graph in relation to the conditions of destructive impact of external threats (threats) as relevant for assessing the vitality of information systems (IS) are discussed operating under conditions of information security threats.Method. The following are presented: formulation of the problem of assessing connectivity for conditions of exposure to threats; a brief overview of existing methods for structural modeling of bipolar structures; results of the analysis of the applicability of existing methods for assessing the stability of functioning (stability) of bipolar structures in relation to conditions of exposure to threats. The initial conditions are accepted: the stability of the information system as a whole depends deterministically on the stability of its structural elements and the network structure itself; the problem of assessing the connectivity of a two-pole structure is basic for assessing the connectivity of the corresponding multi-pole structures; the stability analysis of the impacted object is carried out using minimax criteria, and the result is presented in the form of the minimum value of the stability function and the moment in time of the occurrence of this event.Result. Limiting factors that prevent the use of existing methods to solve the problem have been identified. The main limiting factor is that existing methods are based on probabilistic stationary models that require representative statistics. The second, no less important limiting factor is that the situation characterizing the impact of threats is very dynamic (not stationary), the events themselves are very rare, and the assessment period is comparable to the period of response to threats, which does not allow obtaining effective assessments of sustainability. It is proposed to: generalize existing methods for conditions of non-stationary functioning process, for which, when assessing, take into account changes in the probabilistic characteristics of nodal elements over time; as an indicator characterizing connectivity, use the minimum value of the stability function determined during the period of exposure to threats. The price to pay for ensuring the sustainability of the functioning of the affected object under the influence of threats is the need to ensure structural redundancy.Conclusion. The results of the study can be used by persons who simulate both the object of impact and the processes of its functioning, to make a decision on ensuring the continuity of production processes under the conditions of the impact of threats.","PeriodicalId":202454,"journal":{"name":"Herald of Dagestan State Technical University. Technical Sciences","volume":"3 2","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Herald of Dagestan State Technical University. Technical Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21822/2073-6185-2024-51-1-46-60","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Objective. The main arguments that position the problem of assessing the connectivity of the bipolar graph in relation to the conditions of destructive impact of external threats (threats) as relevant for assessing the vitality of information systems (IS) are discussed operating under conditions of information security threats.Method. The following are presented: formulation of the problem of assessing connectivity for conditions of exposure to threats; a brief overview of existing methods for structural modeling of bipolar structures; results of the analysis of the applicability of existing methods for assessing the stability of functioning (stability) of bipolar structures in relation to conditions of exposure to threats. The initial conditions are accepted: the stability of the information system as a whole depends deterministically on the stability of its structural elements and the network structure itself; the problem of assessing the connectivity of a two-pole structure is basic for assessing the connectivity of the corresponding multi-pole structures; the stability analysis of the impacted object is carried out using minimax criteria, and the result is presented in the form of the minimum value of the stability function and the moment in time of the occurrence of this event.Result. Limiting factors that prevent the use of existing methods to solve the problem have been identified. The main limiting factor is that existing methods are based on probabilistic stationary models that require representative statistics. The second, no less important limiting factor is that the situation characterizing the impact of threats is very dynamic (not stationary), the events themselves are very rare, and the assessment period is comparable to the period of response to threats, which does not allow obtaining effective assessments of sustainability. It is proposed to: generalize existing methods for conditions of non-stationary functioning process, for which, when assessing, take into account changes in the probabilistic characteristics of nodal elements over time; as an indicator characterizing connectivity, use the minimum value of the stability function determined during the period of exposure to threats. The price to pay for ensuring the sustainability of the functioning of the affected object under the influence of threats is the need to ensure structural redundancy.Conclusion. The results of the study can be used by persons who simulate both the object of impact and the processes of its functioning, to make a decision on ensuring the continuity of production processes under the conditions of the impact of threats.
考虑到外部威胁对顶点的破坏性影响,评估无向双极标记图的连通性的方法
目的。讨论了在信息安全威胁条件下评估双极图的连通性与外部威胁(威胁)的破坏性影响条件之间的关系,以及评估信息系统(IS)活力的相关问题的主要论据。本文介绍了以下内容:在面临威胁的条件下评估连通性问题的表述;现有双极结构建模方法的简要概述;现有方法在面临威胁的条件下评估双极结构运行稳定性(稳定性)的适用性分析结果。接受的初始条件是:信息系统整体的稳定性决定性地取决于其结构元素和网络结构本身的稳定性;评估两极结构的连通性问题是评估相应多极结构连通性的基础;采用最小值标准对受影响对象进行稳定性分析,结果以稳定性函数的最小值和该事件发生的时间点的形式呈现。已经确定了妨碍使用现有方法解决问题的限制因素。主要限制因素是现有方法基于概率静态模型,需要有代表性的统计数据。第二个同样重要的限制因素是,表征威胁影响的情况是非常动态的(而不是静态的),事件本身非常罕见,评估期与对威胁的反应期相当,因此无法对可持续性进行有效评估。建议:将现有方法推广到非稳态运行过程的条件下,在评估时考虑节点要素的概率特征随时间的变化;作为表征连通性的指标,使用在受到威胁期间确定的稳定性函数的最小值。在威胁影响下,为确保受影响物体功能的可持续性而付出的代价是需要确保结构冗余。研究结果可供模拟受影响对象及其运行过程的人员使用,以便就如何确保生产过程在威胁影响条件下的连续性做出决策。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信