Abstract

the article considers the possibilities of modifying the genetic algorithm (GA) for solving the problem of selecting and optimizing the configurations of information protection means (IPR) for security circuits of information and communication systems (ICS). The scientific novelty of the work lies in the fact that in GA, as criteria for optimizing the composition of IPR, it is proposed to use the total value of risks from loss of information, as well as the integral indicator of IPR and cost indicators for each class of IPR. The genetic algorithm in the task of optimizing the selection of the composition of the IPR for ICS is considered as a variation of the problem associated with multiple selection. In such a statement, the optimization of the placement of IPR along the contours of ICS protection is considered as a modification of the combinatorial problem about the backpack. The GA used in the computing core of the decision support system (DSS) differs from the standard GA. As part of the GA modification, chromosomes are presented in the form of matrices, the elements of which are numbers that correspond to the numbers of the IPR in the ICS nodes. In the process of GA modification, k-point crossover was applied. The fitness function is represented as the sum of efficiency coefficients. At the same time, in addition to the traditional absolute indicators of the effectiveness of IPR, the total value of risks from loss of information, as well as cost indicators for each class of IPR are taken into account. The practical value of the research lies in the implementation of the DSS based on the proposed modification of the GA. Computational experiments on the selection of a rational software algorithm for the implementation of the model were performed. It is shown that the implementation of GA in DSS allows to speed up the search for optimal options for the placement of cyber security means (CS) for ICS by more than 25 times. This advantage allows not only to perform a quick review of various options of hardware and software IPR and their combinations for ICS, but also to further combine the proposed algorithm with existing models and algorithms for optimizing the composition of ICS cyber security circuits. Potentially, such a combination of models and algorithms will provide an opportunity to quickly rebuild ICS protection, adjusting its profiles in accordance with new threats and classes of cyberattacks.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call