Abstract
The process of continuous monitoring of parameters of operating modes of power supply system and its components is investigated. It is determined that the primary information is subject to intellectual processing in order to form diagnostic conclusions and control actions at the level of subway power supply distances. It is shown that in the process of monitoring the server must be protected by a set of hardware and software or information security system from unauthorized access.
The multitasking of the main server, which determines the complexity of the applied information security systems and the need to use information technology, has been studied. Thanks to information protection models and methods for assessing the level of security of a particular network element, the process of attacking the server functionality was modeled using mathematical models of the considered information conflict.
Mathematical models of the process of information attacks on the multitasking server of the subway power supply distance, which is a component of the system, allow to obtain optimal strategies for information protection, using methods of differential game modeling and information protection.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Borankulova GS, Tungatarova AT (2019) Methods and means of information network protection. ISJ Theor Appl Sci 04(72):75–78
Demin DА (2017) Synthesis of optimal control over inertial technological processes based on a multialternative parametric description of the final state. East Eur J Enterp Technol 3/4(87):51–63
Fomin O, Lovska A, Kulbovskyi I et al (2019) Determining the dynamic loading on a semi-wagon when fixing it with a viscous coupling to a ferry deck. East-Eur J Enterp Technol 2(7(98)):6–12
Holub H, Soloviova O (2019) Research of information protection methods in computer system for monitoring and diagnostics of electric supply of railways. In: Technology transfer: fundamental principles and innovative technical solutions, pp 9–11. https://doi.org/10.21303/2585-6847.2019.001028
Holub H, Skok KI et al (2020) System model of information flows in networks of the electric supply system in transport infrastructure projects. Transport Means:132–135
Hryshchuk RV (2009) Metod dyferentsial′no-ihrovoho R-modelyuvannya protsesiv napadu na informatsiyu. Informatsiyna bezpeka 2(2):128–132
Hryshchuk RV (2010) Teoretychni osnovy modelyuvannya protsesiv napadu na informatsiyu metodamy teoriy dyferentsial′nykh ihor ta dyferentsial′nykh peretvoren′. Ruta, Zhytomyr
Ihnatov V, Huziy M (2005) Dynamika informatsiynykh konfliktiv v intelektual′nykh systemakh. Problemy informatyzatsiyi ta upravlinnya 15:88–92
Khoroshko VA, Morzhov SV (2004) Application of petry networks to parallel process modeling. J Autom Inf Sci 36(4):12–17
Korobiichuk I, Hryshchuk R, Mamarev V et al (2018) Cyberattack classificator verification. Adv Intell Syst Comput 635:402–411
Korobiichuk I, Hryshchuk R, Horoshko V et al (2019) Microprocessor means for technical diagnostics of complex systems. CEUR Workshop Proc 2353:1020–1029
Kulbovskyi I, Bakalinsky O, Sorochynska O et al (2019) Implementation of innovative technology for evaluating high-speed rail passenger transportation. Eureka Phys Eng 6:63–72
Lenkov S, Peregudov D, Khoroshko V (2008) Metody i sredstva zashchity informatsii: monografiya [v 2-kh t.]: T.1: Informatsionnaya bezopasnost’. Ariy, Kií̈v
Nguyen T, Wright M, Wellman M et al (2018) Multistage attack graph security games: heuristic strategies, with empirical game-theoretic analysis. Secur Commun Netw 2018:1–28
Pukhov GY (1986) Differentsial’nyye preobrazovaniya i matematicheskoye modelirovaniye fizicheskikh protsessov: monografiya. Naukova dumka, Kií̈v, p 160 c
Song J, Lee Y, Kim K et al (2015) Automated verification methodology of security events based on heuristic analysis. Int J Distrib Sens Netw. https://doi.org/10.1155/2015/817918
Stasiuk O, Honcharova L, Maksymchuk V (2012) Metody orhanizatsii kompiuternoi merezhi monitorynhu parametriv rezhymiv system elektropostachannia. Informatsiino-keruiuchi systemy na zaliznychnomu transporti, naukovo-tekhnichnyi zhurnal 2:35–40
Vorobiev S, Petrenko I, Kovaleva I et al (2017) Analysis of computer security incidents using fuzzy logic. In: Proceedings of the 20th IEEE international conference on soft computing and measurements, pp 369–371
Vorob’yov AA, Kulikov GV, Nepomnyashchikh AV (2007) Otsenivaniye zashchishchonnosti avtomatizirovannykh sistem na osnove metodov teorii igr. Informatsionnyye tekhnologii. Novyye tekhnologii, Moskva, p 24
Voronko IO (2013) Dyferentsial′no – ihrova model′ nadiynosti mikroprotsesornykh system monitorynhu tyahovykh elektrychnykh merezh zaliznyts′. Informatsiyno-keruyuchi systemy na zaliznychnomu transporti 5:8–15
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Holub, H., Kulbovskyi, I., Kharuta, V., Zaiats, O., Tkachuk, M., Kharuta, V. (2023). Green Technologies of Information Protection in Computer Networks of Electric Transport System. In: Boichenko, S., Yakovlieva, A., Zaporozhets, O., Karakoc, T.H., Shkilniuk, I., Dalkiran, A. (eds) Sustainable Transport and Environmental Safety in Aviation . Sustainable Aviation. Springer, Cham. https://doi.org/10.1007/978-3-031-34350-6_5
Download citation
DOI: https://doi.org/10.1007/978-3-031-34350-6_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-34349-0
Online ISBN: 978-3-031-34350-6
eBook Packages: EnergyEnergy (R0)