ARTÍCULO
TITULO

Development of the model of the antagonistic agents behavior under a cyber conflict

Oleksandr Milov    
Serhii Yevseiev    
Yevheniia Ivanchenko    
Stanislav Milevskyi    
Oleksandr Nesterov    
Oleksandr Puchkov    
Anatolii Salii    
Oleksandr Timochko    
Vitalii Tiurin    
?leksandr Yarovyi    

Resumen

The results of the development of the model of the antagonistic agents behavior in a cyber conflict are presented. It is shown that the resulting model can be used to analyze investment processes in security systems, taking into account the assumption that investment processes are significantly influenced by the behavior of parties involved in a cyber conflict.General approaches to model development are presented. First of all, the system of concepts, assumptions and limitations is formed, within the framework of which a mathematical model of behavior must be developed. Taking this into account, the mathematical model of the conflicting agents behavior, presented in the form of algebraic and differential equations, is developed. The developed model presents both the technical characteristics of the security system and the psychological characteristics of the participants in the cyber conflict, which affect the financial characteristics of the investment processes in cybersecurity systems. A distinctive feature of the proposed model is the simultaneous consideration of the behavior of the parties to a cyber conflict not as independent parties, but as agents mutually interacting with each other. The model also makes it possible to simulate the destabilizing effect of the confrontation environment disturbances on the behavior of the conflicting parties, changing the degree of vulnerability of the cybersecurity system along various attack vectors and the level of their success.Using the developed model, simulation modeling of the interacting agents behavior in a cyber conflict is performed. The simulation results showed that even the simplest behavior strategies of the attacking side (?the weakest link?) and the defense side (?wait and see?) make it possible to ensure information security of the business process loop.The developed model of interaction between the attacker and the defender can be considered as a tool for modeling the processes of the conflicting parties behavior when implementing various investment scenarios. The simulation results enable decision-makers to receive support regarding the direction of investment in the security of the business process loop.

 Artículos similares

       
 
Tri Utomo, Eristia Arfi     Pág. 96 - 99
The persistently inequality of development between major cities and surrounding areas caused the displacement process, that are transport of supplies or human itself (urbanization) or commonly known as the transportation. The government has set a number ... ver más

 
S. Rahma, R. A. E. Putra     Pág. 76 - 83
The main role of a transportation network is providing optimum services for transportation network. Over the time, the population is increasing and the needs of reliable transportation network also increased. Transportation network consists of node and c... ver más

 
Carla Molz, David Scherb, Christopher Löffelmann, Johannes Sänger, Zhejun Yao, Andreas Lindenmann, Sven Matthiesen, Robert Weidner, Sandro Wartzack and Jörg Miehling    
This research aims to provide a co-simulation model to derive design optimizations for technical support systems regarding the user needs.
Revista: Applied Sciences

 
Christogonus U. Onukwube, Daniel O. Aikhuele and Shahryar Sorooshian    
Water distribution networks are complex systems that aid in the delivery of water to residential and non-residential areas. However, the networks can be affected by different types of faults, which could lead to the wastage of treated water. As such, the... ver más
Revista: Applied Sciences

 
Samiulhaq Wasiq and Amir Golroo    
Road networks play a significant role in each country?s economy, especially in countries such as Afghanistan, which is strategically located in the international transit path from Europe to East Asia. In such a country, pavement performance models are fu... ver más
Revista: Infrastructures