Development of multi-agent information security management system

The issue of creating an information security system is very relevant in the world today. One of the urgent tasks is to solve the issues of effective protection of information from both external and internal threats through the creation and implementation of information security management systems i...

Full description

Saved in:
Bibliographic Details
Main Authors: I. P. Khavina, Yu. V. Hnusov, O. O. Mozhaiev
Format: Article
Language:English
Published: Kharkiv National University of Internal Affairs 2022-12-01
Series:Law and Safety
Subjects:
Online Access:http://pb.univd.edu.ua/index.php/PB/article/view/634
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832572841442148352
author I. P. Khavina
Yu. V. Hnusov
O. O. Mozhaiev
author_facet I. P. Khavina
Yu. V. Hnusov
O. O. Mozhaiev
author_sort I. P. Khavina
collection DOAJ
description The issue of creating an information security system is very relevant in the world today. One of the urgent tasks is to solve the issues of effective protection of information from both external and internal threats through the creation and implementation of information security management systems in automated systems of enterprises, which, among other things, requires the formalization of the task of protecting information for its subsequent implementation by software and other means. Now there are security analysis systems, for example, that examine the security elements settings of workstations and servers operating systems, analyze the network topology, look for unprotected network connections, examine the settings of firewalls. The disadvantage of these systems is that they are not suitable for monitoring large volumes of network traffic. The solution to this problem is the use of monitoring tools capable of analyzing large amounts of data in real time. Therefore, a significant place in the article is given to the review of developments based on artificial intelligence technologies, namely multi-agent systems, review of information security models, threat risk assessment in automated systems. The functional architecture of the information security management system based on a multi-agent system has been proposed to search in real time for information security optimal solutions through the selection of such coalitions of protection mechanisms agents that will allow to build the optimal protection of the automated system according to the selected criteria. The model with complete overlapping of threats has been substantiated and adopted as a basis, which allows to analyze the overall situation and choose strategically important decisions directly during the organization of information security. The essence of of multi-agent systems functioning that implement a decentralized control system based on the work of autonomous agents that can be implemented programmatically has been revealed. The role of threat agents, resource agents, agents of protection mechanisms and their functional purpose have been defined. The problem of searching a set of protection mechanisms agents coalition for the current state of the automated system as a problem of optimal search by the criterion of protection cost, taking into account the value of information, has been generalized. Due to the modularity of the multi-agent system, the further work will be aimed at detailing its components and perfection.
format Article
id doaj-art-d4aa7cc9f459437b90e029201d53643e
institution Kabale University
issn 1727-1584
2617-2933
language English
publishDate 2022-12-01
publisher Kharkiv National University of Internal Affairs
record_format Article
series Law and Safety
spelling doaj-art-d4aa7cc9f459437b90e029201d53643e2025-02-02T07:34:15ZengKharkiv National University of Internal AffairsLaw and Safety1727-15842617-29332022-12-0187417118310.32631/pb.2022.4.14634Development of multi-agent information security management systemI. P. Khavina0Yu. V. Hnusov1O. O. Mozhaiev2Kharkiv National University of Internal AffairsKharkiv National University of Internal AffairsKharkiv National University of Internal AffairsThe issue of creating an information security system is very relevant in the world today. One of the urgent tasks is to solve the issues of effective protection of information from both external and internal threats through the creation and implementation of information security management systems in automated systems of enterprises, which, among other things, requires the formalization of the task of protecting information for its subsequent implementation by software and other means. Now there are security analysis systems, for example, that examine the security elements settings of workstations and servers operating systems, analyze the network topology, look for unprotected network connections, examine the settings of firewalls. The disadvantage of these systems is that they are not suitable for monitoring large volumes of network traffic. The solution to this problem is the use of monitoring tools capable of analyzing large amounts of data in real time. Therefore, a significant place in the article is given to the review of developments based on artificial intelligence technologies, namely multi-agent systems, review of information security models, threat risk assessment in automated systems. The functional architecture of the information security management system based on a multi-agent system has been proposed to search in real time for information security optimal solutions through the selection of such coalitions of protection mechanisms agents that will allow to build the optimal protection of the automated system according to the selected criteria. The model with complete overlapping of threats has been substantiated and adopted as a basis, which allows to analyze the overall situation and choose strategically important decisions directly during the organization of information security. The essence of of multi-agent systems functioning that implement a decentralized control system based on the work of autonomous agents that can be implemented programmatically has been revealed. The role of threat agents, resource agents, agents of protection mechanisms and their functional purpose have been defined. The problem of searching a set of protection mechanisms agents coalition for the current state of the automated system as a problem of optimal search by the criterion of protection cost, taking into account the value of information, has been generalized. Due to the modularity of the multi-agent system, the further work will be aimed at detailing its components and perfection.http://pb.univd.edu.ua/index.php/PB/article/view/634information security management systemsmulti-agent systemscoalitions of agentsmodel with complete overlap of threatsoptimal search for protection mechanisms.
spellingShingle I. P. Khavina
Yu. V. Hnusov
O. O. Mozhaiev
Development of multi-agent information security management system
Law and Safety
information security management systems
multi-agent systems
coalitions of agents
model with complete overlap of threats
optimal search for protection mechanisms.
title Development of multi-agent information security management system
title_full Development of multi-agent information security management system
title_fullStr Development of multi-agent information security management system
title_full_unstemmed Development of multi-agent information security management system
title_short Development of multi-agent information security management system
title_sort development of multi agent information security management system
topic information security management systems
multi-agent systems
coalitions of agents
model with complete overlap of threats
optimal search for protection mechanisms.
url http://pb.univd.edu.ua/index.php/PB/article/view/634
work_keys_str_mv AT ipkhavina developmentofmultiagentinformationsecuritymanagementsystem
AT yuvhnusov developmentofmultiagentinformationsecuritymanagementsystem
AT oomozhaiev developmentofmultiagentinformationsecuritymanagementsystem