Redirigiendo al acceso original de articulo en 15 segundos...
ARTÍCULO
TITULO

Development of the interacting agents behavior scenario in the cyber security system

Oleksandr Milov    
Serhii Yevseiev    
Volodymyr Aleksiyev    
Polina Berdnik    
Oleksandr Voitko    
Valentyn Dyptan    
Yevheniia Ivanchenko    
Maxim Pavlenko    
Anatolii Salii    
Serhiy Yarovyy    

Resumen

The results of modeling and analysis of scenarios of the behavior of interacting agents in conditions of cyber conflict are presented. General approaches to the development of a scenario of the behavior of antagonistic agents are presented. The definition of the scenario is given and the factors determining the scenario of behavior are highlighted. The given scenarios are determined by such factors as the ratio of the capabilities of the attacking and the defending sides, the presence or absence of information exchange between security agents, and the time of switching to a new attack vector. The value of the time of switching to a new attack vector is found, at which the interaction is more stable. This indicates that the reaction of the defense side should not be purely reactive, and the ?wait and see? strategy is not always the best. Modeling and analysis of the results were carried out in the conditions of information exchange between agents of the protection system and in the absence of such an exchange. The advantages and disadvantages of this behavior are noted. It is shown that when changing the time of switching to a new attack vector, not only the financial indicators of the activity of the participants in cyber conflict change, but also the nature of the interaction. The value of the time of switching to a new attack vector was found, in which the interaction is more stable, which suggests that the reaction of the defense side should not be purely reactive, and the ?wait and see? strategy is not always the best. It is shown how the proposed approach can be used to justify the choice of a strategy for agent behavior in security systems, as well as for economic assessments of countermeasures and their deterrent effect on attackers. The proposed scenarios can be considered as a useful tool for assessing investments in the security of the business process circuit by decision makers

 Artículos similares

       
 
Maria Acanfora, Marco Altosole, Flavio Balsamo, Luca Micoli and Ugo Campora    
The article deals with a simulation approach to the representation of the ship motions in waves, interacting with the propulsion system behavior (diesel engine and propeller). The final goal is the development of a simulator, as complete as possible, tha... ver más

 
Ziming Zhang, Xinping Wang, Chang Su and Linhui Sun    
Quality improvement is crucial for manufacturing, and existing research has paid less attention to the influence of regulatory factors and irrational factors of decision makers. Considering the impact of the reward and punishment strategy of the shared p... ver más
Revista: Applied Sciences

 
Eugene Ilyushin,Dmitry Namiot     Pág. 11 - 19
AI technologies, which have received an impetus in development in recent years due to the emergence of a significant amount of data and computing resources, have greatly influenced many areas of human life, and for some of them, they have become an integ... ver más

 
Vladimir Tregubov     Pág. 45 - 53
Synchronization covers a wide range of phenomena in different spheres, but there is not a single standard approach to its measure and each sphere requires additional research for development of various indicators for reflecting the degree of synchronizat... ver más

 
Edward J. Anthony, Eduardo S. Brondizio, Valdenira F. dos Santos, Antoine Gardel and Manon Besset    
The Amazon River delta may be currently characterized biophysically as a relatively preserved delta compared to the rampant vulnerability of many of the world?s large deltas. This status of relative preservation is reflected in a number of criteria: The ... ver más
Revista: Water