Andrey Kalashnikov - Academia.edu (original) (raw)

Uploads

Papers by Andrey Kalashnikov

Research paper thumbnail of Automation of network monitoring: methodology of destructive risk assessment

IOP Conference Series: Materials Science and Engineering, 2019

This paper explores the parameters of network and content in the social network for sharing media... more This paper explores the parameters of network and content in the social network for sharing media, which affect its popularity. To assessment the danger of content and its distribution channel, emotions are used, which the content transmits and the distribution channel parameters: the number and length of content, audience size, likes, dislikes, intersection of audiences, the number of content created in the past, keywords and tags. The paper also presents the results of content risk assessment based on selected parameters. The proposed parameters and the method of their assessment are applicable in systems with a high level of automation to identify the most harmful sources of information on the social network for sharing media.

Research paper thumbnail of APPLICATION OF THE LOGICAL-PROBABILISTIC METHOD IN INFORMATION SECURITY. Part 4

Voprosy kiberbezopasnosti, 2024

Research paper thumbnail of Теоретико-игровые модели информационного противоборства в социальных сетях

Управление большими системами: сборник трудов, 2010

Research paper thumbnail of About the unified system of classification of protection of automated control systems and infocommunication systems by the criteria of importance and of information security

The work presents the results of the development and joint application of a single network securi... more The work presents the results of the development and joint application of a single network security trust model and a unified classification system of the protection of elements of information infrastructure of management based on a new approach accounting to the importance of elements in a classification system.

Research paper thumbnail of A Model for Assessing the Security of a Complex Network (Part 2)

Вопросы кибербезопасности, 2022

Purpose of the article: development of a mechanism for evaluating the actions of agents of comple... more Purpose of the article: development of a mechanism for evaluating the actions of agents of complex information systems from the point of view of information security. Research method: game-theoretic models using stochastic modeling methods. The result: typical operations of the violator and defender are defined. A game-theo retic model based on a game with nature has been developed to determine the results of an attack on a separate element of a complex network. Based on the zero-sum game, a model of agent confrontation based on the resu lts of the game with nature has been developed. For the game with nature and the zero-sum game, the stra tegies of agents’ actions are defined. A formal description of the model is given, and it is shown that the simulation result is determined by six parameters that do not depend on a particular type of network graph.

Research paper thumbnail of Assessment of Damage Value for Complex Systems

2022 15th International Conference Management of large-scale system development (MLSD), Sep 26, 2022

Research paper thumbnail of Complex Network Cybersecurity Monitoring Method

This paper considers one of the methods of efficient allocation of limited resources in special-p... more This paper considers one of the methods of efficient allocation of limited resources in special-purpose devices (sensors) to monitor complex network unit cybersecurity.

Research paper thumbnail of Models of tariff-premium stimulation systems

Automation and Remote Control, Mar 1, 2007

Research paper thumbnail of Management of Risks for Complex System Based on a Generalized Arbitration Scheme

2021 14th International Conference Management of large-scale system development (MLSD), Sep 27, 2021

The paper is concerned with an approach to constructing mechanisms for managing the security of a... more The paper is concerned with an approach to constructing mechanisms for managing the security of a complex system in conditions where the local risk functions of independent elements of the system are random. It proposed to use linear or quadratic functionals of a particular type as a framework for ordering local risks.

Research paper thumbnail of Heterogeneous Network Security Effective Monitoring Method

Communications in computer and information science, 2019

This paper considers one of the methods of efficient allocation of limited resources in special-p... more This paper considers one of the methods of efficient allocation of limited resources in special-purpose devices (sensors) to monitor heterogeneous network unit cybersecurity.

Research paper thumbnail of Management of Risks for Complex Computer Network

Communications in computer and information science, 2020

Research paper thumbnail of Game-theoretic models of informational confrontation in social networks

Automation and Remote Control, Sep 1, 2011

Research paper thumbnail of Categorization and Criticality Assessment of Facilities of Critical Infrastructure

2022 15th International Conference Management of large-scale system development (MLSD)

Research paper thumbnail of A Model for Assessing the Security of a Complex Network (Part 1)

Voprosy kiberbezopasnosti

Purpose of the article: development of mechanisms for evaluating the actions of agents of complex... more Purpose of the article: development of mechanisms for evaluating the actions of agents of complex information systems from the point of view of information security. Research method: game-theoretic models using stochastic modeling methods. The result: the description of the subject area of application of the model is given, it is shown that the actions of the violator and defender can be considered from the point of view of obtaining and further escalation of access rights on the objects of the information system. It is shown that the model of information confrontation between the defender and the violator can be represented by the triple “graph, agent, rules”. The definition of the basic terms and concepts of the model is given. The basic principles of the model functioning have been developed. The possibility of implementing calculations of the results of agents’ activities and the results of the game in the conditions of information uncertainty is shown. A list of basic values of...

