Skip to main content

A Model of Continuous Investing in Information Security with Multifactory Accounting in a Fuzzy Statement

  • Conference paper
  • First Online:
Intelligent Computing and Optimization (ICO 2023)

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 854))

Included in the following conference series:

  • 129 Accesses

Abstract

The proposed model aims to manage the continuous investment process in information security systems (ISS) of information security objects (OIS) while considering multifactoriality in a fuzzy formulation. Unlike existing solutions, the model takes into account continuous investment in the protection of information security. A new class of bilinear differential games in a fuzzy formulation is described in the solution process. The novelty of the model lies in the fact that for bilinear differential games Pontryagin, namely the first direct method and the alternating integral method. Also, the methods of the school of Krasovsky, despite the fact that the condition for the existence of a saddle point for a “small” game is satisfied here. Therefore, a new solution method was proposed—discrete-approximation, which made it possible to solve the problem under consideration. In addition, it should be noted that the solution in explicit form for multidimensional systems is extremely rare, which was done in this work. And, it can also be added that the consideration of a problem in which the player does not know exactly the state of another player, but only knows that his state belongs to a fuzzy set, is an additional confirmation of the novelty of the problem under consideration. The model is intended for the computational core of the decision support system (DSS) in the tasks of optimizing investment strategies in the information security information security system. Computational experiments were carried out for the developed model.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Lallie, H.S., et al.: Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput. Secur. 105, 102248 (2021)

    Article  Google Scholar 

  2. Upadhyay, N.K., Rathee, M.: Cyber security in the age of Covid-19: a timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Med., Law Soc. 15(1), 89–106 (2022)

    Google Scholar 

  3. Hallman, R.A., et al.: Determining a return on investment for cybersecurity technologies in networked critical infrastructures. Int. J. Organ. Collect. Intell. (IJOCI) 11(2), 91–112 (2021)

    Article  Google Scholar 

  4. Kalderemidis, I., Farao, A., Bountakas, P., Panda, S., Xenakis, C.: GTM: game theoretic methodology for optimal cybersecurity defending strategies and investments. In: Proceedings of the 17th International Conference on Availability, Reliability and Security, pp. 1–9 (2022)

    Google Scholar 

  5. Garg, V.: Covenants without the sword: market incentives for cybersecurity investment. Available at SSRN 3896578 (2021)

    Google Scholar 

  6. Mazzoccoli, A., Naldi, M.: Optimal investment in cyber-security under cyber insurance for a multi-branch firm. Risks 9(1), 24 (2021)

    Article  Google Scholar 

  7. Sawik, T., Sawik, B.: A rough cut cybersecurity investment using portfolio of security controls with maximum cybersecurity value. Int. J. Prod. Res. 60(21), 6556–6572 (2022)

    Article  Google Scholar 

  8. Kuzlu, M., Fair, C., Guler, O.: Role of artificial intelligence in the Internet of Things (IoT) cybersecurity. Disc. Internet of things 1(1), 1–14 (2021)

    Google Scholar 

  9. Choo, K.K.R., Gai, K., Chiaraviglio, L., Yang, Q.: A multidisciplinary approach to Internet of Things (IoT) cybersecurity and risk management. Comput. Secur. 102, 102136 (2021)

    Article  Google Scholar 

  10. Holovkin, B.M., Tavolzhanskyi, O.V., Lysodyed, O.V.: Corruption as a cybersecurity threat in conditions of the new world’s order. Ling. Cult. Rev. 5(S3), 499–512 (2021)

    Article  Google Scholar 

  11. Mukhopadhyay, I.: Cyber threats landscape overview under the new normal. In: ICT Analysis and Applications, pp. 729–736. Springer, Singapore (2022)

    Google Scholar 

  12. Akhmetov, B.B., Lakhno, V.A., Akhmetov, B.S., Malyukov, V.P.: The choice of protection strategies during the bilinear quality game on cyber security financing. Bull. Nat. Acad. Sci. Republic of Kazakhstan 3, 6–14 (2018)

    Google Scholar 

  13. Lakhno, V., Malyukov, V., Gerasymchuk, N., et al.: Development of the decision making support system to control a procedure of financial investment. East.-Europ. J. Enterp. Techn. 6(3), 24–41 (2017)

