Skip to main content

Green Technologies of Information Protection in Computer Networks of Electric Transport System

  • Chapter
  • First Online:
Sustainable Transport and Environmental Safety in Aviation

Abstract

The process of continuous monitoring of parameters of operating modes of power supply system and its components is investigated. It is determined that the primary information is subject to intellectual processing in order to form diagnostic conclusions and control actions at the level of subway power supply distances. It is shown that in the process of monitoring the server must be protected by a set of hardware and software or information security system from unauthorized access.

The multitasking of the main server, which determines the complexity of the applied information security systems and the need to use information technology, has been studied. Thanks to information protection models and methods for assessing the level of security of a particular network element, the process of attacking the server functionality was modeled using mathematical models of the considered information conflict.

Mathematical models of the process of information attacks on the multitasking server of the subway power supply distance, which is a component of the system, allow to obtain optimal strategies for information protection, using methods of differential game modeling and information protection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Borankulova GS, Tungatarova AT (2019) Methods and means of information network protection. ISJ Theor Appl Sci 04(72):75–78

    Article  Google Scholar 

  • Demin DА (2017) Synthesis of optimal control over inertial technological processes based on a multialternative parametric description of the final state. East Eur J Enterp Technol 3/4(87):51–63

    Google Scholar 

  • Fomin O, Lovska A, Kulbovskyi I et al (2019) Determining the dynamic loading on a semi-wagon when fixing it with a viscous coupling to a ferry deck. East-Eur J Enterp Technol 2(7(98)):6–12

    Google Scholar 

  • Holub H, Soloviova O (2019) Research of information protection methods in computer system for monitoring and diagnostics of electric supply of railways. In: Technology transfer: fundamental principles and innovative technical solutions, pp 9–11. https://doi.org/10.21303/2585-6847.2019.001028

    Chapter  Google Scholar 

  • Holub H, Skok KI et al (2020) System model of information flows in networks of the electric supply system in transport infrastructure projects. Transport Means:132–135

    Google Scholar 

  • Hryshchuk RV (2009) Metod dyferentsial′no-ihrovoho R-modelyuvannya protsesiv napadu na informatsiyu. Informatsiyna bezpeka 2(2):128–132

    Google Scholar 

  • Hryshchuk RV (2010) Teoretychni osnovy modelyuvannya protsesiv napadu na informatsiyu metodamy teoriy dyferentsial′nykh ihor ta dyferentsial′nykh peretvoren′. Ruta, Zhytomyr

    Google Scholar 

  • Ihnatov V, Huziy M (2005) Dynamika informatsiynykh konfliktiv v intelektual′nykh systemakh. Problemy informatyzatsiyi ta upravlinnya 15:88–92

    Google Scholar 

  • Khoroshko VA, Morzhov SV (2004) Application of petry networks to parallel process modeling. J Autom Inf Sci 36(4):12–17

    Article  Google Scholar 

  • Korobiichuk I, Hryshchuk R, Mamarev V et al (2018) Cyberattack classificator verification. Adv Intell Syst Comput 635:402–411

    Article  Google Scholar 

  • Korobiichuk I, Hryshchuk R, Horoshko V et al (2019) Microprocessor means for technical diagnostics of complex systems. CEUR Workshop Proc 2353:1020–1029

    Google Scholar 

  • Kulbovskyi I, Bakalinsky O, Sorochynska O et al (2019) Implementation of innovative technology for evaluating high-speed rail passenger transportation. Eureka Phys Eng 6:63–72

    Article  Google Scholar 

  • Lenkov S, Peregudov D, Khoroshko V (2008) Metody i sredstva zashchity informatsii: monografiya [v 2-kh t.]: T.1: Informatsionnaya bezopasnost’. Ariy, Kií̈v

    Google Scholar 

  • Nguyen T, Wright M, Wellman M et al (2018) Multistage attack graph security games: heuristic strategies, with empirical game-theoretic analysis. Secur Commun Netw 2018:1–28

    Google Scholar 

  • Pukhov GY (1986) Differentsial’nyye preobrazovaniya i matematicheskoye modelirovaniye fizicheskikh protsessov: monografiya. Naukova dumka, Kií̈v, p 160 c

    Google Scholar 

  • Song J, Lee Y, Kim K et al (2015) Automated verification methodology of security events based on heuristic analysis. Int J Distrib Sens Netw. https://doi.org/10.1155/2015/817918

  • Stasiuk O, Honcharova L, Maksymchuk V (2012) Metody orhanizatsii kompiuternoi merezhi monitorynhu parametriv rezhymiv system elektropostachannia. Informatsiino-keruiuchi systemy na zaliznychnomu transporti, naukovo-tekhnichnyi zhurnal 2:35–40

    Google Scholar 

  • Vorobiev S, Petrenko I, Kovaleva I et al (2017) Analysis of computer security incidents using fuzzy logic. In: Proceedings of the 20th IEEE international conference on soft computing and measurements, pp 369–371

    Google Scholar 

  • Vorob’yov AA, Kulikov GV, Nepomnyashchikh AV (2007) Otsenivaniye zashchishchonnosti avtomatizirovannykh sistem na osnove metodov teorii igr. Informatsionnyye tekhnologii. Novyye tekhnologii, Moskva, p 24

    Google Scholar 

  • Voronko IO (2013) Dyferentsial′no – ihrova model′ nadiynosti mikroprotsesornykh system monitorynhu tyahovykh elektrychnykh merezh zaliznyts′. Informatsiyno-keruyuchi systemy na zaliznychnomu transporti 5:8–15

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Holub, H., Kulbovskyi, I., Kharuta, V., Zaiats, O., Tkachuk, M., Kharuta, V. (2023). Green Technologies of Information Protection in Computer Networks of Electric Transport System. In: Boichenko, S., Yakovlieva, A., Zaporozhets, O., Karakoc, T.H., Shkilniuk, I., Dalkiran, A. (eds) Sustainable Transport and Environmental Safety in Aviation . Sustainable Aviation. Springer, Cham. https://doi.org/10.1007/978-3-031-34350-6_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-34350-6_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-34349-0

  • Online ISBN: 978-3-031-34350-6

  • eBook Packages: EnergyEnergy (R0)

Publish with us

Policies and ethics