Research paper thumbnail of Influence of the Internal Structure on the Integral Risk of a Complex System on the Example of the Risk Minimization Problem in a “Star” Type Structure

Mathematics

This paper is devoted to studying the influence of the structure of a complex system on its integ... more This paper is devoted to studying the influence of the structure of a complex system on its integral risk. When solving risk management problems, it often becomes necessary to take into account structural effects, which most often include risk transfer and failure propagation. This study discusses the influence of the position of the elements of a protected system inside a fixed structure of the “star” type on its integral risk. The authors demonstrate that the problem of the optimal placement of elements in such a structure from the point of view of minimizing the risk cannot be precisely solved by analytical methods and propose an algorithm for solving it with bounded errors. For the case of equal expected damages in case of a successful attack of a system element, the authors calculate upper estimates for the relative error of solving the placement problem using the proposed algorithm and also propose a methodology for rapid risk assessment for systems with a “star” type structur...

Research paper thumbnail of Some aspects of critical information infrastructure risk management

2021 14th International Conference Management of large-scale system development (MLSD), 2021

Research paper thumbnail of Management of Risks for Complex Network Based on an Arbitration Model

Voprosy kiberbezopasnosti

Purpose of the article: build risk management frameworks in a complex network under uncertainty w... more Purpose of the article: build risk management frameworks in a complex network under uncertainty when the local risk functions of network nodes are random. Research method: a generalized game-theoretic approach based on a generalized arbitrage scheme (the most stimulating solution), the key element of which is the possibility of hierarchical ordering of network nodes in accordance with the values of their local risks, when the local risk functions of nodes are random. At the same time for ordering local risks, it is proposed to use linear or quadratic functionals of a special type that meet the specified requirements. The result: In this paper considers a general model of a complex network in which two subjects interact: nature and the defender. Within the framework of the model, each of the subjects affects the network by distributing the available resource between its nodes. Local risk functions, meeting some specified requirements, are applied for estimation of the state of networ...

Research paper thumbnail of Using the Risk Potential Assessment of Energy Objects in the SMS System

2019 Twelfth International Conference "Management of large-scale system development" (MLSD)

The paper discusses the crucial functions of the "Safety management system" in terms of... more The paper discusses the crucial functions of the "Safety management system" in terms of opportune identification of hazards and vulnerabilities. The introduction of such systems in the energy sector will increase the security of the functioning of energy facilities.

Research paper thumbnail of A Model for Quantifying the Agent of a Complex Network in Conditions of Incomplete Awareness

Voprosy kiberbezopasnosti

Purpose of the article: development of a mechanism for quantitative evaluation of elements of com... more Purpose of the article: development of a mechanism for quantitative evaluation of elements of complex information systems in conditions of insufficient information about the presence of vulnerabilities. Research method: mathematical modeling of uncertainty estimation based on binary convolution and Kolmogorov complexity. Data banks on vulnerabilities and weaknesses are used as initial data for modeling. The result: it is shown that the operation of an element of a complex network can be represented by data transformation procedures, which consist of a sequence of operations in time, described by weaknesses and related vulnerabilities. Each operation can be evaluated at a qualitative level in terms of the severity of the consequences in the event of the implementation of potential weaknesses. The use of binary convolution and universal coding makes it possible to translate qualitative estimates into a binary sequence – a word in the alphabet {0,1}. The sequence of such words — as the...

Research paper thumbnail of Towards Risk Potential of Significant Plants of Critical Information Infrastructure

In the paper, the authors consider the problem of predicting the risk potential of significant pl... more In the paper, the authors consider the problem of predicting the risk potential of significant plants of the critical information infrastructure under transferring the technological process to emergence states; they study a model based on the associative search for predicting a violation by the technological process of admissible operation constraints, as well as there is presented a scheme of influence on each other of levels of the model of significant plants of the critical information infrastructure. The total of approaches considered in the paper may be represented in a system of the safety threats monitoring. The paper provides an example of the risk potential of an oil refining plant at the level of the information&technological infrastructure.

