社会网络物理系统 "多轮廓安全方法的开发

Q3 Mathematics
S. Milevskyi, O. Korol, G. Mykytyn, Iryna Lozova, Svetlana Solnyshkova, I. Husarova, Alla Hrebeniuk, A. Vlasov, V. Sukhoteplyi, Dmytro Balagura
{"title":"社会网络物理系统 \"多轮廓安全方法的开发","authors":"S. Milevskyi, O. Korol, G. Mykytyn, Iryna Lozova, Svetlana Solnyshkova, I. Husarova, Alla Hrebeniuk, A. Vlasov, V. Sukhoteplyi, Dmytro Balagura","doi":"10.15587/1729-4061.2024.298844","DOIUrl":null,"url":null,"abstract":"The constant increase in the number of threats to the security of critical infrastructure objects, which include socio-cyberphysical systems, leads to a decrease in the quality of security services and the level of security of infrastructure elements. The object of research is the process of building a complex system of protection in socio-cyberphysical systems. The imperfection of the mechanisms for ensuring the security of critical infrastructure objects, which include socio-cyberphysical systems, the technological complexity of identifying new security threats necessitates an urgent need for a radical revision of the current approaches to its provision. So, it becomes clear that the development of a new approach to ensuring the security of information resources in socio-cyberphysical systems is needed. The article proposes a new approach to the methodological foundations of building multi-contour information protection systems with internal and external circuits on each of the platforms of socio-cyberphysical systems. This approach is based on a universal classifier of threats, which takes into account not the technical aspect of threats, but also their integration with social engineering methods, their synergy of hybridity. The sociopolitical influence on the realization of threats is taken into account, and practical mechanisms for providing basic security services based on post-quantum algorithms are also proposed. To provide basic security services in the proposed multi-contour protection system, it is proposed to use post-quantum algorithms – McEliece crypto-code constructions, which provide Perr=10-9–10-12, safe time Tsec=1025–1035 group operations. Within the framework of the proposed approach, the problem of increasing the level of information security has been formalized and further ways of solving it have been determined","PeriodicalId":11433,"journal":{"name":"Eastern-European Journal of Enterprise Technologies","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Development of the sociocyberphysical systems` multi-contour security methodology\",\"authors\":\"S. Milevskyi, O. Korol, G. Mykytyn, Iryna Lozova, Svetlana Solnyshkova, I. Husarova, Alla Hrebeniuk, A. Vlasov, V. Sukhoteplyi, Dmytro Balagura\",\"doi\":\"10.15587/1729-4061.2024.298844\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The constant increase in the number of threats to the security of critical infrastructure objects, which include socio-cyberphysical systems, leads to a decrease in the quality of security services and the level of security of infrastructure elements. The object of research is the process of building a complex system of protection in socio-cyberphysical systems. The imperfection of the mechanisms for ensuring the security of critical infrastructure objects, which include socio-cyberphysical systems, the technological complexity of identifying new security threats necessitates an urgent need for a radical revision of the current approaches to its provision. So, it becomes clear that the development of a new approach to ensuring the security of information resources in socio-cyberphysical systems is needed. The article proposes a new approach to the methodological foundations of building multi-contour information protection systems with internal and external circuits on each of the platforms of socio-cyberphysical systems. This approach is based on a universal classifier of threats, which takes into account not the technical aspect of threats, but also their integration with social engineering methods, their synergy of hybridity. The sociopolitical influence on the realization of threats is taken into account, and practical mechanisms for providing basic security services based on post-quantum algorithms are also proposed. To provide basic security services in the proposed multi-contour protection system, it is proposed to use post-quantum algorithms – McEliece crypto-code constructions, which provide Perr=10-9–10-12, safe time Tsec=1025–1035 group operations. Within the framework of the proposed approach, the problem of increasing the level of information security has been formalized and further ways of solving it have been determined\",\"PeriodicalId\":11433,\"journal\":{\"name\":\"Eastern-European Journal of Enterprise Technologies\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-02-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Eastern-European Journal of Enterprise Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.15587/1729-4061.2024.298844\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"Mathematics\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Eastern-European Journal of Enterprise Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.15587/1729-4061.2024.298844","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Mathematics","Score":null,"Total":0}
引用次数: 0

