=Paper=
{{Paper
|id=Vol-2603/paper6
|storemode=property
|title=Intellectual analysis and basic modeling of complex threats
|pdfUrl=https://ceur-ws.org/Vol-2603/paper6.pdf
|volume=Vol-2603
|authors=Nikolai Korneev,Vyacheslav Merkulov
}}
==Intellectual analysis and basic modeling of complex threats==
Copyright © 2019 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0) Intellectual analysis and basic modeling of complex threats Nikolai Korneev Vyacheslav Merkulov Faculty of Integrated Security of Fuel and Energy Complex Faculty of Integrated Security of Fuel and Energy Complex Gubkin Russian State University of Oil and Gas (National Gubkin Russian State University of Oil and Gas (National Research University) Research University) Department of Data Analysis, Decision-Making and Moscow, Russia Financial Technology niccyper@mail.ru Financial University under the Government of the Russian Federation Moscow, Russia niccyper@mail.ru Abstract—The paper describes the basic principles of complex Consequences of threat implementation – a factor that threats modeling, and the task of complex threats detection is is caused by a specific threat implementation; it can formalized. The proposed modeling principles are based on the have a negative impact on the protected system or it idea of identifying the links between elementary threats as part of can be an exploited vulnerability for another threat. a complex one. As an example, the process of constructing a complex threat model based on the proposed modeling rules is given. Based on the examples presented in the work, the paper I. INTRODUCTION includes the description of tasks while working with complex Scientific publications of both domestic and foreign threats: the tasks of complex threats detection, the identification scientists [1-3, 7, 11-13, 15-20] show that in domestic of their inner structure and purposes of the implementation. and foreign literature and practice in this area, Based on the formulated principles of basic modeling, the rigorous mathematical models with criteria of control support paper also gives a formal statement of complex threats efficiency in the field of comprehensive security generally detection problem, which explains the possibility for applying do not exist, and the existing comprehensive security data mining algorithms and big data processing technologies systems do not solve the task of automated building a in the construction of protection systems against complex component-based model of a facility as part of threats and developing the neurographic theory of complex security. comprehensive facility safety control support [9]. In the case where the finite number of states of the Keywords— complex threats; complex threat model ; complex controlled facility at each moment of time is unknown, it is security; hybrid threats; complex threats detection; complex threats advisable to use a more sophisticated model similar detection method ; data mining algorithms; big data neurographic model [9]. processing, neurographic theory of complex security In retrospect, security threats were considered as atomic TERMS USED units unconnected to each other. This approach has led to the Protected system – a system in the conventional fact that elementary threats are currently well studied and sense, consisting of many security objects, not necessarily classified [5, 6], effective hardware and software solutions located in one space. have been developed to ensure security against them, also organizational and legal methods, general principles of Complex threat – a threat consisting of several different security are widely used. elementary threats, connected by means of certain synchronized mechanisms and not necessarily existing in one In practice, when analyzing security incidents and risks, it space. often becomes obvious that there are internal links between a set of elementary threats, which form a system. Hybrid threat – a variation of a complex threat, which necessarily contains elementary threats that affect The presence of certain properties in this system allows us different areas of the protected system. to consider the constituent elements of the system not as atomic (elementary) threats, but as a complex security threat. Exploited threat vulnerability – a factor based on the properties of the protected system or methods of The paper contains an example of the formation protection, which is used in the implementation of a specific and implementation of a complex threat consisting of elementary threat. several elementary threats connected in a certain way. Threat implementation mechanism – a set of actions, which It is also worth noting that the existence of hybrid threats is actively use available exploited vulnerabilities and are aimed at closely related to the term “hybrid war” [4, 8, 10]. These are the threat implementation. subtypes of complex threats and characterized by the property 23 Copyright © 2019 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0) of forming and implementing the threat components not in a III. EXAMPLE