Abstract
The problem of cybersecurity of computer networks for control of power supply at the level of railroads is analyzed and a graph of the topology of a computer network for control of power consumption is proposed. Based on the Pukhov theory of differential transformations, a number of differential mathematical models are proposed to assess the level of cybersecurity of a computer network for control of power supply. For differential images, a cybersecurity criterion is proposed and the minimax principle is developed for the worst combination of the intensity of cyberattacks and the flow of protective actions. A method of predictive search for an optimal cybersecurity strategy by the extremum analysis of a functional for the case of stochastic intensity of flows of cyberattacks is developed.
Similar content being viewed by others
References
O. I. Stasuk, L. L. Goncharova, and V. F. Maksimchuk, “Methods of organization of intelligent electrical railway networks based on the SMART Grid concept,” Management-Information Systems on Railway Transport, No. 2, 29–37 (2014).
O. I. Stasuk and L. L. Goncharova, “Differential mathematical models to investigate the computer network architecture of an all-mode system of control over a distance of railways,” Cybernetics and Systems Analysis, Vol. 53, No. 1, 157–164 (2017).
O. I. Stasiuk and L. L. Goncharova, “Mathematical models of computer intellectualization of technologies for synchronous phasor measurements of parameters of electric networks,” Cybernetics and Systems Analysis, Vol. 52, No. 5, 825–830 (2016).
A. I. Stasiuk, R. V. Hryshchuk, and L. L. Goncharova, “A mathematical model of the cybersecurity of the computer network for the control of power supply of traction substations,” Cybernetics and Systems Analysis, Vol. 53, No. 3, 476–484 (2017).
A. I. Stasiuk and L. L. Goncharova, “Mathematical models and methods of the analysis of computer networks of control of power supply of railways traction substations,” Journal of Automation and Information Science, Vol. 49, No. 2, 50–60 (2017).
V. N. Opanasenko and S. L. Kryvyi, “Partitioning the full range of Boolean functions based on the threshold and threshold relation,” Cybernetics and Systems Analysis, Vol. 48, No. 3, 459–468 (2012).
V. N. Opanasenko and S. L. Kryvyi, “Synthesis of adaptive logical networks on the basis of Zhegalkin polynomials,” Cybernetics and Systems Analysis, Vol. 51, No. 6, 969–977 (2015).
E. S. Ventsel’, Operations Research [in Russian], Sov. Radio, Moscow (1972).
G. E. Pukhov, Taylor Transforms and Their Application in Electrical Engineering and Electronics [in Russian], Nauk. Dumka, Kyiv (1978).
Author information
Authors and Affiliations
Corresponding author
Additional information
Translated from Kibernetika i Sistemnyi Analiz, No. 4, July–August, 2018, pp. 173–181.
Rights and permissions
About this article
Cite this article
Stasiuk, O.I., Grishchuk, R.V. & Goncharova, L.L. Mathematical Differential Models and Methods for Assessing the Cybersecurity of Intelligent Computer Networks for Control of Technological Processes of Railway Power Supply. Cybern Syst Anal 54, 671–677 (2018). https://doi.org/10.1007/s10559-018-0068-2
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10559-018-0068-2