Application of the utility function in the identification and analysis of threats to the information security of objects of the critical information infrastructure of the Russian Federation
Abstract
An approach to ensuring the security of critical information infrastructure facilities is proposed, based on the identification and analysis of threats to information security violations, followed by the dynamic assignment of a category of significance to the OKII by predicting possible damage by assessing changes in the target function when a violation occurs. To do this, the damage minimization objective function is formalized as a hierarchical tree, where the root corresponds to a common goal, and the child vertices correspond to specific sub-goals and tasks. This representation allows you to take into account the impact of individual tasks when performing the objective function on the process of categorizing an object of critical infrastructure, with the possibility of dynamically recalculating the category in the event of a threat to information security. To predict possible deviations in achieving the target function, a utility function has been introduced to assess the cumulative effect of possible security breaches.
Full Text:
PDF (Russian)References
Roshanaei, M. (2021) Resilience at the Core: Critical Infrastructure Protection Challenges, Priorities and Cybersecurity Assessment Strategies. Journal of Computer and Communications, 9, 80-102. doi: 10.4236/jcc.2021.98006.
Rytov M. Y., Musienko N. O., Gubskov Yu. A., Minin Yu. V. Audit and monitoring of the state of informatization facilities in the process of designing integrated information security systems for significant critical information infrastructure facilities. Devices and Systems. Management, monitoring, diagnostics. 2022, no. 10, pp. 10-18. (In Russ.) DOI 10.25791/pribor.10.2022.1364.
Repyeva V. D., Khanmagomedov A. H. Features and problems of categorizing objects of critical information infrastructure. Bulletin of Science, 2023, Vol. 5, no. 1(58), pp. 193-196. (In Russ.).
Natalichev R. V., Gorbatov V. S., Gavdan G. P., Durakovsky A. P. Evolution and paradoxes of the regulatory framework for ensuring the security of critical information infrastructure facilities. Information technology security, 2021, Vol. 28, no. 3, pp. 6-27. (In Russ.). DOI 10.26583/bit.2021.3.01.
Zaika V. M. Ensuring the security of a critical information infrastructure facility. Bulletin of Science, 2024, Vol. 4, no. 10(79). – pp. 750-758. (In Russ.).
Tsypkina A.V., Shaburova V. N. Application of a probabilistic method for assessing the danger of CII objects in emergency situations. Interexpo Geo-Siberia, 2023, Vol. no. 6 (1), No. pp 284-290. (In Russ.). DOI 10.33764/2618-981X-2023-6-4-290 .
Petrov M, Fatkieva R. A Model of Synthesis of Distributed Attacking Elements in a Computer Network. Proceedings of Telecommunication Universities. 2020;6(2):113-120. (In Russ.) https://doi.org/10.31854/1813-324X-2020-6-2-113-120
Melnikov A.V., Chirkov V. E. Classification of confidential information leakage channels for modeling the significance of critical information infrastructure facilities. Security, safety, communications, 2019, no. 4-2, pp. 139-144. (In Russ.)
Fomenko K. E., Kushchev A.V. A model for ensuring information security of critical information infrastructure elements based on an ontological approach in conditions of destructive influences. Scientific works of KubSTU, 2022, no. 3, pp. 25-33. (In Russ.).
Kubarev A.V., Lapsar A. P., Fedorova Ya. V. Improving the safety of operation of significant critical infrastructure facilities using parametric models of evolution. Cybersecurity issues.,2020; № 1(35), pp. 8-17. (In Russ.). DOI 10.21681/2311-3456-2020-01-08-17.
Malinichev D. M., Kuchmezov H. H., Mochalov V. V. [et al.]. Categorization of interconnected objects of critical information infrastructure. Applied Informatics, 2022, Vol. 17, no. 3(99), pp. 105-116. (In Russ.). DOI 10.37791/2687-0649-2022-17-3-105-116.
Baibekov A. T., Lesnikova N. E. Economic modeling of the consequences of large-scale cyber-attacks on critical infrastructure: assessment of systemic risk for the national economy. Journal of Monetary Economics and Management, 2025.no. 11, pp. 337-340. (In Russ.). DOI 10.26118/2782-4586.2025.16.58.043.
Fatkieva, R.R. Systems of Information Security Indicators for Industrial Enterprises. Autom. Doc. Math. Linguist. 53, 216–224 (2019). https://doi.org/10.3103/S000510551904006X.
Evnevich E. L., Fatkieva R. R. Modeling information processes in conflict conditions. Cybersecurity issues, 2020, № 2(36), pp. 42-49. (In Russ.). DOI 10.21681/2311-3456-2020-2-42-49.
Refbacks
- There are currently no refbacks.
Abava Кибербезопасность Monetec 2026 СНЭ
ISSN: 2307-8162