摘要

关键基础设施(包括社会-网络物理系统)的安全威胁不断增加,导致安全服务质量和基础设施要素的安全水平下降。研究对象是在社会-网络物理系统中建立复杂保护系统的过程。确保关键基础设施(包括社会-网络物理系统)安全的机制不完善,确定新安全威胁的技术复杂,因此迫切需要对当前提供安全服务的方法进行彻底修改。因此,显然需要开发一种新方法来确保社会-网络物理系统中信息资源的安全。本文提出了一种新方法,为在社会-网络物理系统的每个平台上建立具有内部和外部电路的多轮廓信息保护系统奠定方法论基础。这种方法以威胁的通用分类器为基础,它不仅考虑到威胁的技术方面,还考虑到威胁与社会工程学方法的结合及其混合协同作用。考虑到了社会政治对威胁实现的影响,还提出了基于后量子算法提供基本安全服务的实用机制。为了在拟议的多轮廓保护系统中提供基本安全服务,建议使用后量子算法--McEliece 加密代码结构,它提供 Perr=10-9-10-12, 安全时间 Tsec=1025-1035 的分组操作。在所提方法的框架内,提高信息安全水平的问题已经形式化,并确定了进一步的解决方法
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Development of the sociocyberphysical systems` multi-contour security methodology
The constant increase in the number of threats to the security of critical infrastructure objects, which include socio-cyberphysical systems, leads to a decrease in the quality of security services and the level of security of infrastructure elements. The object of research is the process of building a complex system of protection in socio-cyberphysical systems. The imperfection of the mechanisms for ensuring the security of critical infrastructure objects, which include socio-cyberphysical systems, the technological complexity of identifying new security threats necessitates an urgent need for a radical revision of the current approaches to its provision. So, it becomes clear that the development of a new approach to ensuring the security of information resources in socio-cyberphysical systems is needed. The article proposes a new approach to the methodological foundations of building multi-contour information protection systems with internal and external circuits on each of the platforms of socio-cyberphysical systems. This approach is based on a universal classifier of threats, which takes into account not the technical aspect of threats, but also their integration with social engineering methods, their synergy of hybridity. The sociopolitical influence on the realization of threats is taken into account, and practical mechanisms for providing basic security services based on post-quantum algorithms are also proposed. To provide basic security services in the proposed multi-contour protection system, it is proposed to use post-quantum algorithms – McEliece crypto-code constructions, which provide Perr=10-9–10-12, safe time Tsec=1025–1035 group operations. Within the framework of the proposed approach, the problem of increasing the level of information security has been formalized and further ways of solving it have been determined
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
Eastern-European Journal of Enterprise Technologies
Eastern-European Journal of Enterprise Technologies Mathematics-Applied Mathematics
CiteScore
2.00
自引率
0.00%
发文量
369
审稿时长
6 weeks
期刊介绍: Terminology used in the title of the "East European Journal of Enterprise Technologies" - "enterprise technologies" should be read as "industrial technologies". "Eastern-European Journal of Enterprise Technologies" publishes all those best ideas from the science, which can be introduced in the industry. Since, obtaining the high-quality, competitive industrial products is based on introducing high technologies from various independent spheres of scientific researches, but united by a common end result - a finished high-technology product. Among these scientific spheres, there are engineering, power engineering and energy saving, technologies of inorganic and organic substances and materials science, information technologies and control systems. Publishing scientific papers in these directions are the main development "vectors" of the "Eastern-European Journal of Enterprise Technologies". Since, these are those directions of scientific researches, the results of which can be directly used in modern industrial production: space and aircraft industry, instrument-making industry, mechanical engineering, power engineering, chemical industry and metallurgy.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信