Critical Information Infrastructures Security Modeling

The paper discusses the modeling of various aspects of the security of critical information infrastructures (CII) in the assumption of creating a reference model of CII security in the future. The features of CII in terms of goals and safety criteria based on the analysis of various regulatory and m...

Full description

Bibliographic Details
Main Authors: Sergey Erokhin, Andrey Petukhov, Pavel Pilyugin
Format: Article
Language:English
Published: FRUCT 2019-04-01
Series:Proceedings of the XXth Conference of Open Innovations Association FRUCT
Subjects:
Online Access:https://fruct.org/publications/fruct24/files/Ero.pdf
id doaj-ce7a1107d9d84aaf878c49ed8896ad69
record_format Article
spelling doaj-ce7a1107d9d84aaf878c49ed8896ad692020-11-24T21:30:36ZengFRUCTProceedings of the XXth Conference of Open Innovations Association FRUCT2305-72542343-07372019-04-01854248288Critical Information Infrastructures Security ModelingSergey Erokhin0Andrey Petukhov1Pavel Pilyugin2Moscow Technical University of Communications and Informatics, Moscow, RussiaMoscow Technical University of Communications and Informatics, Moscow, RussiaMoscow Technical University of Communications and Informatics, Moscow, RussiaThe paper discusses the modeling of various aspects of the security of critical information infrastructures (CII) in the assumption of creating a reference model of CII security in the future. The features of CII in terms of goals and safety criteria based on the analysis of various regulatory and methodically established definitions and descriptions of CII are established. The contradictions arising in the attempts to use the traditional methodology of information security in relation to CII are shown. The problems of using the methods and models of classical risk analysis are discussed, in particular, the impossibility of applying the concept of residual risk to the formation of CII safety objectives. The conclusion is made about the expediency of basing these goals on the exhaustion of possible protective measures (controls and activities), the concept of asymptotic safety management of CII , which guarantees the trend of security growth without its current assessment. Changes in the role and place of the threat model in ensuring the security of CII related to the lack of evidence of the completeness of this model are considered. The attractiveness of using the SDL technique for forming elements of the threat model in the conditions of a specific CII is indicated. The structure of the future reference model of safety of the CII including definition of the purposes and criteria of safety (including functional), multilevel static model of functioning of the CII (including security factors), a dynamic model of the spread of security incidents within the CII, the typology of the result of aggressive manifestations of the CII functioning environment (threat model) and the model (methodology) of the spread of protective activities within the information infrastructure.https://fruct.org/publications/fruct24/files/Ero.pdf monitoringcritical information infrastructuresoftware-defined networksecurity
collection DOAJ
language English
format Article
sources DOAJ
author Sergey Erokhin
Andrey Petukhov
Pavel Pilyugin
spellingShingle Sergey Erokhin
Andrey Petukhov
Pavel Pilyugin
Critical Information Infrastructures Security Modeling
Proceedings of the XXth Conference of Open Innovations Association FRUCT
monitoring
critical information infrastructure
software-defined network
security
author_facet Sergey Erokhin
Andrey Petukhov
Pavel Pilyugin
author_sort Sergey Erokhin
title Critical Information Infrastructures Security Modeling
title_short Critical Information Infrastructures Security Modeling
title_full Critical Information Infrastructures Security Modeling
title_fullStr Critical Information Infrastructures Security Modeling
title_full_unstemmed Critical Information Infrastructures Security Modeling
title_sort critical information infrastructures security modeling
publisher FRUCT
series Proceedings of the XXth Conference of Open Innovations Association FRUCT
issn 2305-7254
2343-0737
publishDate 2019-04-01
description The paper discusses the modeling of various aspects of the security of critical information infrastructures (CII) in the assumption of creating a reference model of CII security in the future. The features of CII in terms of goals and safety criteria based on the analysis of various regulatory and methodically established definitions and descriptions of CII are established. The contradictions arising in the attempts to use the traditional methodology of information security in relation to CII are shown. The problems of using the methods and models of classical risk analysis are discussed, in particular, the impossibility of applying the concept of residual risk to the formation of CII safety objectives. The conclusion is made about the expediency of basing these goals on the exhaustion of possible protective measures (controls and activities), the concept of asymptotic safety management of CII , which guarantees the trend of security growth without its current assessment. Changes in the role and place of the threat model in ensuring the security of CII related to the lack of evidence of the completeness of this model are considered. The attractiveness of using the SDL technique for forming elements of the threat model in the conditions of a specific CII is indicated. The structure of the future reference model of safety of the CII including definition of the purposes and criteria of safety (including functional), multilevel static model of functioning of the CII (including security factors), a dynamic model of the spread of security incidents within the CII, the typology of the result of aggressive manifestations of the CII functioning environment (threat model) and the model (methodology) of the spread of protective activities within the information infrastructure.
topic monitoring
critical information infrastructure
software-defined network
security
url https://fruct.org/publications/fruct24/files/Ero.pdf
work_keys_str_mv AT sergeyerokhin criticalinformationinfrastructuressecuritymodeling
AT andreypetukhov criticalinformationinfrastructuressecuritymodeling
AT pavelpilyugin criticalinformationinfrastructuressecuritymodeling
_version_ 1725962641261723648