Andrey Kalashnikov - Academia.edu (original) (raw)
Uploads
Papers by Andrey Kalashnikov
IOP Conference Series: Materials Science and Engineering, 2019
This paper explores the parameters of network and content in the social network for sharing media... more This paper explores the parameters of network and content in the social network for sharing media, which affect its popularity. To assessment the danger of content and its distribution channel, emotions are used, which the content transmits and the distribution channel parameters: the number and length of content, audience size, likes, dislikes, intersection of audiences, the number of content created in the past, keywords and tags. The paper also presents the results of content risk assessment based on selected parameters. The proposed parameters and the method of their assessment are applicable in systems with a high level of automation to identify the most harmful sources of information on the social network for sharing media.
Voprosy kiberbezopasnosti, 2024
Управление большими системами: сборник трудов, 2010
The work presents the results of the development and joint application of a single network securi... more The work presents the results of the development and joint application of a single network security trust model and a unified classification system of the protection of elements of information infrastructure of management based on a new approach accounting to the importance of elements in a classification system.
Вопросы кибербезопасности, 2022
Purpose of the article: development of a mechanism for evaluating the actions of agents of comple... more Purpose of the article: development of a mechanism for evaluating the actions of agents of complex information systems from the point of view of information security. Research method: game-theoretic models using stochastic modeling methods. The result: typical operations of the violator and defender are defined. A game-theo retic model based on a game with nature has been developed to determine the results of an attack on a separate element of a complex network. Based on the zero-sum game, a model of agent confrontation based on the resu lts of the game with nature has been developed. For the game with nature and the zero-sum game, the stra tegies of agents’ actions are defined. A formal description of the model is given, and it is shown that the simulation result is determined by six parameters that do not depend on a particular type of network graph.
2022 15th International Conference Management of large-scale system development (MLSD), Sep 26, 2022
This paper considers one of the methods of efficient allocation of limited resources in special-p... more This paper considers one of the methods of efficient allocation of limited resources in special-purpose devices (sensors) to monitor complex network unit cybersecurity.
Automation and Remote Control, Mar 1, 2007
2021 14th International Conference Management of large-scale system development (MLSD), Sep 27, 2021
The paper is concerned with an approach to constructing mechanisms for managing the security of a... more The paper is concerned with an approach to constructing mechanisms for managing the security of a complex system in conditions where the local risk functions of independent elements of the system are random. It proposed to use linear or quadratic functionals of a particular type as a framework for ordering local risks.
Communications in computer and information science, 2019
This paper considers one of the methods of efficient allocation of limited resources in special-p... more This paper considers one of the methods of efficient allocation of limited resources in special-purpose devices (sensors) to monitor heterogeneous network unit cybersecurity.
Communications in computer and information science, 2020
Automation and Remote Control, Sep 1, 2011
2022 15th International Conference Management of large-scale system development (MLSD)
Voprosy kiberbezopasnosti
Purpose of the article: development of mechanisms for evaluating the actions of agents of complex... more Purpose of the article: development of mechanisms for evaluating the actions of agents of complex information systems from the point of view of information security. Research method: game-theoretic models using stochastic modeling methods. The result: the description of the subject area of application of the model is given, it is shown that the actions of the violator and defender can be considered from the point of view of obtaining and further escalation of access rights on the objects of the information system. It is shown that the model of information confrontation between the defender and the violator can be represented by the triple “graph, agent, rules”. The definition of the basic terms and concepts of the model is given. The basic principles of the model functioning have been developed. The possibility of implementing calculations of the results of agents’ activities and the results of the game in the conditions of information uncertainty is shown. A list of basic values of...
Mathematics
This paper is devoted to studying the influence of the structure of a complex system on its integ... more This paper is devoted to studying the influence of the structure of a complex system on its integral risk. When solving risk management problems, it often becomes necessary to take into account structural effects, which most often include risk transfer and failure propagation. This study discusses the influence of the position of the elements of a protected system inside a fixed structure of the “star” type on its integral risk. The authors demonstrate that the problem of the optimal placement of elements in such a structure from the point of view of minimizing the risk cannot be precisely solved by analytical methods and propose an algorithm for solving it with bounded errors. For the case of equal expected damages in case of a successful attack of a system element, the authors calculate upper estimates for the relative error of solving the placement problem using the proposed algorithm and also propose a methodology for rapid risk assessment for systems with a “star” type structur...
