APPLIED INFORMATICS MODEL ОF KINETICS ACCOUNTING OF CYBERNETIC THREATS IN NPP PHYSICAL PROTECTION SYSTEM
DOI:
https://doi.org/10.15588/1607-3274-2017-2-6Keywords:
Аpplied computer science, information security, NPP physical security, mathematical simulation of cyber attacks on nuclear power facilitiesAbstract
Context. The topical approaches to preventive estimations and mathematical modeling of cyber attacks processes and supply of external technological informational threats were considered, which may be directed on the physical security system of modern nuclear power plant units.
Objective – is an adaptation of known mathematical models of cyber attacks kinetics for use in the system of information security and physical protection of nuclear power plants to modern and foreseeable conditions.
Method. The method of model dependencies adaptation was proposed, which reflects the kinetics of cyberattacks to the modern operating conditions of protected nuclear facilities was proposed. To improve the model dependencies it was proposed to modify the classic Ferhulst function and, in mathematical modeling of cyber attacks on nuclear power facilities, to use the appropriate transformation of the logistic curve, which has distinctive feature of a well-defined maximum.
Results. It was predicted that the model dependence of flow external to NPP cyber threats can be characterized by the alternation of maxima and minima, which indicates the possibility of an oscillatory character of the developing process. Also was put forward and substantiated the hypothesis that the system of physical and, in particular, cybernetic, NPP protection can be characterized by a time lag that in view of possible oscillatory character of information threats admissions process creates the preconditions for the development of oscillatory instability.
The results obtained in the research are of applied nature, they can be used to carry out large-scale experiments and forecasting parameters of possible cyber threats aimed at the NPP for the purpose of pre-emption and preventive maintenance of information safety of modern nuclear energy technologies.
Conclusions. Recommended for use model dependences were first adapted to the conditions of operating conditions of nuclear powerfacilities, take into account the factors to counter threats and circumstances associated with a specific time delay.
It was shown for the first time that there is an opportunity both extreme and oscillatory dependence nature of the cyber attacks intensity, which are focused on software and hardware system of NPP information safety. The new approach allows to assume the reality of the unstable oscillation process in the “attack – defense” system and provides an opportunity of preventive assessment of the stability stocks.
The practical significance lies in the fact that the results allow to realistically assess the time of onset of expected cyber attacks current dependence changes and to use this knowledge for organizational and technical preparation of remedies and early anticipation of IT-threats.
References
Recommendations on Nuclear Security, on the physical protection of nuclear materials and nuclear facilities (INFCIRC/225/ REVISION 5) / IAEA Nuclear Security Series, № 13, IAEA, Viena, 2012, 69p.
The Law of Ukraine “On the physical protection of nuclear facilities, nuclear materials, radioactive waste and other sources of ionizing radiation” on October 19, 2000. №2064-III, Vidomosti
Verkhovnoi Rady Ukrainy (VVR), 2001, No. 1, st. 1).
Order of the State Nuclear Regulatory Inspectorate of Ukraine 05.12.2011 №176 / Registered with the Ministry of Justice of Ukraine 23.12.2011, №1505/20243.
Sovetov B. Ya., Cekhanovsky V. V. Informacionnye tekhnologii : Ucheb. Dlia VUZov. Moscow, Vyssh. Shk., 2003, 263 p.
Kiseliov V., Kostenko A. Kibervojna kak osnova gibridnoj operacii, Armejskij sbornik, 2015, Vol. 257, No. 11, pp. 3–6.
Golovko V. V. Pervaia kiberneticheskaia atatka na ob’ekt atomnoj energetiki, Nauka I tekhnika, 2016, No. 4, pp. 74–78.
Keleti T. Osnovy fermentativnoj kinetiki. Moscow, Mir, 1990, 191 p.
Pro vnesennia zmin do Zakonu Ukrainy “Pro Informaciiu”, Vidomosti Verkhovnoi Rady Ukrainy (VVR), 2011, No. 32, ст. 313.
Kononovych I. V. Dynamilka kil’kosti incydentiv informacijnoi bezpeky, Informatyka ta matematychni metody v modeliuvanni. Odesa, 2014. Vol. 3, No. 3, pp. 35–43.
Myshkis A. D. Elementy teorii matematicheskikh modelej. Izd. 2-e, ispr. Мoscow, Editorial URSS, 2004, 191 p.
DSTU 2226-93 Avtomatyzovani systemy. Trminy ta vyznachennia.
Malineckij G. G., Potapov A. B. Sovremennye problem nelinejnoj dinamiki. Moscow, Editorial URSS, 2000, 326 p.
Trubeckov D. I. Fenomen matematicheskoj modeli Lotki-Volterry I skhodnykh s nej, Izvestiia vysshikh uchebnykh zavedenij, Prikladnaia nelinejnaia dinamika, 2011, Vyp. 2, Vol. 19, pp. 69–88.
Dolgij Yu. F., Surcov P. G. Matematicheskie modeli denamicheskikh system s zapazdyvaniem : ucheb. posobie. Ekaterinburg: Izd-vo Uralskogo un-ta, 2012, 122 p.
Gajvorons’kyj M. V., Novikov O. M. Bezpeka informacijnokommunikacijnykh system. Kiev, Vydavnycha grupa VNU, 2009, 608 p.
Bogush V. M., Dovyd’kov O. A., Kryvutsa V. G. Teoretychni osnovy zakhyschenykh informatsijnykh tekhnologij : navch. posibn. Kiev, DUIKT, 2010, 454 p.
Derevianko O. V. Koroliov A. V., Pogosov A. Yu. Predavarijnye fizicheskie protsessy i nadiozhnyj teplootvod v iadernykh energoustanovkakh : monographiia. Odessa, Nauka i tekhnika, 2014,268p.
Pogosov O. Yu., Derevianko O. V. Dodatkovi tehnichni mozhlyvosti dlia udoskonalennia system bezpeky AES i znyzhennia ryzyku negatyvnogo vplyvu ob’ektiv iadernoi energetyky na dovkillia, Yaderna energetyka ta dovkillia, 2016, No. 1(7), pp. 13–16.
Downloads
How to Cite
Issue
Section
License
Copyright (c) 2017 A.Yu. Pogosov, O.V. Derevianko
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Creative Commons Licensing Notifications in the Copyright Notices
The journal allows the authors to hold the copyright without restrictions and to retain publishing rights without restrictions.
The journal allows readers to read, download, copy, distribute, print, search, or link to the full texts of its articles.
The journal allows to reuse and remixing of its content, in accordance with a Creative Commons license СС BY -SA.
Authors who publish with this journal agree to the following terms:
-
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License CC BY-SA that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
-
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
-
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.