MODEL OF INVESTMENT STRATEGIES IN CYBER SECURITY SYSTEMS OF TRANSPORT SITUATIONAL CENTERS
DOI:
https://doi.org/10.15588/1607-3274-2018-2-9Keywords:
decision support system, model, bilinear functions, mutual investment, cyber security, situational transport center.Abstract
Actuality. The actual task of finding the optimal strategy for control the procedure of mutual financial investments to the situationcenter for cyber security on transport. The aim of the work – the development of a model for a decision support system on the continuous mutual investment in a cyber security situational center, which differs from the existing ones by solving a bilinear differential quality game with several terminal surfaces. Method. In order to achieve the goal there was used a discrete-approximation method for solving a bilinear differential quality game with dependent motions. Application of this method in the developed decision support system, unlike existing ones, gives concrete recommendations ft choosing control decisions in the investment process.
Results – the proposed model gives concrete recommendations at choosing strategies in the investment process at the creation of a
protected situational center. In the course of the computational experiment, there was considered a new class of bilinear differential games that allowed adequately to describe the process of investing in cyber security means of situational transport centers in Kazakhstan and
Ukraine.
Conclusions. For the first time, there was proposed a model describing the process of mutual investment based on the solution of
bilinear equations and a differential quality game with several terminal surfaces. Considered the peculiarity of the differential game on the
example of mutual investment in the means of cyber security of the situational transport center. In this case, the right-hand side of the
system of differential equations is represented in the form of bilinear functions with arbitrary coefficients. The model allows to predict the
results of investment and to find strategies for managing the investment process in the protection and cyber security systems of the
situational transport center.
References
Gordon L. A., Loeb M. P., Lucyshyn W. et al. Externalities and the magnitude of cyber security underinvestment by private sector firms: a modification of the Gordon-Loeb model, Journal of Information Security, 2015, No. 6(1), pp. 24–30. DOI: 10.4236/jis.2015.61003
Fielder A., Panaousis E., Malacaria P. et al. Decision support
approaches for cyber security investment, Decision Support Systems, 2016, No. 86, pp. 13–23. DOI: org/10.1016/j.dss.2016.02.012
Meland P. H., Tondel I. A., Solhaug B. Mitigating risk with
cyberinsurance, IEEE Security & Privacy, 2015, No. 13(6),
pp. 38–43. DOI: 10.1109/MSP.2015.137
Smeraldi F., Malacaria P. How to spend it: optimal investment for cyber security, 1st International Workshop on Agents and CyberSecurity, Paris, France, 06–08 May 2014 : proceedings. New York, ACM, 2014, pp. 8. DOI: 10.1145/2602945.2602952
Tosh D. K., Molloy M., Sengupta S. et al. Cyber-investment and cyber-information exchange decision modeling, High Performance Computing and Communications (HPCC), IEEE 7th International Symposium on Cyberspace Safety and Security (CSS), New York , 24–26 August 2015 : proceedings. New York, IEEE, 2015, pp. 1219–1224.
Alpcan T., Bambos N. Modeling dependencies in security risk
management, Risks and Security of Internet and Systems (CRiSIS), Fourth International Conference, Toulouse, France, 19–22 October 2009: proceedings. France, IEEE, 2009. pp. 113–116. DOI : 10.1109/CRISIS.2009.5411969
Peppard J., Ward J. The Strategic Management of Information Systems: Building a Digital Strategy, U.K. Wiley, 2016, 504 p.
Malyukov V.P. A differential game of quality for two groups of objects, Journal of Applied Mathematics and Mechanics, 1991, Vol. 55, No.5, pp. 596 – 606.
Cassidy A. A practical guide to information systems strategic
planning, New York, CRC press, 2016, 395 p.
Bonczek R. H., Holsapple C. W., Whinston A. B. Foundations of decision support systems, USA, Academic Press, 2014, 412 p.
Malyukov V.P. Discrete-approximation method for solving a bilinear differential game, Cybernetics and Systems Analysis,
,Vol. 29, No. 6, pp. 879–888.
Koziolek A., Avritzer A., Suresh S. et al. Assessing survivability to support power grid investment decisions, Reliability Engineering & System Safety, 2016, Vol. 155, pp. 30–43. DOI: 10.1016/j.ress.2016.05.015
Lakhno V., Petrov Al., Petrov Ant. Development of a Support System for Managing the Cyber Security of Information and Communication Environment of Transport, Information Systems Architecture and Technology : 38th International Conference on Information Systems Architecture and Technology (ISAT 2017), Wroclaw, 17–19 September 2017 : proceedings. Wroclaw, Springer, 2017, pp. 113–127. DOI: 10.1007/978-3-319-67229-8_11
Lakhno V. A. Development of a support system for managing the cyber security, Radio Electronics, Computer Science, Control, 2017, No. 2, pp. 109–116. DOI:10.15588/1607-3274-2017-2-12
Lakhno V., Malyukov V., Gerasymchuk N. et al. Development of the decision making support system to control a procedure of financial investment, Eastern-European Journal of Enterprise Technologies, 2017, Vol. 6, No. 3, pp. 24–41. DOI: 10.15587/1729-4061.2017.119259
Akhmetov B., Lakhno V., Boiko Y. et al. Designing a decision support system for the weakly formalized problems in the provision of cybersecurity, Eastern-European Journal of
Enterprise Technologies, 2017, Vol. 1, No. 2, pp. 4–15. DOI:
15587/1729-4061.2017.90506
Downloads
How to Cite
Issue
Section
License
Copyright (c) 2018 B. B. Akhmetov, V. A. Lakhno, V. P. Malyukov
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Creative Commons Licensing Notifications in the Copyright Notices
The journal allows the authors to hold the copyright without restrictions and to retain publishing rights without restrictions.
The journal allows readers to read, download, copy, distribute, print, search, or link to the full texts of its articles.
The journal allows to reuse and remixing of its content, in accordance with a Creative Commons license СС BY -SA.
Authors who publish with this journal agree to the following terms:
-
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License CC BY-SA that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
-
Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
-
Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work.