2021 14th International Conference Management of large-scale system development (MLSD), 2021
Voprosy kiberbezopasnosti
Purpose of the article: build risk management frameworks in a complex network under uncertainty w... more Purpose of the article: build risk management frameworks in a complex network under uncertainty when the local risk functions of network nodes are random. Research method: a generalized game-theoretic approach based on a generalized arbitrage scheme (the most stimulating solution), the key element of which is the possibility of hierarchical ordering of network nodes in accordance with the values of their local risks, when the local risk functions of nodes are random. At the same time for ordering local risks, it is proposed to use linear or quadratic functionals of a special type that meet the specified requirements. The result: In this paper considers a general model of a complex network in which two subjects interact: nature and the defender. Within the framework of the model, each of the subjects affects the network by distributing the available resource between its nodes. Local risk functions, meeting some specified requirements, are applied for estimation of the state of networ...
2019 Twelfth International Conference "Management of large-scale system development" (MLSD)
The paper discusses the crucial functions of the "Safety management system" in terms of... more The paper discusses the crucial functions of the "Safety management system" in terms of opportune identification of hazards and vulnerabilities. The introduction of such systems in the energy sector will increase the security of the functioning of energy facilities.
Voprosy kiberbezopasnosti
Purpose of the article: development of a mechanism for quantitative evaluation of elements of com... more Purpose of the article: development of a mechanism for quantitative evaluation of elements of complex information systems in conditions of insufficient information about the presence of vulnerabilities. Research method: mathematical modeling of uncertainty estimation based on binary convolution and Kolmogorov complexity. Data banks on vulnerabilities and weaknesses are used as initial data for modeling. The result: it is shown that the operation of an element of a complex network can be represented by data transformation procedures, which consist of a sequence of operations in time, described by weaknesses and related vulnerabilities. Each operation can be evaluated at a qualitative level in terms of the severity of the consequences in the event of the implementation of potential weaknesses. The use of binary convolution and universal coding makes it possible to translate qualitative estimates into a binary sequence – a word in the alphabet {0,1}. The sequence of such words — as the...
In the paper, the authors consider the problem of predicting the risk potential of significant pl... more In the paper, the authors consider the problem of predicting the risk potential of significant plants of the critical information infrastructure under transferring the technological process to emergence states; they study a model based on the associative search for predicting a violation by the technological process of admissible operation constraints, as well as there is presented a scheme of influence on each other of levels of the model of significant plants of the critical information infrastructure. The total of approaches considered in the paper may be represented in a system of the safety threats monitoring. The paper provides an example of the risk potential of an oil refining plant at the level of the information&technological infrastructure.
IOP Conference Series: Materials Science and Engineering, 2019
This paper explores the parameters of network and content in the social network for sharing media... more This paper explores the parameters of network and content in the social network for sharing media, which affect its popularity. To assessment the danger of content and its distribution channel, emotions are used, which the content transmits and the distribution channel parameters: the number and length of content, audience size, likes, dislikes, intersection of audiences, the number of content created in the past, keywords and tags. The paper also presents the results of content risk assessment based on selected parameters. The proposed parameters and the method of their assessment are applicable in systems with a high level of automation to identify the most harmful sources of information on the social network for sharing media.
Voprosy kiberbezopasnosti, 2024
Управление большими системами: сборник трудов, 2010
The work presents the results of the development and joint application of a single network securi... more The work presents the results of the development and joint application of a single network security trust model and a unified classification system of the protection of elements of information infrastructure of management based on a new approach accounting to the importance of elements in a classification system.
Вопросы кибербезопасности, 2022
Purpose of the article: development of a mechanism for evaluating the actions of agents of comple... more Purpose of the article: development of a mechanism for evaluating the actions of agents of complex information systems from the point of view of information security. Research method: game-theoretic models using stochastic modeling methods. The result: typical operations of the violator and defender are defined. A game-theo retic model based on a game with nature has been developed to determine the results of an attack on a separate element of a complex network. Based on the zero-sum game, a model of agent confrontation based on the resu lts of the game with nature has been developed. For the game with nature and the zero-sum game, the stra tegies of agents’ actions are defined. A formal description of the model is given, and it is shown that the simulation result is determined by six parameters that do not depend on a particular type of network graph.
2022 15th International Conference Management of large-scale system development (MLSD), Sep 26, 2022
This paper considers one of the methods of efficient allocation of limited resources in special-p... more This paper considers one of the methods of efficient allocation of limited resources in special-purpose devices (sensors) to monitor complex network unit cybersecurity.
Automation and Remote Control, Mar 1, 2007
2021 14th International Conference Management of large-scale system development (MLSD), Sep 27, 2021
The paper is concerned with an approach to constructing mechanisms for managing the security of a... more The paper is concerned with an approach to constructing mechanisms for managing the security of a complex system in conditions where the local risk functions of independent elements of the system are random. It proposed to use linear or quadratic functionals of a particular type as a framework for ordering local risks.
