...
首页> 外文期刊>Journal of Theoretical and Applied Information Technology >FUNDING MODEL FOR PORT INFORMATION SYSTEM CYBER SECURITY FACILITIES WITH INCOMPLETE HACKER INFORMATION AVAILABLE
【24h】

FUNDING MODEL FOR PORT INFORMATION SYSTEM CYBER SECURITY FACILITIES WITH INCOMPLETE HACKER INFORMATION AVAILABLE

机译:具有不完整黑客信息的港口信息系统网络安全设施的筹资模型

获取原文

摘要

Article describes the model developed for the module of port information system cyber security facilities funding decision making support system. The model is based on multistage game theory toolkit. The solution offered allows an opportunity for managers of information safety systems, particularly port information systems and technologies, to carry out preliminary assessment of financial strategies for development of effective cyber safety systems. The distinctive feature of the model is the assumption that the defending party does not have full information on the financing strategies of the attacking party and on the state of its financial resources used to break cyber security barriers of the port information system. The solution employs mathematical apparatus of bilinear turn-based multistage quality game with several terminal surfaces. A multiple-option simulation experiment was carried out to ensure validity of the model. The results of the experiment will also be described herein. Thus, in the article at the first time, decision of the game was shown for all cases of the correlation of game parameters for the protection side of the port information system (PIS) and hackers seeking to overcome the boundaries of cybersecurity. The solution found in the article will be useful for the created decision support system, in particular, for the situation when the attacker uses a mixed financial strategy of hacking the information system.
机译:文章描述了为港口信息系统网络安全设施资金决策支持系统模块开发的模型。该模型基于多阶段博弈论工具箱。所提供的解决方案为信息安全系统(尤其是港口信息系统和技术)的管理人员提供了机会,可以对开发有效网络安全系统的财务策略进行初步评估。该模型的显着特征是假设防御方没有关于攻击方的融资策略及其用于突破端口信息系统网络安全壁垒的财务资源状态的完整信息。该解决方案采用具有多个终端表面的基于双线性回合的多阶段质量博弈的数学装置。为了确保模型的有效性,进行了多选项仿真实验。实验结果也将在本文中描述。因此,在本文的第一篇文章中,针对端口信息系统(PIS)的保护端和试图克服网络安全边界的黑客的游戏参数相关性的所有情况,都显示了游戏的决策。本文中找到的解决方案将对创建的决策支持系统很有用,特别是在攻击者使用混合财务策略入侵信息系统的情况下。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号