Skip to main content
Log in

Operational Efficiency of Computer Networks under Conditions of Malicious Cyber Activity

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

In this paper, we propose a model for predicting the dynamics of a generalized efficiency index for corporate computer networks operating under conditions of malicious cyber activity. The model represents the dynamics of the index as a function of the operational efficiency of a corporate network at each instant on a certain time interval. In this case, the level of operational efficiency of the network depends on the operational efficiency of its components and is described by a system of differential equations that take into account both malicious activity and the process of eliminating its effects. Under some simplifying conditions, we find analytical solutions of these equations, which significantly facilitates the prediction of the dynamics of the generalized efficiency index.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

REFERENCES

  1. Saurenko, T.N., Anisimov, V.G., Anisimov, E.G., and Sonkin, M.A., Methodology control function realization within the electronic government concept framework, Int. J. Sci. Technol. Res., 2020, vol. 9, no. 2, pp. 6259–6262.

    Google Scholar 

  2. Anisimov, V.G., Anisimov, E.G., Zegzhda, P.D., and Suprun, A.F., The problem of innovative development of information security systems in the transport sector, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1105–1110.  https://doi.org/10.3103/S0146411618080035

    Article  Google Scholar 

  3. Zegzhda, D. and Stepanova, T., Achieving Internet of Things security via providing topological sustainability, Science and Information Conf. (SAI), London, 2015, IEEE, 2015, pp. 269–276.  https://doi.org/10.1109/SAI.2015.7237154

  4. Anisimov, V.G., Zegzhda, P.D., Anisimov, E.G., and Bazhin, D.A., A risk-oriented approach to the control arrangement of security protection subsystems of information systems, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 717–721.  https://doi.org/10.3103/S0146411616080289

    Article  Google Scholar 

  5. Dakhnovich, A., Moskvin, D., and Zeghzda, D., An approach for providing industrial control system sustainability in the age of digital transformation, IOP Conf. Ser.: Mater. Sci. Eng., 2019, vol. 497, p. 012006.  https://doi.org/10.1088/1757-899X/497/1/012006

  6. Ivanov, D., Kalinin, M., Krundyshev, V., and Orel, E., Automatic security management of smart infrastructures using attack graph and risk analysis, Fourth World Conf. on Smart Trends in Systems, Security and Sustainability (WorldS4), London, 2020, IEEE, 2020, pp. 295–300.  https://doi.org/10.1109/WorldS450073.2020.9210410

  7. Cohen, F., Computer viruses: theory and experiments, Comput. Secur., 1987, vol. 6, no. 1, pp. 22–35.  https://doi.org/10.1016/0167-4048(87)90122-2

    Article  Google Scholar 

  8. Kozlov, D.A., Parandovskii, A.A., and Parandovskii, A.K., Entsiklopediya komp’yuternykh virusov (Encyclopedia of Computer Viruses), Moscow: Solon-R, 2010.

  9. Lavrova, D.S., Alekseev, I.V., and Shtyrkina, A.A., Security analysis based on controlling dependences of network traffic parameters by wavelet transformation, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 931–935.  https://doi.org/10.3103/S0146411618080187

    Article  Google Scholar 

  10. Pavlenko, E.Yu., Yarmak, A.V., and Moskvin, D.A., Hierarchical approach to analyzing security breaches in information systems, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 829–834.  https://doi.org/10.3103/S0146411617080144

    Article  Google Scholar 

  11. Krundyshev, V. and Kalinin, M., The security risk analysis methodology for smart network environments, Int. Russian Automation Conf. (RusAutoCon), Sochi, Russia, 2020, IEEE, 2020, pp. 437–442.  https://doi.org/10.1109/RusAutoCon49822.2020.9208116

  12. Anisimov, V.G., Anisimov, E.G., Saurenko, T.N., and Zotova, E.A., Models of forecasting destructive influence risks for information processes in management systems, Inf. Control Syst., 2019, no. 5, pp. 18–23. https://doi.org/10.31799/1684-8853-2019-5-18-23

  13. Saurenko, T.N., Anisimov, E.G., Anisimov, V.G., Suprun, A.F., and Kasatkin, V.V., Prediction of information security incidents, Probl. Inf. Bezop. Komp’yut. Sist., 2019, no. 3, pp. 24–28.

