METHOD OF DISTRIBUTION OF MEANS OF INFORMATION SECURITY MONITORING SYSTEM ON PROTECTED INFORMATIZATION OBJECTS

Author(s):  
V. G. Eryshov ◽  
◽  
D.V. Ilina ◽  
Symmetry ◽  
2021 ◽  
Vol 13 (12) ◽  
pp. 2425
Author(s):  
Maria Poltavtseva ◽  
Alexander Shelupanov ◽  
Dmitriy Bragin ◽  
Dmitry Zegzhda ◽  
Elena Alexandrova

Modern cyber-physical systems (CPS) use digital control of physical processes. This allows attackers to conduct various cyberattacks on these systems. According to the current trends, an information security monitoring system (ISMS) becomes part of a security management system of CPS. It provides information to make a decision and generate a response. A large number of new methods are aimed at CPS security, including security assessment, intrusion detection, and ensuring sustainability. However, as a cyber-physical system operates over time, its structure and requirements may change. The datasets available for the protection object (CPS) and the security requirements have become dynamic. This dynamic effect causes asymmetry between the monitoring data collection and processing subsystem and the presented security tasks. The problem herein is the choice of the most appropriate set of methods in order to solve the security problems of a particular CPS configuration from a particular bank of the available methods. To solve this problem, the authors present a method for the management of an adaptive information security monitoring system. The method consists of solving a multicriteria discrete optimization problem under Pareto-optimality conditions when the available data, methods or external requirements change. The experimental study was performed on an example of smart home intrusion detection. In the study, the introduction of a constraint (a change in requirements) led to the revision of the monitoring scheme and a different recommendation of the monitoring method. As a result, the information security monitoring system gains the property of adaptability to changes in tasks and the available data. An important result from the study is the fact that the monitoring scheme obtained using the proposed management method has a proven optimality under the given conditions. Therefore, the asymmetry between the information security monitoring data collection and processing subsystem and the set of security requirements in cyber-physical systems can be overcome.


Author(s):  
Wahyuni Kurniasih ◽  
Abdul Rakhman ◽  
Irma Salamah

The house is the most valuable asset, therefore security at home is also very important. Therefore a home security system is created that combines a microcontroller with an Android smartphone application. The microcontroller used is the Raspberry Pi which is equipped with a camera as a home security monitoring system and various sensors as detectors such as magnetic, PIR sensors and solenoids as automatic door locks. So if the sensors that are installed detect something at home, then the homeowner will immediately get a notification sent by the database to the smartphone application, and the homeowner can monitor the state of the house right then through photos and videos recorded by cameras that have been installed at home.


Sign in / Sign up

Export Citation Format

Share Document