APPLIED INFORMATICS MODEL ОF KINETICS ACCOUNTING OF CYBERNETIC THREATS IN NPP PHYSICAL PROTECTION SYSTEM
Науковий журнал «Радіоелектроніка, інформатика, управління»
Переглянути архів ІнформаціяПоле | Співвідношення | |
##plugins.schemas.marc.fields.042.name## |
dc |
|
##plugins.schemas.marc.fields.245.name## |
APPLIED INFORMATICS MODEL ОF KINETICS ACCOUNTING OF CYBERNETIC THREATS IN NPP PHYSICAL PROTECTION SYSTEM |
|
##plugins.schemas.marc.fields.720.name## |
Pogosov, A.Yu.; Odessa National Polytechnical University Derevianko, O.V.; Odessa National Polytechnical University |
|
##plugins.schemas.marc.fields.653.name## |
Аpplied computer science; information security; NPP physical security; mathematical simulation of cyber attacks on nuclear power facilities |
|
##plugins.schemas.marc.fields.520.name## |
<p>Context. The topical approaches to preventive estimations and mathematical modeling of cyber attacks processes and supply of external technological informational threats were considered, which may be directed on the physical security system of modern nuclear power plant units.</p><p>Objective – is an adaptation of known mathematical models of cyber attacks kinetics for use in the system of information security and physical protection of nuclear power plants to modern and foreseeable conditions.</p><p>Method. The method of model dependencies adaptation was proposed, which reflects the kinetics of cyberattacks to the modern operating conditions of protected nuclear facilities was proposed. To improve the model dependencies it was proposed to modify the classic Ferhulst function and, in mathematical modeling of cyber attacks on nuclear power facilities, to use the appropriate transformation of the logistic curve, which has distinctive feature of a well-defined maximum.</p><p>Results. It was predicted that the model dependence of flow external to NPP cyber threats can be characterized by the alternation of maxima and minima, which indicates the possibility of an oscillatory character of the developing process. Also was put forward and substantiated the hypothesis that the system of physical and, in particular, cybernetic, NPP protection can be characterized by a time lag that in view of possible oscillatory character of information threats admissions process creates the preconditions for the development of oscillatory instability.<br />The results obtained in the research are of applied nature, they can be used to carry out large-scale experiments and forecasting parameters of possible cyber threats aimed at the NPP for the purpose of pre-emption and preventive maintenance of information safety of modern nuclear energy technologies.</p><p>Conclusions. Recommended for use model dependences were first adapted to the conditions of operating conditions of nuclear powerfacilities, take into account the factors to counter threats and circumstances associated with a specific time delay.<br />It was shown for the first time that there is an opportunity both extreme and oscillatory dependence nature of the cyber attacks intensity, which are focused on software and hardware system of NPP information safety. The new approach allows to assume the reality of the unstable oscillation process in the “attack – defense” system and provides an opportunity of preventive assessment of the stability stocks.<br />The practical significance lies in the fact that the results allow to realistically assess the time of onset of expected cyber attacks current dependence changes and to use this knowledge for organizational and technical preparation of remedies and early anticipation of IT-threats.</p> |
|
##plugins.schemas.marc.fields.260.name## |
Zaporizhzhya National Technical University 2017-11-09 11:20:22 |
|
##plugins.schemas.marc.fields.856.name## |
application/pdf http://ric.zntu.edu.ua/article/view/112084 |
|
##plugins.schemas.marc.fields.786.name## |
Radio Electronics, Computer Science, Control; No 2 (2017): Radio Electronics, Computer Science, Control |
|
##plugins.schemas.marc.fields.546.name## |
ru |
|
##plugins.schemas.marc.fields.540.name## |
Copyright (c) 2017 A.Yu. Pogosov, O.V. Derevianko |
|