  14. Zegzhda, P.D., Suprun, A.F., Anisimov, V.G., Tebekin, A.V., and Anisimov, E.G., Methodical approach to construction of models of forecasting of indicators of properties of information security systems, Probl. Inf. Bezop. Komp’yut. Sist., 2019, no. 4, pp. 45–49.

  15. Anisimov, V.G., Anisimov, E.G., Zegzhda, P.D., Saurenko, T.N., and Prisyazhnyuk, S.P., Indices of the effectiveness of information protection in an information interaction system for controlling complex distributed organizational objects, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 824–828. https://doi.org/10.3103/S0146411617080053

    Article  Google Scholar 

  16. Kermack, W.O. and McKendrick, A.G., A contribution to the mathematical theory of epidemics, Proc. R. Soc. London. Ser. A, 1927, vol. 115, no. 772, pp. 700–721.  https://doi.org/10.1098/rspa.1927.0118

    Article  MATH  Google Scholar 

  17. Kotenko, I.V. and Vorontsov, V.V., Analytical models of network worm propagation, Tr. SPIIRAN, 2007, no. 4, pp. 208–224.

  18. Zegzhda, P.D., Anisimov, V.G., Sem’yanov, P.V., Suprun, A.F., Anisimov, E.G., Saurenko, T.N., and Los’, V.P., Approach to the evaluation of the efficiency of information security in control systems, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 864–870.  https://doi.org/10.3103/S0146411620080362

    Article  Google Scholar 

  19. Kephart, J.O. and White, S.R., Directed-graph epidemiological models of computer viruses, Proc. IEEE Computer Society Symp. on Research in Security and Privacy, Oakland, Calif., 1991, IEEE, 1991, pp. 343–359. https://doi.org/10.1109/RISP.1991.130801

  20. Zegzhda, P.D., Anisimov, V.G., Suprun, A.F., Anisimov, E.G., Saurenko, T.N., and Los’, V.P., A model of optimal complexification of measures providing information security, Autom. Control Comput. Sci., 2020, vol. 54, no. 8, pp. 930–936.  https://doi.org/10.3103/S0146411620080374

    Article  Google Scholar 

  21. Bragg, R., Rhodes-Ousley, M., and Strassberg, K., Network Security: The Complete Reference, McGraw-Hill, 2003.

    Google Scholar 

  22. Anisimov, V.G., Zegzhda, P.D., Anisimov, E.G., Saurenko, T.N., and Kasatkin, V.V., Model and method for optimizing computational processes in parallel computing systems, Autom. Control Comput. Sci., 2019, vol. 53, no. 8, pp. 1038–1044.  https://doi.org/10.3103/S0146411619080054

    Article  Google Scholar 

  23. Anisimov, E.G., Anisimov, V.G., Gar’kushev, A.Yu., and Selivanov, A.A., Indicators of the effectiveness of interagency communications in the management of the defense of the state, Vopr. Oboronnoi Tekh. Ser. 16: Tekh. Sredstva Protivodeistviya Terrorizmu, 2016, nos. 7–8, pp. 12–16.

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to P. D. Zegzhda, V. G. Anisimov or V. P. Los’.

Ethics declarations

The authors declare that they have no conflicts of interest.

Additional information

Translated by Yu. Kornienko

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zegzhda, P.D., Anisimov, V.G., Anisimov, E.G. et al. Operational Efficiency of Computer Networks under Conditions of Malicious Cyber Activity. Aut. Control Comp. Sci. 55, 1020–1024 (2021). https://doi.org/10.3103/S0146411621080332

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411621080332

Keywords:

Navigation