The Methodology for Determining the Most Critical Nodes of the Information Network Infrastructures in Order to Ensure Cybersecurity

Q4 Materials Science
A. Kozlov, N. Noga
{"title":"The Methodology for Determining the Most Critical Nodes of the Information Network Infrastructures in Order to Ensure Cybersecurity","authors":"A. Kozlov, N. Noga","doi":"10.17587/it.29.296-306","DOIUrl":null,"url":null,"abstract":"Based on the conducted research of the influence of various parameters on the values of information and cybersecurity risks in the functioning of enterprises and organizations that widely use elements of the digital economy and have a network structure, the need for timely identification of critical nodes in the network structures used has been established. The authors propose the methodology for determining the most critical nodes of network information infrastructures to ensure their operability and the necessary level of cybersecurity. The methodology bases on the combined use of fuzzy logic, regression analysis and ranking methods in the context of the dependence of information and cybersecurity risk on many different parameters. The authors propose to solve the problem of determining the most critical nodes of network information infrastructures in two stages. At the first stage, the methods of fuzzy logic and regression analysis determine the set of parameters that most affect the value of the cybersecurity risk for the considerate network nodes. At the second stage, we identify the most critical nodes by the method of ranking nodes according to the parameters determined at the first stage. The use of the proposed methodology makes it possible to identify the most critical nodes of the network infrastructure in a timely manner, to plan the set of measures to maintain it at the required level of operability, as well as minimize possible damage and consequences from the implementation of existing threats.","PeriodicalId":37476,"journal":{"name":"Radioelektronika, Nanosistemy, Informacionnye Tehnologii","volume":"5 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Radioelektronika, Nanosistemy, Informacionnye Tehnologii","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.17587/it.29.296-306","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Materials Science","Score":null,"Total":0}
引用次数: 0

Abstract

Based on the conducted research of the influence of various parameters on the values of information and cybersecurity risks in the functioning of enterprises and organizations that widely use elements of the digital economy and have a network structure, the need for timely identification of critical nodes in the network structures used has been established. The authors propose the methodology for determining the most critical nodes of network information infrastructures to ensure their operability and the necessary level of cybersecurity. The methodology bases on the combined use of fuzzy logic, regression analysis and ranking methods in the context of the dependence of information and cybersecurity risk on many different parameters. The authors propose to solve the problem of determining the most critical nodes of network information infrastructures in two stages. At the first stage, the methods of fuzzy logic and regression analysis determine the set of parameters that most affect the value of the cybersecurity risk for the considerate network nodes. At the second stage, we identify the most critical nodes by the method of ranking nodes according to the parameters determined at the first stage. The use of the proposed methodology makes it possible to identify the most critical nodes of the network infrastructure in a timely manner, to plan the set of measures to maintain it at the required level of operability, as well as minimize possible damage and consequences from the implementation of existing threats.
确定信息网络基础设施最关键节点以确保网络安全的方法
通过对广泛使用数字经济要素并具有网络结构的企业和组织在运行过程中各种参数对信息价值和网络安全风险影响的研究,确定了及时识别所使用的网络结构中的关键节点的必要性。作者提出了确定网络信息基础设施最关键节点的方法,以确保其可操作性和必要的网络安全水平。该方法在信息和网络安全风险依赖于许多不同参数的背景下,结合使用模糊逻辑、回归分析和排序方法。本文提出分两个阶段解决网络信息基础设施最关键节点的确定问题。在第一阶段,采用模糊逻辑和回归分析的方法,确定对考虑网络节点的网络安全风险值影响最大的参数集。在第二阶段,我们根据第一阶段确定的参数,采用节点排序的方法来识别最关键的节点。使用拟议的方法可以及时确定网络基础设施的最关键节点,规划一套措施,使其保持所需的可操作性水平,并尽量减少实施现有威胁可能造成的损害和后果。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Radioelektronika, Nanosistemy, Informacionnye Tehnologii
Radioelektronika, Nanosistemy, Informacionnye Tehnologii Materials Science-Materials Science (miscellaneous)
CiteScore
0.60
自引率
0.00%
发文量
38
期刊介绍: Journal “Radioelectronics. Nanosystems. Information Technologies” (abbr RENSIT) publishes original articles, reviews and brief reports, not previously published, on topical problems in radioelectronics (including biomedical) and fundamentals of information, nano- and biotechnologies and adjacent areas of physics and mathematics. The authors of the journal are academicians, corresponding members and foreign members of the Russian Academy of Natural Sciences (RANS) and their colleagues, as well as other russian and foreign authors on the proposal of the members of RANS, which can be obtained by the author before sending articles to the editor or after its arrival on the recommendation of a member of the editorial board or another member of the RANS, who gave the opinion on the article at the request of the editior. The editors will accept articles in both Russian and English languages. Articles are internally peer reviewed (double-blind peer review) by members of the Editorial Board. Some articles undergo external review, if necessary. Designed for researchers, graduate students, physics students of senior courses and teachers. It turns out 2 times a year (that includes 2 rooms)
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信