Evaluation of cyber security of intelligent transportation systems with a multilevel information protection system
https://doi.org/10.21683/1729-2646-2025-25-4-43-51
Abstract
Aim. To examine the assessment of cyber security of intelligent transportation systems with a multi-level information protection system. For the purpose of preventing attacks aimed at capturing information in a multi-level protection system, it is proposed to implement a fully connected core of the local area network (at all levels). This enables random trusted paths that are dismantled upon transmitting the information, i.e. are limited in their time of existence. Communicating information along randomly selected trusted limited-lifetime paths complicates internal attacks that aim to capture network entities involved in the communication of critical information. Methods. The paper uses methods of mathematical analysis, graph theory, and probability theory. Results. The authors examine a model of traffic capture by an attacker, whereas the defender uses random pathing in a fully connected network. A model of information protection in a multi-level information protection system was assessed. It is proposed using dynamically organised trusted paths in fully connected environments when designing a multi-level protection system to prevent interception of information flows. Conclusion. The proposed technique allows estimating the decrease in the probability of vertex capture in a fully connected network, as well assessing the probability of vertex capture depending on the duration of message transmission.
About the Authors
V. M. AlekseevRussian Federation
Victor V. Alekseev, Doctor of Engineering, Professor, Professor of the Department of Management and Protection of Information
Moscow
L. A. Baranov
Russian Federation
Leonid A. Baranov, Doctor of Engineering, Professor, Head of the Department of Management and Protection of Information
Moscow
S. N. Chichkov
Russian Federation
Sergey N. Chichkov, post-graduate student, Department of Management and Protection of Information, Senior Teacher, Department of Higher Mathematics
Moscow
References
1. Popov P.A., Rozenberg E.N., Sabanov A.G., Shubinsky I.B. Integrated Safety of ACS of Railway CII Facilities. Dependability 2024;24(4):48-57. (in Russ.) DOI: 10.21683/1729-2646-2024-24-4-48-57
2. [Information security requirements that define the levels of trust to the information security and information technology protection tools. Approved by the order of the FSTEC of Russia dated 06.02.2020 No. 76]. (in Russ.)
3. [Safety requirements for significant facilities of critical information infrastructure of the Russian Federation. Approved by the order of the FSTEC of Russia dated 12.25.2017 No. 239]. (in Russ.)
4. [Oxidized: Network equipment configuration management system]. (accessed 14.04.2025). Available at: https://bubnovd.net/post/blogger/система-управления-конфигурациями-oxidized/
5. Dmitrieva J. Comparative Analysis of Network Resource Management Methods in SDN. Proc. Of Telecom. Universities 2022;8(1):73-83. (in Russ.)
6. Volkov A.S., Baskakov A.E. Development of a multipath routing algorithm in software-defined communication networks. T-Comm 2021;15(9):17-23. (in Russ.)
7. Chernikov A.S., Paus A.S. Multi-threaded Routing in Software-defined Networking. Radiooptics of the Bauman MSTU 2016;6:35-46. DOI: 10.7463/rdopt.0616.0850725
8. Alotaibi E. A tutorial on software-defined networks emulation. Journal of Engineering Research. DOI:10.1016/j.jer.2023.12.005
9. Mohammad Nowsin Amin Sheikh, I-Shyan Hwang, Muhammad Saibtain Raza. A Qualitative and Comparative Performance Assessment of Logically Centralized SDN Controllers via Mininet Emulator. Computers 2024;13(4):85. DOI: 10.3390/computers13040085
10. Cloud Networks. (accessed 14.04.2025). Available at: https://cloudnetworks.ru/inf-tehnologii/programmnoopredelyaemye-seti-sdn/
11. Mudassar Hussain Nadir Shah, Rashid Amin. Software-Defined Networking: Categories, Analysis, and Future Directions. Sensors 2022;22(15):5551. DOI: 10.3390/s22155551
12. Ivakhnenko A.G. Longterm forecasting and management of complex systems. Kiev: Technics; 1975. (in Russ.)
13. Alekseev V.M., Chichkov S.N. Information security in intelligent mass transit management systems. Dependability 2022;22(3):62-68. (in Russ.)
14. Vahniy T.V., Guts A.K., Novikov N.Y. Matrix-game program with selection criterion for determination of optimal tool set for computer system protection. Mathematical Structures and Modeling 2016:2(38):103-115. (in Russ.)
15. Savchenko S.O., Kapchuk N.V. Algorithm of creation of model of the violator in the information security system with application of game theory. Dynamics of Systems Mechanisms and Machines 2017;5(4):84-89. (in Russ.) DOI:10.25206/2310-9793-2017-5-4-84-89
16. Kolchin V.F. Geometric distribution. In: Osipov Yu.S., chief editor. The Great Russian Encyclopaedia: [in 35 volumes]. Moscow: The Great Russian Encyclopaedia; 2004-2017. (in Russ.)
Review
For citations:
Alekseev V.M., Baranov L.A., Chichkov S.N. Evaluation of cyber security of intelligent transportation systems with a multilevel information protection system. Dependability. 2025;25(4):43-51. (In Russ.) https://doi.org/10.21683/1729-2646-2025-25-4-43-51




