Research paper thumbnail of Automation of network monitoring: methodology of destructive risk assessment

IOP Conference Series: Materials Science and Engineering, 2019

This paper explores the parameters of network and content in the social network for sharing media... more This paper explores the parameters of network and content in the social network for sharing media, which affect its popularity. To assessment the danger of content and its distribution channel, emotions are used, which the content transmits and the distribution channel parameters: the number and length of content, audience size, likes, dislikes, intersection of audiences, the number of content created in the past, keywords and tags. The paper also presents the results of content risk assessment based on selected parameters. The proposed parameters and the method of their assessment are applicable in systems with a high level of automation to identify the most harmful sources of information on the social network for sharing media.

Research paper thumbnail of APPLICATION OF THE LOGICAL-PROBABILISTIC METHOD IN INFORMATION SECURITY. Part 4

Voprosy kiberbezopasnosti, 2024

Research paper thumbnail of Теоретико-игровые модели информационного противоборства в социальных сетях

Управление большими системами: сборник трудов, 2010

Research paper thumbnail of About the unified system of classification of protection of automated control systems and infocommunication systems by the criteria of importance and of information security

The work presents the results of the development and joint application of a single network securi... more The work presents the results of the development and joint application of a single network security trust model and a unified classification system of the protection of elements of information infrastructure of management based on a new approach accounting to the importance of elements in a classification system.

Research paper thumbnail of A Model for Assessing the Security of a Complex Network (Part 2)

Вопросы кибербезопасности, 2022

Purpose of the article: development of a mechanism for evaluating the actions of agents of comple... more Purpose of the article: development of a mechanism for evaluating the actions of agents of complex information systems from the point of view of information security. Research method: game-theoretic models using stochastic modeling methods. The result: typical operations of the violator and defender are defined. A game-theo retic model based on a game with nature has been developed to determine the results of an attack on a separate element of a complex network. Based on the zero-sum game, a model of agent confrontation based on the resu lts of the game with nature has been developed. For the game with nature and the zero-sum game, the stra tegies of agents’ actions are defined. A formal description of the model is given, and it is shown that the simulation result is determined by six parameters that do not depend on a particular type of network graph.

Research paper thumbnail of Assessment of Damage Value for Complex Systems

2022 15th International Conference Management of large-scale system development (MLSD), Sep 26, 2022

Research paper thumbnail of Complex Network Cybersecurity Monitoring Method

This paper considers one of the methods of efficient allocation of limited resources in special-p... more This paper considers one of the methods of efficient allocation of limited resources in special-purpose devices (sensors) to monitor complex network unit cybersecurity.

Research paper thumbnail of Models of tariff-premium stimulation systems

Automation and Remote Control, Mar 1, 2007

Research paper thumbnail of Management of Risks for Complex System Based on a Generalized Arbitration Scheme

2021 14th International Conference Management of large-scale system development (MLSD), Sep 27, 2021

The paper is concerned with an approach to constructing mechanisms for managing the security of a... more The paper is concerned with an approach to constructing mechanisms for managing the security of a complex system in conditions where the local risk functions of independent elements of the system are random. It proposed to use linear or quadratic functionals of a particular type as a framework for ordering local risks.

Research paper thumbnail of Heterogeneous Network Security Effective Monitoring Method

Communications in computer and information science, 2019

This paper considers one of the methods of efficient allocation of limited resources in special-p... more This paper considers one of the methods of efficient allocation of limited resources in special-purpose devices (sensors) to monitor heterogeneous network unit cybersecurity.

Research paper thumbnail of Management of Risks for Complex Computer Network

Communications in computer and information science, 2020

Research paper thumbnail of Game-theoretic models of informational confrontation in social networks

Automation and Remote Control, Sep 1, 2011

Research paper thumbnail of Categorization and Criticality Assessment of Facilities of Critical Infrastructure

2022 15th International Conference Management of large-scale system development (MLSD)

Research paper thumbnail of A Model for Assessing the Security of a Complex Network (Part 1)

Voprosy kiberbezopasnosti

Purpose of the article: development of mechanisms for evaluating the actions of agents of complex... more Purpose of the article: development of mechanisms for evaluating the actions of agents of complex information systems from the point of view of information security. Research method: game-theoretic models using stochastic modeling methods. The result: the description of the subject area of application of the model is given, it is shown that the actions of the violator and defender can be considered from the point of view of obtaining and further escalation of access rights on the objects of the information system. It is shown that the model of information confrontation between the defender and the violator can be represented by the triple “graph, agent, rules”. The definition of the basic terms and concepts of the model is given. The basic principles of the model functioning have been developed. The possibility of implementing calculations of the results of agents’ activities and the results of the game in the conditions of information uncertainty is shown. A list of basic values of...