OF BUILDING A BASIC MODEL OF A single space (for example, only in the physical) and in several COMPLEX THREAT spaces simultaneously (for example, in physical and Let us consider an example of the formation and information space). implementation of a complex threat, which can be called Complex threats, as a separate type of threat, require the hybrid, as elementary attacks in its composition exist in creation of theoretical foundations for security; on their basis, it different spaces. is possible to ensure the development of appropriate integrated Example: a group of intruders implements a hybrid threat security systems. against a FEC enterprise. The purpose of the attack is to cause economic and reputational damage to the enterprise; the subject II. BASIC MODEL OF COMPLEX THREAT of the attack – confidential information of loyalty cards of end- As an object of research, complex threats require certain use customers; the protected system is directly a FEC methods of formalization, i. e. principles and tools for enterprise. In this example, the hybrid threat is implemented in modeling, which are currently missing. The following are the several stages: rules for basic models formation of complex threats. 1. Exploiting software vulnerability in corporate PACS, The complex threat C can be represented as a combination inaccurate data is added to the identification code database. of a set (1) of the elementary threats T and a set R of 2. Having the ability to pass the perimeter of physical interconnections between them: protection freely, since there are false entries in PACS database, C =; the intruder penetrates into the protected area. |T| > 1; (1) 3. While in the protected area, the intruder detects a storage medium, which contains confidential data and creates its |R| > 1. physical copy. The elementary threat ti ∈ T consists of (2) (3) non-empty 4. Copied confidential information distributes to public sets of exploited vulnerabilities V, mechanisms for sources, which causes economic and reputational damage to the implementing M and consequences of implementing threat A: protected system. t i = < Vti , Mti , Ati >, (2) Reputational damage involves the reduction of the consumer trust to the company’s ability to ensure the protection Vti = {v1 , v2 , … , vn }; of personal customer data. Mti = {m1 , m2 , … , mk }, (3) The economic damage involves loyalty cards usage without Ati = {a1 , a2 , … , ap }. the need for their legal acquisition and participation in the loyalty program, as you can purchase stolen data from the To avoid further conglomeration of indexes, we consider intruder. records of the form v1 equivalent to v(1). We formalize this example of a hybrid threat into a basic A link ri,j ∈ R between elementary threats ti and tj exists, if model. Its general view (5): at least, one consequence of the threat implementation ti (ap ∈ C = ; Ati ) is an exploited threat vulnerability (vn ∈ Vtj ), i. e. between ap and vn there is some equivalence relation. |T| = 4; (5) Thus, the set R can be represented as a two-dimensional |R| = 4. matrix, the rows and columns of which contain elements of the Let us consider the structure of elementary threats t1, t2, t3, set T, and at the intersection of i row and j column there is an t4 and correlations r between them. element ri,j, showing the existence of a connection between threats ti and tj. To simplify the model, the power of the sets V, M, A of every elementary threat is equal to one, i. e. |V| = 1, |M| = 1, |A| The nature of such a connection is an open question for = 1 for all t ∈ T. further research, however, in a simplified version it is proposed to use binary values for elements of the set R (there is either a Further, we consider the problem of modeling non- connection, then ri,j = 1, or not, in this case ri,j = 0) (4). obviousness and threat implementation, especially hybrid threats, that depends on the power of the sets V, M, A. 1, ∃ ap ∈ Ati , �ap ~ vn � ∧ (vn ∈ Vtj ) ri,j = � �. (4) In this example, the elementary threat t1 arises, implements 0, otherwise and generates consequences only in the information space, as it The above-mentioned modeling principles allow you to is based in the PACS software vulnerability and implements by make a formalized model of a complex threat, which has a the intruder distantly, changing the reliability and accuracy of minimum set of parameters for further research. the confidential database (6): t1 = < Vt1 , Mt1 , At1 >, (6) 24 Copyright © 2019 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0) software vulnerability Vt1 = � �; in the identifier store PACS Mt1 = {exploiting a software vulnerability}; violation of data reliability A t1 = � �. in the identifier store The elementary threat t2 arises in the information space, as it is based on unreliable data in the identifier store; implemented in the physical space by penetration of the intruder into the Fig. 1. Mapping elements of the set R in the matrix form protected area; also produces consequences in physical space, providing the intruder with access to physical