Preview

Dependability

Advanced search

On assessing the operational stability of critical information infrastructure facilities affected by information security threats

https://doi.org/10.21683/1729-2646-2025-25-4-69-76

Abstract

Aim. To formalise the scientific problem of quantifying the operational stability of critical information infrastructure facilities exposed to information security threats. Methods. Cognitive methods: systems analysis, induction and deduction, analysis of a scientific problem, formalisation of scientific knowledge, construction of hypotheses. Operational methods: abstraction, specification, comparison, generalisation, analogy, simulation, expert evaluation. Results. The paper substantiates the relevance, defines – both verbally and formally – the scientific problem of quantifying the operational stability of critical information infrastructure facilities, suggests indicators for assessing the input data and the result. Conclusions. The authors systematically analysed the problem, which allowed substantiating the relevance of a potential solution, formalising it, substantiating the choice of the controllable and uncontrollable factors for assessing stability, defining the restrictions, suggesting the method for taking into account the dynamics of critical information infrastructure exposed to information security threats.

About the Authors

V. A. Voevodin
National Research University of Electronic Technology
Russian Federation

Vladislav A. Voevodin, Senior Lecturer, Department of Information Security, Candidate of Engineering, Associate Professor, Honorary Radio Operator of Russia

901, app. 160, Zelenograd, 124575



S. M. Tretyakov
Military Academy of the Signal Corps
Russian Federation

Sergey M. Tretyakov, Senior Lecturer, Department of Technical Support of Communications and Automation, Candidate of Engineering, Associate Professor

3, K-64 Tikhoretsky Prospekt, 194064, St. Petersburg



References

1. Gnedenko B.V., Beliaev Yu.K., Soloviev A.D. [Mathematical methods in the dependability theory]. Moscow: Nauka; 1965. (in Russ.)

2. Ushakov I.A., Litvak E.I. [Generalised indicators in the study of complex systems]. Moscow: Znanie; 1985. (in Russ.)

3. Polovko A.M., Gurov S.V. [Fundamentals of the dependability theory]. St. Petersburg: BHV-Peterburgl; 2006. (in Russ.)

4. Kashtanov V.A., Medvedev A.I. [Dependability theory of complex systems: 2nd edition, revised]. Moscow: Fizmatlit; 2010. (in Russ.)

5. Shubinsky I.B. [Structural dependability of information systems. Analysis methods]. Moscow: Dependability Journal; 2012. (in Russ.)

6. Shubinsky I.B. [Functional dependability of information systems. Analysis methods]. Moscow: Dependability Journal; 2012. (in Russ.)

7. Ushakov I.A. [Dependability: past, present, future: keynote speech of the opening of Mathematical Methods in Reliability (MMR-2000) conference, Bordeau, France, 2000]. Reliability: Theory & Applications 2016;1(1):17-27. (in Russ.)

8. Yusupov R.M., Musaev A.A. Efficiency of Information Systems and Technologies: Features of Estimation. SPIIRAS Proceedings 2017;2(51):5-34. (in Russ.)

9. Zegzhda D.P. [Cybersecurity of the digital industry. Theory and practice of functional resistance to cyber attacks]. Moscow: Goriachya liniya – Telekom; 2022. (in Russ.)

10. Kotenko I., Saenko I., Kotsynyak M., Lauta O. Assessment of Cyber-Resilience of Computer Networks based on Simulation of Cyber Attacks by the Stochastic Networks Conversion Method. SPIIRAS Proceedings 2017;6(55):160-184. DOI: 10.15622/sp.55.7

11. Shelupanov A.A., Iskhakov S.Yu., Shelupanov A.A., Meshcheryakov R.V. [Security of complex heterogeneous systems and networks. Theory and practice: a monograph]. Tomsk: Tomsk State University of Control Systems and Radioelectronics Publishing; 2015. (in Russ.)

12. Meshcheryakov R.V., Shelupanov A.A. [Comprehensive information security of automated systems: a monograph]. Tomsk: V–spektr Publishing; 2007. (in Russ.)

13. Konovalenko S. A. Methodology for assessing the functional stability of a heterogeneous system for detecting, preventing and eliminating the consequences of computer attacks. Systems of Control, Communication and Security 2023;4:157-195. (in Russ.). DOI: 10.24412/2410-9916-2023-4-157-195

14. Makarenko S.I. [Models of a communication system exposed to deliberate destabilising effects and intelligence: a monograph]. St. Petersburg: Naukoemkie tekhnologii; 2020. (in Russ.)

15. Makarenko S. I. Information conflict between a communication system and a system of destabilizing influences. Part III: Controlling of a communication system in conflict situation. Radio communication technology 2021;1(48):103-16. DOI: 10.33286/2075-8693-2021-48-103-116

16. Starodubtsev Yu.I., Zakalkin P.V. Sructural and functional analysis of the conflict situation between the state information security system and a foreign system of destructive influences. Cybersecurity issues 2024;4(62):82-91. DOI: 10.21681/2311-3456-2024-4-82-91

17. Yazov Yu.K. [Fundamentals of the methodology for quantifying the effectiveness of information protection in computer systems: a monograph]. Federal State Scientific Institution North Caucasus Scientific Centre of Higher Education. Rostov-on-Don: NCSCHE Publishing; 2006. (in Russ.)

18. Cherkesov G.N., Nedosekin A.O., Vinogradov V.V. Functional survivability analysis of structurally complex technical systems. Dependability 2018;18(2):17-24. DOI: 10.21683/1729-2646-2018-18-2-17-24

19. Cherkesov G.N., Nedosekin AO. Description of approach to estimating survivability of complex structures under repeated impacts of high accuracy. Dependability 2016;16(2):3-15. DOI:10.21683/1729-2646-2016-16-2-3-15

20. Ryabinin I.A. Reliability and safety of structurally complex systems. St. Petersburg: Polytekhnica; 2000. (in Russ.)

21. Voevodin V.A. [The genesis of the concept of structural resilience of the information infrastructure of an automated production process management system to the effects of targeted information security threats]. Vestnik of Voronezh Institute of the Russian Federal Penitentiary Service 2023;2:30-41. (in Russ.)

22. Voevodin V. A Model for Assessing the Functional Stability of Information Infrastructure Elements for Conditions of Exposure to Multiple Computer Attacks. Informatics and Automation 2023;22(3):691-715. DOI: 10.15622/ia.22.3.8

23. Voevodin, V. A. On the formulation of the task of assessing the stability of the functioning of critical information infrastructure facilities. Cybersecurity issues 2025;1(65): 41-49. DOI: 10.21681/2311-3456-2025-1-41-49.

24. Voevodin V.A., Krahotin N.A. Methods for assessing the connectivity of an undirected bipolar labeled graph taking into account the destructive impact of external threats on its vertices. Herald of Dagestan State Technical University. Technical Sciences 2024;51(1):46-60. (in Russ.) DOI:10.21822/2073-6185-2024-51-1-46-60


Review

For citations:


Voevodin V.A., Tretyakov S.M. On assessing the operational stability of critical information infrastructure facilities affected by information security threats. Dependability. 2025;25(4):69-76. (In Russ.) https://doi.org/10.21683/1729-2646-2025-25-4-69-76

Views: 105


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1729-2646 (Print)
ISSN 2500-3909 (Online)