Abstract
Based on the analysis of the problem of cybersecurity, it is shown that its solution is connected with the solution of a complex of interdependent problems whose features follow from the topology of a cyberspace. A graph is proposed that adequately reflects the topology of the computer network for the control of a system of power supply of traction substations and its mathematical model as the basis for the creation of modern cybersecurity models. The developed mathematical model of cybersecurity of a computer network is based on the theory of Pukhov’s differential transforms. The criterion of cybersecurity is formalized, and a minimax principle is proposed for the minimization of a functional in cases of worst combinations of intensities of flows of cyberattacks and protective actions. An intelligent method is developed to search for an optimal strategy for ensuring the cybersecurity of a computer network by the investigation of the functional formalized in this article for extremum.
Similar content being viewed by others
References
A. I. Stasiuk and L. L. Goncharova, “Mathematical models of computer intellectualization of technologies for synchronous phasor measurements of parameters of electric networks,” Cybernetics and Systems Analysis, Vol. 52, No. 5, 825–830 (2016).
O. I. Stasuk and L. L. Goncharova, “Mathematical models and methods for computer control over power supply of railways on the basis of Pukhov’s differential transforms,” Electronic Modeling," Vol. 38, No. 4, 127–139 (2016).
R. V. Hryshchuk and Yu. G. Danik, Foundations of Cyber Security [in Russian], Yu. G. Danik (ed.), ZhNAEU, Zhytomyr (2016).
O. I. Stasuk and L. L. Goncharova, “Differential mathematical models to investigate the computer network architecture of an all-mode system of control over a distance of railways,” Cybernetics and Systems Analysis, Vol. 53, No. 1, 157–164 (2017).
O. F. Butkevych, A. V. Levkonyuk, and O. I. Stasiuk, “Increasing the reliability of monitoring the acceptability of workloads of controlled cutsets of power systems,” Technical Electrodynamics, No. 2, 56–67 (2014).
E. S. Ventsel’, Operations Research [in Russian], Sov. Radio, Moscow (1972).
G. E. Pukhov, Taylor Transforms and Their Application in Electrical Engineering and Electronics [in Russian], Naukova Dumka, Kyiv (1978).
R. V. Grishchuk, Theoretical Foundations for Modeling Processes of Attacks on Information with the Help of Methods of the Theories of Differential Games and Differential Transformations [in Russian], RUTA, Zhytomyr (2010).
A. O. Kalashnikov, “Example of using game-theoretic approach in problems of ensuring the cybersecurity of information systems,” Cybersecurity Issues, No. 1 (2), 49–54 (2014). URL: http://cyberrus.com/wp-content/uploads/2014/03/49-54.pdf.
E. S. Shmatova, “Choice of a strategy of a spurious information system on the basis of a game theory model,” Cybersecurity Issues, No. 5 (13), 36–40 (2015). URL: http://cyberrus.com/wp-content/uploads/2015/12/36-40-513-15_7.-Øìàòîâà.pdf.
Author information
Authors and Affiliations
Corresponding author
Additional information
Translated from Kibernetika i Sistemnyi Analiz, No. 3, May–June, 2017, pp. 170–179.
Rights and permissions
About this article
Cite this article
Stasiuk, A.I., Hryshchuk, R.V. & Goncharova, L.L. A Mathematical Cybersecurity Model of a Computer Network for the Control of Power Supply of Traction Substations. Cybern Syst Anal 53, 476–484 (2017). https://doi.org/10.1007/s10559-017-9949-z
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10559-017-9949-z