storage media (7): In fact, the represented matrix is a connectivity matrix for a t 2 = < Vt2 , Mt2 , At2 >, (7) directed graph (Fig. 2). violation of data reliability Vt2 = � �; in the identifier store penetration into the protected Fig. 2. Representation of the C model as a directed graph Mt2 = � area via PACS �; without being detected The construction of such kind of graphs allows you to At2 = {access to physical storage media}. visualize the investigated complex threats and the correlation of elementary threats. The elementary threat t3 arises in the physical space, because it is based on access factor of the intruder to physical As illustrated in the considered example, the proposed storage media; it also implements in the physical space, using system of complex threats modeling can be used as a theoretical the media copy mechanism; generates consequences in the basis for constructing formalized descriptions of complex information space, that is characterized by the possession of threats for their further analysis. confidential information (8): IV. PROBLEMATICS OF COMPLEX THREATS t 3 = < Vt3 , Mt3 , At3 >, (8) The assumption about the sets V, M, A power is made to Vt3 = {access to physical storage media}; simplify the understanding of the example. In practice, as it was shown (2) (3), these sets are strictly non-empty, and their power Mt3 = {copying of the physical storage media}; can be quite large. We give an example of a complete At3 = {access to confidential data}. composition of these sets based on t2 (11): The elementary threat t4 arises and is implemented in the violation of data reliability ⎧ of the identifier store; ⎫ information space, it means that an intruder has a confidential ⎪ ⎪ access and has the ability to distribute the confidential data to ⎪ PACS is unequipped by ⎪ general public; however, threat implementation generates ⎪ supplementary power supply; ⎪ consequences in the economic and social spaces, damaging the 𝑉𝑉𝑡𝑡2 = recruitment of a company employee; ; company’s reputation and the financial performance of the ⎨ blackmailing a company employee; ⎬ company (9): ⎪ presence of weaknesses in the ⎪ ⎪ ⎪ t 4 = < Vt4 , Mt4 , At4 >, (9) ⎪ physical guard band (obstacles); ⎪ ⎩ the possibility of a power outage. ⎭ Vt4 = {access to confidential data}; penetration into the Mt4 = {confidential data distribution}; ⎧ protected area via PACS ⎫ ⎪ ⎪ image and economic ⎪ without being detected; ⎪ A t4 = � �. ⎪ penetration into the territory ⎪ damage to the enterprise As the sets V, M, A were presented in a simplified form, the Mt2 = during the PACS shutdown; ; (11) ⎨ using ID of recruited ⎬ elements of the set R are also easy to model (10): ⎪ ⎪ ⎪ agent to evade PACS; ⎪ Vt2 ~At1 → r1,2 = 1; penetration through the ⎪ ⎪ Vt3 ~At2 → r2,3 = 1; (10) ⎩weak point of physical obstacles.⎭ Vt4 ~At3 → r3,4 = 1. For clarity, we also give the matrix form, representing the set R in this case (Fig. 1). 25 Copyright © 2019 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0) access to physical storage media; ⎧ physical access to workstations; ⎫ ⎪ ⎪ ⎪ physical access to servers; ⎪ ⎪ physical access to internal ⎪ 𝐴𝐴𝑡𝑡2 = computer communication; . ⎨ physical access to internal ⎬ ⎪ electric service lines; ⎪ ⎪ ⎪ ⎪ physical access to the ⎪ ⎩ fire protection system. ⎭ A deeper analysis of vulnerabilities can give the full Fig. 4. Mapping an example of the set R as a graph composition of the sets V, M, A, however, we will focus on the above example and make a few remarks: In the problem discussed above, the elementary threat t1 was Comment 1. It is obvious that between the elements of sets accepted as ‘initial’, i.e. implemented the first (in terms of the V and M must also be a certain connection. In this example, the linear time flow). The connection r4,1 means that there is a presence of the intruder inside the protected system transition to the threat t1 from t4, i.e. literally ‘threat (3) (4) implementation t4 will make consequences At4 , which can be (vulnerability vt2 or vt2 ) allows not only to use its ID to (3) used in the threat t1 as vulnerabilities Vt1 ’. deceive the PACS (mechanism mt2 ), but also to break the (6) Obviously, the connection may exist in the model, but it power supply of the PACS (vulnerability vt2 ), then penetrate (2) does not make practical sense at first glance, if t1 is considered the area while PACS' inoperability (mechanism mt2 ). as ‘initial’ threat, to which there is no need to return. According to the authors, this connection can be defined as In addition, with such a set of connections in R it becomes follows: for an intruder to be able to use this mechanism mi ∈ unclear which elementary threat among t1-t4 is an aim for the M to implement the elementary threat, this mechanism mi must intruder, i.