    Google Scholar 

  14. Smit, H.T., Trigeorgis, L.: Flexibility and games in strategic investment (2015)

    Google Scholar 

  15. Arasteh, A.: Considering the investment decisions with real options games approach. Renew. Sustain. Energy Rev. 72, 1282–1294 (2017)

    Article  Google Scholar 

  16. Wang, Y., Gao, W., Qian, F., Li, Y.: Evaluation of economic benefits of virtual power plant between demand and plant sides based on cooperative game theory. Energy Convers. Manage. 238, 114180 (2021)

    Article  Google Scholar 

  17. Sahin, B., Yazir, D., Soylu, A., Yip, T.L.: Improved fuzzy AHP based game-theoretic model for shipyard selection. Ocean Eng. 233, 109060 (2021)

    Article  Google Scholar 

  18. Meng, H., Liu, X., Xing, J., Zio, E.: A method for economic evaluation of predictive maintenance technologies by integrating system dynamics and evolutionary game modelling. Reliab. Eng. Syst. Saf. 222, 108424 (2022)

    Article  Google Scholar 

  19. Lakhno, V., Malyukov, V., Kasatkin, D., Chubaieskyi, V., Rzaieva, S., Rzaiev, D.: Continuous investing in advanced fuzzy technologies for smart city. Lect. Notes Data Eng. Comm. Tech. 142, 313–327 (2023)

    Article  Google Scholar 

  20. Polyakov, V.A., Fomicheva, I.V.: Express assessment of the investment attractiveness and competitiveness of regional territories. J. Reg. Int. Comp. 3(2), 24 (2022)

    Google Scholar 

  21. Vovk, O., Kravchenko, M., Popelo, O., Tulchynska, S., Derhaliuk, M.: Modeling the choice of the innovation and investment strategy for the implementation of modernization potential. Trans. Syst. Cont. 16, 430–438 (2021)

    Google Scholar 

  22. Yao, D., de Soto, B.G.: A preliminary SWOT evaluation for the applications of ML to cyber risk analysis in the construction industry. In: IOP Conference Series: Materials Science and Engineering, Vol. 1218, No. 1, p. 012017. IOP Publishing (2022)

    Google Scholar 

  23. Emer, A., Unterhofer, M., Rauch, E.: A cybersecurity assessment model for small and medium-sized enterprises. IEEE Eng. Manage. Rev. 49(2), 98–109 (2021)

    Article  Google Scholar 

  24. Gromov, D., Gromova, E.: On a class of hybrid differential games. Dynam. Games Appl. 7(2), 266–288 (2017)

    Google Scholar 

  25. Batukhtin, V.D., Krasovskii, N.N.: Extremal control in a nonlinear positional differential game. Akademiia Nauk SSSR, Izvestiia, Tekhnicheskaia Kibernetika, 55–63 (1973)

    Google Scholar 

  26. Bebeshko, B., Malyukov, V., Lakhno, M., Skladannyi P., Sokolov V., Shevchenko S., Zhumadilova, M.: Application of game theory, fuzzy logic and neural networks for assessing risks and forecasting rates of digital currency J. Theor. Appl. Info. Tech. 100(24) (2022). http://www.jatit.org/volumes/Vol100No24/15Vol100No24.pdf

  27. Bebeshko, B., Khorolska, K., Desiatko, A.: Analysis and modeling of price changes on the exchange market based on structural market data. In: 2021 IEEE 8th International Conference on Problems of Infocommunications, Science and Technology (PIC S&T), pp. 151–156 (2021). https://doi.org/10.1109/PICST54195.2021.9772208

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to A. Desiatko .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Malyukov, V., Lakhno, V., Malyukova, I., Kryvoruchko, O., Desiatko, A., Tsiutsiura, M. (2023). A Model of Continuous Investing in Information Security with Multifactory Accounting in a Fuzzy Statement. In: Vasant, P., et al. Intelligent Computing and Optimization. ICO 2023. Lecture Notes in Networks and Systems, vol 854. Springer, Cham. https://doi.org/10.1007/978-3-031-50151-7_2

Download citation

Publish with us

Policies and ethics