Development of the model of the antagonistic agents behavior under a cyber conflict

Abstract

<p>The results of the development of the model of the antagonistic agents behavior in a cyber conflict are presented. It is shown that the resulting model can be used to analyze investment processes in security systems, taking into account the assumption that investment processes are significantly influenced by the behavior of parties involved in a cyber conflict.</p><p>General approaches to model development are presented. First of all, the system of concepts, assumptions and limitations is formed, within the framework of which a mathematical model of behavior must be developed. Taking this into account, the mathematical model of the conflicting agents behavior, presented in the form of algebraic and differential equations, is developed. The developed model presents both the technical characteristics of the security system and the psychological characteristics of the participants in the cyber conflict, which affect the financial characteristics of the investment processes in cybersecurity systems. A distinctive feature of the proposed model is the simultaneous consideration of the behavior of the parties to a cyber conflict not as independent parties, but as agents mutually interacting with each other. The model also makes it possible to simulate the destabilizing effect of the confrontation environment disturbances on the behavior of the conflicting parties, changing the degree of vulnerability of the cybersecurity system along various attack vectors and the level of their success.</p><p>Using the developed model, simulation modeling of the interacting agents behavior in a cyber conflict is performed. The simulation results showed that even the simplest behavior strategies of the attacking side (“the weakest link”) and the defense side (“wait and see”) make it possible to ensure information security of the business process loop.</p>The developed model of interaction between the attacker and the defender can be considered as a tool for modeling the processes of the conflicting parties behavior when implementing various investment scenarios. The simulation results enable decision-makers to receive support regarding the direction of investment in the security of the business process loop.

Authors and Affiliations

Oleksandr Milov, Serhii Yevseiev, Yevheniia Ivanchenko, Stanislav Milevskyi, Anatolii Salii, Vitalii Tiurin, Аleksandr Yarovyi

Keywords

Related Articles

Determining the maximally permissible values for the indicators of insulation of sealed entrance bushings with a voltage of 110 kV using the method of minimal risk

<p>A method for determining the maximally permissible values for the indicators of insulation of high-voltage oilfilled entrance bushings that ensure the minimal risk value has been proposed. The proposed method differs...

Rationale for creating detonation CO2 laser for radioactive surface decontamination

<p>The laser decontamination method is based on the evaporation of oxide films under the influence of radiation. With the evaporation mechanism, laser radiation should heat the upper layer of the film to the boiling poin...

Study of dietary fiber properties in dairy mixes containing modified fat compositions

<p>We have established the technological characteristics for the wheat dietary fiber Vitacel, extruded wheat flour and rosehip meal, specifically the capability to absorb humidity and fat, as well as to swell. The highes...

A method to form control over queuing systems taking into consideration the probabilistic character of demand

<p>Queueing systems (QS) belong to the class of systems the quality of control over which cannot be assessed in real time. In other words, it is impossible to apply methods of classic search optimization at the stage of...

Simulation of structure formation in the Fe–C–Cr–Ni–Si surfacing materials

<p>The paper investigates the formation of equilibrium phase state in the surfacing materials 300Cr25Ni3Si3 and 500Cr40Ni40Si2BZr, obtained by electric arc surfacing that employs powder tapes PL AN-101 and PL AN-111. Thi...

Download PDF file
  • EP ID EP666989
  • DOI 10.15587/1729-4061.2019.175978
  • Views 60
  • Downloads 0

How To Cite

Oleksandr Milov, Serhii Yevseiev, Yevheniia Ivanchenko, Stanislav Milevskyi, Anatolii Salii, Vitalii Tiurin, Аleksandr Yarovyi (2019). Development of the model of the antagonistic agents behavior under a cyber conflict. Восточно-Европейский журнал передовых технологий, 4(9), 6-19. https://europub.co.uk./articles/-A-666989