INVESTIGATION OF CHANGES IN THE LEVEL OF NETWORK SECURITY BASED ON A COGNITIVE APPROACH
Olha Saliieva
Vinnytsia National Technical University, Department of Management and Security of Information Systems (Ukraine)
https://orcid.org/0000-0003-2388-7321
Yurii Yaremchuk
yurevyar@gmail.comVinnytsia National Technical University, Department of Management and Security of Information Systems (Ukraine)
https://orcid.org/0000-0002-6303-7703
Abstract
A study was conducted on the impact of the most significant threats on the level of network security based on the examination of impulse processes on a fuzzy cognitive map. A topological analysis of the structure of the cognitive map was performed, simplicial complexes were constructed, and their structural vectors were determined. Based on the obtained data, a set of control and target concepts of the fuzzy cognitive map was formed, and the relationships between these concepts within the simplicial complexes were established. Taking this information into account, a study was conducted on the change in the level of computer network security using the propagation of impulses introduced into the control concepts of the fuzzy cognitive map. The results obtained enable an increase in the level of network security by considering the impact of the most significant threats through timely managerial decisions and the implementation of necessary software and technical measures.
Keywords:
threats, network security, computer network, cognitive model, simplicial analysis, impulse processReferences
[1] Apenko N. et al.: Information security of the computer system and network from internal and external attacks. 17th International scientific and practical conference "System analysis and intelligent systems for management". Turkey, Ankara, 2023, 431–434.
Google Scholar
[2] Atkin R. H.: Combinatorial Connectivies in Social Systems: An Application of Simplicial Complex Structures to the Study of Large Organisations. Birkhäuser, Basel 1977.
Google Scholar
[3] Hindy H. et al.: A taxonomy of network threats and the effect of current datasets on intrusion detection systems. IEEE Access 8, 2020, 104650–104675 [https://doi.org/10.1109/ACCESS.2020.3000179].
Google Scholar
[4] Nahornyi O. V., Zhyrova T. O., Nahornyi V. V.: Problems of information security in computer systems and means and methods of their solution. II International Scientific and Practical Conference. USA, Chicago, 2023, 171–180.
Google Scholar
[5] Roberts F. S.: Discrete Mathematical Models with Applications to Social, Biological, and Environmental Problems. Rutgers University, Prentice-Hall Inc., New Jersey 1976.
Google Scholar
[6] Saliieva O. V., Yaremchuk Yu. Ye.: Investigation of the reliability of the impact of threats on the level of security of a computer network, determined by scenario modeling based on a cognitive approach. Visnyk of Vinnytsia Politechnical Institute 4, 2020, 98–104 [https://doi.org/10.31649/1997-9266-2020-151-4-98-104].
Google Scholar
[7] Saliieva O. V., Yaremchuk Yu. Ye.: Development of a cognitive model for analyzing the impact of threats on the level of security of a computer network. Data Recording, Storage & Processing 21(4), 2019, 28–39 [https://doi.org/10.35681/1560-9189.2019.21.4.199268].
Google Scholar
[8] Wang B. et al.: A deep hierarchical network for packet-level malicious traffic detection. IEEE Access 8, 2020, 201728–201740 [https://doi.org/10.1109/ACCESS.2020.3035967].
Google Scholar
[9] Zang X. et al.: Attack scenario reconstruction via fusing heterogeneous threat intelligence. Computers & Security 133(20), 2023 [https://doi.org/10.1016/j.cose.2023.103420].
Google Scholar
[10] Zhong Y., Chen L.: Research on the application of improved V-detector algorithm in network intrusion detection. Applied Mathematics and Nonlinear Sciences 9(1), 2024, 1–14 [https://doi.org/10.2478/amns.2023.2.00526].
Google Scholar
[11] Zimba A. et al.: Modeling and detection of the multi-stages of Advanced Persistent Threats attacks based on semi-supervised learning and complex networks characteristics. Future Generation Computer Systems 106, 2020, 501–517 [https://doi.org/10.1016/j.future.2020.01.032].
Google Scholar
Authors
Olha SaliievaVinnytsia National Technical University, Department of Management and Security of Information Systems Ukraine
https://orcid.org/0000-0003-2388-7321
Authors
Yurii Yaremchukyurevyar@gmail.com
Vinnytsia National Technical University, Department of Management and Security of Information Systems Ukraine
https://orcid.org/0000-0002-6303-7703
Statistics
Abstract views: 8PDF downloads: 5
Most read articles by the same author(s)
- Dmytro Yevgrafov, Yurii Yaremchuk, ASYMPTOTICALLY OPTIMAL ALGORITHM FOR PROCESSING SIDE RADIATION SIGNALS FROM MONITOR SCREENS ON LIQUID CRYSTAL STRUCTURES , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Vol. 13 No. 4 (2023)
- Dmytro Yevgrafov, Yurii Yaremchuk, QUALITY INDICATORS OF DETECTION OF SIDE RADIATION SIGNALS FROM MONITOR SCREENS BY A SPECIALIZED TECHNICAL MEANS OF ENEMY INTELLIGENCE , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Vol. 14 No. 1 (2024)
- Dmytro Yevgrafov, Yurii Yaremchuk, MODELS OF FALSE AND CORRECT DETECTION OF INFORMATION LEAKAGE SIGNALS FROM MONITOR SCREENS BY A SPECIALIZED TECHNICAL MEANS OF ENEMY INTELLIGENCE , Informatyka, Automatyka, Pomiary w Gospodarce i Ochronie Środowiska: Vol. 14 No. 3 (2024)