Communications in computer and information science, 2019
This paper considers one of the methods of efficient allocation of limited resources in special-p... more This paper considers one of the methods of efficient allocation of limited resources in special-purpose devices (sensors) to monitor heterogeneous network unit cybersecurity.
Communications in computer and information science, 2020
Automation and Remote Control, Sep 1, 2011
2022 15th International Conference Management of large-scale system development (MLSD)
Voprosy kiberbezopasnosti
Purpose of the article: development of mechanisms for evaluating the actions of agents of complex... more Purpose of the article: development of mechanisms for evaluating the actions of agents of complex information systems from the point of view of information security. Research method: game-theoretic models using stochastic modeling methods. The result: the description of the subject area of application of the model is given, it is shown that the actions of the violator and defender can be considered from the point of view of obtaining and further escalation of access rights on the objects of the information system. It is shown that the model of information confrontation between the defender and the violator can be represented by the triple “graph, agent, rules”. The definition of the basic terms and concepts of the model is given. The basic principles of the model functioning have been developed. The possibility of implementing calculations of the results of agents’ activities and the results of the game in the conditions of information uncertainty is shown. A list of basic values of...
Mathematics
This paper is devoted to studying the influence of the structure of a complex system on its integ... more This paper is devoted to studying the influence of the structure of a complex system on its integral risk. When solving risk management problems, it often becomes necessary to take into account structural effects, which most often include risk transfer and failure propagation. This study discusses the influence of the position of the elements of a protected system inside a fixed structure of the “star” type on its integral risk. The authors demonstrate that the problem of the optimal placement of elements in such a structure from the point of view of minimizing the risk cannot be precisely solved by analytical methods and propose an algorithm for solving it with bounded errors. For the case of equal expected damages in case of a successful attack of a system element, the authors calculate upper estimates for the relative error of solving the placement problem using the proposed algorithm and also propose a methodology for rapid risk assessment for systems with a “star” type structur...
2021 14th International Conference Management of large-scale system development (MLSD), 2021
Voprosy kiberbezopasnosti
Purpose of the article: build risk management frameworks in a complex network under uncertainty w... more Purpose of the article: build risk management frameworks in a complex network under uncertainty when the local risk functions of network nodes are random. Research method: a generalized game-theoretic approach based on a generalized arbitrage scheme (the most stimulating solution), the key element of which is the possibility of hierarchical ordering of network nodes in accordance with the values of their local risks, when the local risk functions of nodes are random. At the same time for ordering local risks, it is proposed to use linear or quadratic functionals of a special type that meet the specified requirements. The result: In this paper considers a general model of a complex network in which two subjects interact: nature and the defender. Within the framework of the model, each of the subjects affects the network by distributing the available resource between its nodes. Local risk functions, meeting some specified requirements, are applied for estimation of the state of networ...
2019 Twelfth International Conference "Management of large-scale system development" (MLSD)
The paper discusses the crucial functions of the "Safety management system" in terms of... more The paper discusses the crucial functions of the "Safety management system" in terms of opportune identification of hazards and vulnerabilities. The introduction of such systems in the energy sector will increase the security of the functioning of energy facilities.
Voprosy kiberbezopasnosti
Purpose of the article: development of a mechanism for quantitative evaluation of elements of com... more Purpose of the article: development of a mechanism for quantitative evaluation of elements of complex information systems in conditions of insufficient information about the presence of vulnerabilities. Research method: mathematical modeling of uncertainty estimation based on binary convolution and Kolmogorov complexity. Data banks on vulnerabilities and weaknesses are used as initial data for modeling. The result: it is shown that the operation of an element of a complex network can be represented by data transformation procedures, which consist of a sequence of operations in time, described by weaknesses and related vulnerabilities. Each operation can be evaluated at a qualitative level in terms of the severity of the consequences in the event of the implementation of potential weaknesses. The use of binary convolution and universal coding makes it possible to translate qualitative estimates into a binary sequence – a word in the alphabet {0,1}. The sequence of such words — as the...
In the paper, the authors consider the problem of predicting the risk potential of significant pl... more In the paper, the authors consider the problem of predicting the risk potential of significant plants of the critical information infrastructure under transferring the technological process to emergence states; they study a model based on the associative search for predicting a violation by the technological process of admissible operation constraints, as well as there is presented a scheme of influence on each other of levels of the model of significant plants of the critical information infrastructure. The total of approaches considered in the paper may be represented in a system of the safety threats monitoring. The paper provides an example of the risk potential of an oil refining plant at the level of the information&technological infrastructure.