Development of the model of the antagonistic agents behavior under a cyber conflict
Journal Title: Восточно-Европейский журнал передовых технологий - Year 2019, Vol 4, Issue 9
Abstract
<p>The results of the development of the model of the antagonistic agents behavior in a cyber conflict are presented. It is shown that the resulting model can be used to analyze investment processes in security systems, taking into account the assumption that investment processes are significantly influenced by the behavior of parties involved in a cyber conflict.</p><p>General approaches to model development are presented. First of all, the system of concepts, assumptions and limitations is formed, within the framework of which a mathematical model of behavior must be developed. Taking this into account, the mathematical model of the conflicting agents behavior, presented in the form of algebraic and differential equations, is developed. The developed model presents both the technical characteristics of the security system and the psychological characteristics of the participants in the cyber conflict, which affect the financial characteristics of the investment processes in cybersecurity systems. A distinctive feature of the proposed model is the simultaneous consideration of the behavior of the parties to a cyber conflict not as independent parties, but as agents mutually interacting with each other. The model also makes it possible to simulate the destabilizing effect of the confrontation environment disturbances on the behavior of the conflicting parties, changing the degree of vulnerability of the cybersecurity system along various attack vectors and the level of their success.</p><p>Using the developed model, simulation modeling of the interacting agents behavior in a cyber conflict is performed. The simulation results showed that even the simplest behavior strategies of the attacking side (“the weakest link”) and the defense side (“wait and see”) make it possible to ensure information security of the business process loop.</p>The developed model of interaction between the attacker and the defender can be considered as a tool for modeling the processes of the conflicting parties behavior when implementing various investment scenarios. The simulation results enable decision-makers to receive support regarding the direction of investment in the security of the business process loop.
Authors and Affiliations
Oleksandr Milov, Serhii Yevseiev, Yevheniia Ivanchenko, Stanislav Milevskyi, Anatolii Salii, Vitalii Tiurin, Аleksandr Yarovyi
Definition of the influence of obtaining method on physical and chemical characteristics of Ni (OH)2 powders
<p class="1">Four types of hydroxide were chosen for the study. Two of them were synthesized using the industrial method and are used in alkaline batteries. The other two nickel hydroxide powders were synthesized accordi...
Development of the method of exposure control of grain drying in hightemperature dryers
<p>When studying the kinetics of high-temperature wheat drying, it is found that at the end of the constant drying period, there is a sharp increase in the grain heating temperature. The temperature jump occurs due to th...
Determining the effect of multifunctional partitions on noise level at "Open space" offices
<p>Multifunction partitions and their influence on noise levels were explored. It was emphasized that the existing systems of classification of building partitions explore them based on the convenience of their use, mate...
Computer simulation methods of redundant measurements with the nonlinear transformation function
<p>The studies of possibilities of methods of redundant measurements have found the high efficiency of the presented methods for increasing the accuracy of measurements. It is proved that the equation of redundant measur...
Estimation model of the diesel engine fuel system with an electromechanical device to intensify fuel supply
<p>The key directions of the development and improvement of the fuel supply system for internal combustion engines with ignition from compression of the fuel/air mixture were pointed out. The need for the comprehensive i...