Research paper thumbnail of Influence of the Internal Structure on the Integral Risk of a Complex System on the Example of the Risk Minimization Problem in a “Star” Type Structure

Mathematics

This paper is devoted to studying the influence of the structure of a complex system on its integ... more This paper is devoted to studying the influence of the structure of a complex system on its integral risk. When solving risk management problems, it often becomes necessary to take into account structural effects, which most often include risk transfer and failure propagation. This study discusses the influence of the position of the elements of a protected system inside a fixed structure of the “star” type on its integral risk. The authors demonstrate that the problem of the optimal placement of elements in such a structure from the point of view of minimizing the risk cannot be precisely solved by analytical methods and propose an algorithm for solving it with bounded errors. For the case of equal expected damages in case of a successful attack of a system element, the authors calculate upper estimates for the relative error of solving the placement problem using the proposed algorithm and also propose a methodology for rapid risk assessment for systems with a “star” type structur...

Research paper thumbnail of Some aspects of critical information infrastructure risk management

2021 14th International Conference Management of large-scale system development (MLSD), 2021

Research paper thumbnail of Management of Risks for Complex Network Based on an Arbitration Model

Voprosy kiberbezopasnosti

Purpose of the article: build risk management frameworks in a complex network under uncertainty w... more Purpose of the article: build risk management frameworks in a complex network under uncertainty when the local risk functions of network nodes are random. Research method: a generalized game-theoretic approach based on a generalized arbitrage scheme (the most stimulating solution), the key element of which is the possibility of hierarchical ordering of network nodes in accordance with the values of their local risks, when the local risk functions of nodes are random. At the same time for ordering local risks, it is proposed to use linear or quadratic functionals of a special type that meet the specified requirements. The result: In this paper considers a general model of a complex network in which two subjects interact: nature and the defender. Within the framework of the model, each of the subjects affects the network by distributing the available resource between its nodes. Local risk functions, meeting some specified requirements, are applied for estimation of the state of networ...

Research paper thumbnail of Using the Risk Potential Assessment of Energy Objects in the SMS System

2019 Twelfth International Conference "Management of large-scale system development" (MLSD)

The paper discusses the crucial functions of the "Safety management system" in terms of... more The paper discusses the crucial functions of the "Safety management system" in terms of opportune identification of hazards and vulnerabilities. The introduction of such systems in the energy sector will increase the security of the functioning of energy facilities.

Research paper thumbnail of A Model for Quantifying the Agent of a Complex Network in Conditions of Incomplete Awareness

Voprosy kiberbezopasnosti

Purpose of the article: development of a mechanism for quantitative evaluation of elements of com... more Purpose of the article: development of a mechanism for quantitative evaluation of elements of complex information systems in conditions of insufficient information about the presence of vulnerabilities. Research method: mathematical modeling of uncertainty estimation based on binary convolution and Kolmogorov complexity. Data banks on vulnerabilities and weaknesses are used as initial data for modeling. The result: it is shown that the operation of an element of a complex network can be represented by data transformation procedures, which consist of a sequence of operations in time, described by weaknesses and related vulnerabilities. Each operation can be evaluated at a qualitative level in terms of the severity of the consequences in the event of the implementation of potential weaknesses. The use of binary convolution and universal coding makes it possible to translate qualitative estimates into a binary sequence – a word in the alphabet {0,1}. The sequence of such words — as the...

Research paper thumbnail of Towards Risk Potential of Significant Plants of Critical Information Infrastructure

In the paper, the authors consider the problem of predicting the risk potential of significant pl... more In the paper, the authors consider the problem of predicting the risk potential of significant plants of the critical information infrastructure under transferring the technological process to emergence states; they study a model based on the associative search for predicting a violation by the technological process of admissible operation constraints, as well as there is presented a scheme of influence on each other of levels of the model of significant plants of the critical information infrastructure. The total of approaches considered in the paper may be represented in a system of the safety threats monitoring. The paper provides an example of the risk potential of an oil refining plant at the level of the information&technological infrastructure.