Preview

Dependability

Advanced search

Method of instrumental estimation of critical information infrastructure under information technology interference

https://doi.org/10.21683/1729-2646-2020-20-4-35-41

Abstract

The Aim of the paper is to develop a method enabling quantitative estimation of stability indicators of critical information infrastructure (CII) facilities under information technology interference (ITI) using testbed experimental research data. CII facilities include information and telecommunication networks (ITCN), information systems (IS), automated systems (AS) and telecommunication systems that are used as part of computer-based systems in transportation, energy, communications, navigation, manufacturing and other domains. For the purpose of this paper, the stability of CII operation shall be understood as the ability of CII facility elements to maintain operating parameter values within the specified limits within the specified time period when affected by intruders’ ITI. Intruders’ ITI is understood as intentional hardware and software interference that cause disruptions (blocking, distortion) of information computation processes in CII facilities within a specified period of time. The developed method is based on experimental research, accelerated testing methods and computational methods of estimation of CII facilities operational stability that were applied subject to the specificity of system analysis of the process of ITCN, IS and ACS operation under simulated intruder ITI. The method uses two primary types of indicators, i.e. the probability of faults and additional (artificial) faults in the course of data communication between CII facility elements caused by ITI, and the probability of faults and additional faults as the result of ITI in the course of information processing in CII facilities. The inclusion in the method of indicators for estimating additional faults due to ITI enables a priori analysis of rare and sudden events of CII facility operational stability disruptions. Subject to the obtained estimates, technical and organizational measures are substantiated for the purpose of neutralizing ITI against CII facilities. Applying the method requires the availability of trial sites for the purpose of estimating the stability and actual security of CII facilities that host the functional equivalents of CII facilities, ITI simulators, information security tools (IST) and computer incident recovery tools. The developed method enables estimating the values of stability indicators, i.e. probability of successful transmission of data between CII facility elements and probability of successful processing of information in CII facility elements affected by faults based on instrumental estimation of system elements’ operation processes assessment under simulated ITI.

About the Authors

S. G. Antonov
4-th Central Research and Design Institute of the Ministry of Defense of Russia
Russian Federation

Sergey G. Antonov, Head of unit

Korolyov



I. I. Antsiferov
4-th Central Research and Design Institute of the Ministry of Defense of Russia
Russian Federation

Ivan I. Antsyferov, Researcher

Korolyov



S. M. Klimov
4-th Central Research and Design Institute of the Ministry of Defense of Russia
Russian Federation

Sergey M. Klimov, Doctor of Engineering, Professor, Head of Division

Korolyov



References

1. Antonov S.G., Klimov S.M. Method for risk evaluation of functional instability of hardware and software systems under external information technology interference. Dependability 2017;17(1):32-39.

2. Antonov S.G., Gordeev S.V., Klimov S.M., Ryzhov B.S. Models of threats of joint information-technical and information-psychological impacts in hybrid wars. Informatsionnye voyny 2018;2(46):83-87. (in Russ.)

3. Gapanovich V.A., Shubinsky I.B., Zamyshlyaev A.M. Risk assessment of a system with diverse elements. Dependability 2016;16(2):49-53.

4. Gapanovich V.A., Rozenberg E.N., Shubinsky I.B. Some concepts of fail-safety and cyber protection of control systems. Dependability 2014;2:95-100.

5. GOST R 56939-2016 Information protection. Secure software development. General requirements. (in Russ.)

6. GOST R 56546-2015. Information protection. Vulnerabilities in information systems. The classification of vulnerabilities in information systems. Moscow: Standartinform; 2015. (in Russ.)

7. Klimov S.M., Kupin S.V., Kupin D.S. Models of malicious software and fault tolerance of information communication networks. Dependability 2017;4:36-43. DOI: 10.21683/1729-2640-2017-17-4. (in Russ.)

8. Klimov S.M., Astrakhov А.V., Sychiov М.P. [Basic methods of computer attack reaction]. Moscow: Bauman MSTU; 2013. (in Russ.)

9. Klimov S.M., Astrakhov А.V., Sychiov М.P. [Basic processes of computer attack reaction]. Moscow: Bauman MSTU; 2013. (in Russ.)

10. Klimov S.M., Polovnikov A.Yu., Sergeev A.P. A model of function-level fault tolerance of navigation signals provision processes in adverse conditions. Dependability 2017;17(2):41-47.

11. Klimov S.M., Polikarpov S.V., Fedchenko A.V. Method of increasing fault tolerance of satellite communication networks under information technology interference. Dependability 2017;17(3):32-40.

12. Klimov S.M., Polikarpov S.V., Ryzhov B.S. et al. Procedure for assuring the continuity of critical information infrastructure under conditions of information influence. Voprosy kiberbezopasnosti 2019;6(34):37-48. (in Russ.)

13. Shubinsky I.B. [Dependable failsafe information systems. Synthesis methods]. Ulianovsk: Oblastnaya tipografia Pechatny dvor; 2016. (in Russ.)


Review

For citations:


Antonov S.G., Antsiferov I.I., Klimov S.M. Method of instrumental estimation of critical information infrastructure under information technology interference. Dependability. 2020;20(4):35-41. https://doi.org/10.21683/1729-2646-2020-20-4-35-41

Views: 822


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1729-2646 (Print)
ISSN 2500-3909 (Online)