Skip to main content
Log in

Analytical Models of Parrying Negative External Influences on a Network Information System

  • INFORMATION SYSTEMS
  • Published:
Automatic Documentation and Mathematical Linguistics Aims and scope

Abstract

Three groups of tools of parrying negative external influences that serve to improve the security of network information systems are introduced: homogeneous parry tools, heterogeneous single-parry tools, and heterogeneous double-parry tools. The problems of ensuring the maximum probability of preserving the network information system are stated for each of these groups. Analytical models of solving these problems are developed and described; solution procedures that consist of sequences of specific steps are determined. A generalized procedural model of a network information system that interacts with a decision support system is presented.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1.

Similar content being viewed by others

REFERENCES

  1. Tyutyunnik, V.M., Thermodynamics of irreversible processes and self-organization in information flows, Int. J. Adv. Res. Eng., 2019, vol. 8, no. 3, pp. 18–24.

    Google Scholar 

  2. Tyutyunnik, V.M. and Aleksandrov, E.Yu., Disturbances of information security in information systems, taking into account the recognition of objects of influence by information security systems in conditions of incomplete a priori information, Pribory Sist., Upr. Kontrol Diagn., 2018, no. 10, pp. 10–17.

  3. Aleksandrov, E.Yu. and Tyutyunnik, V.M., Modeling the assessment of the stability of the network information system to negative external influences in the conditions of incomplete a priori information, Global’nyi Nauchn. Potentsial, 2015, no. 9, pp. 102–106.

  4. Aleksandrov, E.Yu. and Tyutyunnik, V.M., Methods for analyzing conflicts between information security systems and objects of influence, Nauka Biz.: Puti Razvit., 2019, no. 2, pp. 159–161.

  5. Dammag, M.A.M. and Tyutyunnik, V.M., Analytical and procedural fuzzy models for processing multidimensional data, Nauka Biz.: Puti Razvit., 2019, no. 2, pp. 155–158.

  6. Aleksandrov, E.Yu., Object recognition by information security systems in conditions of incomplete a priori information, Informatsionnye sistemy i protsessy: Sb. nauch. tr. (Information Systems and Processes: Collection of Scientific Papers), Tambov–Moscow–St. Petersburg–Baku–Vienna–Hamburg, 2016, Vol. 16, pp. 7–12.

  7. Gromov, Y.Y., Karpov, I.G., Didrikh, V.E., Minin, Y.V., and Ivanova, O.G., Application of linear pure birth-death processes for network-centric information systems modeling, J. Theor. Appl. Inf. Technol., 2016, vol. 85, no. 1, pp. 69–73.

    Google Scholar 

  8. Gromov, Y.Y., Karpov, I.G., Minin, Y.V., and Ivanova, O.G., Generalized probabilistic description of homogeneous flows of events for solving informational security problems, J. Theor. Appl. Inf. Technol., 2016, vol. 87, no. 2, pp. 250–254.

    Google Scholar 

  9. Gromov, Y.Y., Minin, Y.V., Ivanova, O.G., and Majeed, H.L., Construction of continuous and discrete distribution laws for risk assessment in information systems, J. Eng. Sci. Technol. Rev., 2020, vol. 13, no. 3, pp. 1–7.

    Article  Google Scholar 

  10. Gromov, Yu.Yu., Ivanova, O.G., Ivanovskii, M.A., Minin, Yu.V., Aleksandrov, E.Yu., and Tyutyunnik, V.M., Application of tensor analysis to the construction of information systems, Prikl. Fiz. Mat., 2018, no. 5, pp. 40–44.

  11. Gromov, Yu.Yu., Ivanova, O.G., Ivanovskii, M.A., Minin, Yu.V., Aleksandrov, E.Yu., and Tyutyunnik, V.M., Application of tensor analysis to conceptual design of databases, Prom. ASU Kontrollery, 2018, no. 11, pp. 37–43.

  12. Gromov, Y.Y., Karpov, I.G., Minin, Y.V., and Ivanova, O.G., Generalized probabilistic description of homogeneous flows of events for solving informational security problems, J. Theor. Appl. Inf. Technol., 2016, vol. 87, no. 2, pp. 250–254.

    Google Scholar 

  13. Gromov, Y.Y., Ishchuk, I.N., Alekseev, V.V., Didrikh, V.E., and Tyutyunnik, V.M., Information support of finding a solution the problem of hidden objects, J. Theor. Appl. Inf. Technol., 2017, vol. 95, no. 3, pp. 615–620.

    Google Scholar 

  14. Gromov, Y.Y., Ishchuk, I.N., Tyapkin, V.N., Alekseev, V.V., and Tyutyunnik, V.M., Information support of unmanned aerial vehicles navigation using pseudolites, J. Theor. Appl. Inf. Technol., 2017, vol. 95, no. 3, pp. 570–581.

    Google Scholar 

  15. Sergeev, A.Yu. and Tyutyunnik, V.M., Methodology for assessing and improving the efficiency of subject-oriented Internet search by minimizing the volume of the search sample, providing thematic completeness of the search, Nauchno-Tekh. Inf., Ser. 2, 2012, no. 7, pp. 18–36.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to V. M. Tyutyunnik.

Ethics declarations

The authors declare that they have no conflicts of interest.

Additional information

Translated by A. Ovchinnikova

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Tyutyunnik, V.M., Gromov, Y.Y. & Aleksandrov, E.Y. Analytical Models of Parrying Negative External Influences on a Network Information System. Autom. Doc. Math. Linguist. 54, 250–254 (2020). https://doi.org/10.3103/S0005105520050040

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0005105520050040

Keywords:

Navigation