Influence of confrontation form on optimization of information security resource allocation process
DOI:
https://doi.org/10.18372/2225-5036.19.5643Keywords:
information security, information confrontation, resource allocation, optimization, saddle pointAbstract
Optimization of resource amount which must be appropriated for information security and resource allocation between objects is major problem of information security economic management. Complexity of search for solution is conditioned by uncertainty of opponent’s actions in information confrontation. In these conditions of particular importance is search for saddle point that represent situation when neither of sides is interested in changing their strategies. Possibility of saddle point existence depends on number of objects, information distribution between objects, extent of function nonlinearity, which defines dynamic vulnerabilities of objects, and form of confrontation. Also saddle point exists only in certain intervals of values , where - proportion of both sides’ resources. In case of unidirectional confrontation, when one of sides defends its information and other attempts to get information, with linear-fractional form of functions in system of two objects saddle point exists on all and when convert to nonlinear-fractional form or complexification of system by adding new objects interval become limited. In multidirectional confrontation, when each of sides defends its information and simultaneously attempts to get opponent’s information, relations to parameters of system become more complex. Given calculation results enable to reveal these relations.References
Прус Р.Б. Оптимізація розподілу ресурсів захисту інформації в динамічному режимі // Безпека інформації. — 2012. — №1. — С. 26-32.
Левченко Є.Г., Прус Р.Б., Рабчун Д.І. Умови існування сідлової точки в багаторубіжних системах захисту інформації // Безпека інформації. — 2013. — №1. — С. 70-76.
Глушак В.В., Новіков О.М. Синтез структури системи захисту інформації з вико-ристанням позиційної гри захисника та зловмисника // Системні дослідження та інформаційні технології. — 2013. — №2. — С. 89-100.
Левченко Є.Г., Рабчун А.О. Оптимізаційні задачі менеджменту інформаційної безпеки // Сучасний захист інформації. — 2010. — №1. — С. 16-23.
Downloads
Published
How to Cite
Issue
Section
License
The scientific journal "Ukrainian Scientific Journal of Information Security" adheres to the principles of open science and provides free, free and permanent access to all published materials. The goal of the policy is to increase the visibility, citation and impact of the results of scientific research in the field of information security. The journal works according to the principles of Open Access and does not charge a fee for access to published articles.
All articles are published in Open Access under the Creative Commons Attribution 4.0 International (CC BY 4.0) license.
Copyright
Authors who publish their works in the journal “Ukrainian Scientific Journal of Information Security”:
-
retain the copyright to their publications;
-
grant the journal the right of first publication of the article;
-
agree to the distribution of their materials under the CC BY 4.0 license;
-
have the right to reuse, archive, and distribute their works (including in institutional and subject repositories), provided that proper reference is made to the original publication in the journal.