е. that one of them will allow him to achieve the goal be based on at least one exploited vulnerability vi ∈ V. At the of a complex attack. same time, the increase of vulnerabilities vi, upon which the Returning to the considered example of complex threat, the mechanism mi depends, have to increase the probability that whole process of its formation and implementation was known, intruders will use the mi mechanism when implementing an therefore it became possible to make a model and track the elementary threat. relation between threats. The tasks such as complex threat Comment 2. Adding elements to all the sets V, M, A for the detection, the determination of its purpose and the order of remaining elementary threats t1, t3 and t4, and having done an elementary threats implementation as a part of it, did not require additional analysis of the received model, the content of the set a solution – this information was contained in the initial data. R requires clarification, since one cannot rule out the possibility However, as follows from all of the above, it is these tasks that of additional connections that will be modeled on the basis of are the main ones and the most difficult to solve. the data added to the model. Let us consider another example of mapping the set R into V. COMPLEX THREATS DETECTION a matrix form, without reference to the previously considered In reality, for complex and hybrid threats protection, we can problem, and make an appropriate graph (Fig. 3, Fig. 4). point out two the most important tasks: 1. Detection of a complex threat presence. 2. Determining the goal of a complex threat. Ideally, the human thinking can assume the presence of a complex threat only after the implementation of at least two elementary attacks. In the given example, if the security expert knows only the fact of the attack, implementing the threat t1, it is quite Fig. 3. Mapping an example of the set R into a matrix complicated for him to make a conclusion about the presence of a complex threat based on such information. The connection r2,3 and r2,4 (Fig. 4) means, that the threat t2 If the expert knows about the threat implementation t2 – he can be implemented in the way, that the threat implementation may already have certain assumptions and conjectures about the t3 will no longer be necessary before implementation t4, since existence of a connection between t1 and t2, i.е. about the required vulnerabilities (Vt4 ) for t4 will already exist as a result existence of r1,2. We can make the following conclusions: of the threat t2 (At2 ). However, such reasoning is true only if t4 is accepted as the target of a complex attack. 1. The task of detecting the presence of a complex threat can be kept to define the set of links R, if the content of the set 26 Copyright © 2019 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0) of elementary threats T is known (moreover, the full description |T| > 1; (12) of this set is required). |R| > 1; 2. Attempts to detect complex and hybrid threats by humans will be “late” for at least two elementary attacks t, as T ⊆ Tp. this number allows to conclude that there is at least one link r. That is, for any complex threat C, the set of elementary If a complex threat consists of three planned attacks – the threats T will always be formed from the elements of the set of ‘human’ detection system is almost useless. potential elementary threats Tp. Let us consider the question of determining the goal of a 2. Current complex threat model – an updated model in the complex threat. Despite the fact that the complex threat includes form of C = , created on the basis of information many elementary threats T, which can cause some damage on available at a discrete instant of time about the implemented their own, the real (main) purpose of a complex threat, in complex threat C. general, is only one – it is a deep systemic vulnerability in the protected system. 3. Proposed complex threat model – immutable model C = , formed by an intelligent algorithm based on its The main purpose of a well-planned and implemented operational internal rules and knowledge about possible complex threat is not obvious to the security service until the complex threats models. intruder reaches the target, in some cases – after, because the consequences of a complex threat implementation and the In fact, having extensive information about the components achievement of the main goal can be hidden and stretched over of the set of potential elementary threats Tp, to synthesize the time. rules of detection of a specific complex threat C you will have to create a set of assumed integrated threat models C, and then The example considered above (Fig. 4) is a visual – compare the assumed models with the current model to representation of the purpose of a complex threat uncertainty. identify the most reliable ones. The Elementary threats t1-t4 are occurred through vulnerabilities, which are the consequences of other threat. To detect complex threat C, let N putative models of Neither goals of the complex threat nor the order of its complex threats (i = 1..N) be synthesized, with each implementation is obvious. such model satisfying the rules (12) and (2). We introduce the set to denote the current complex threat model C, Fig. 5 presents a situational pattern, wherein the expert is which also satisfies (12) and (2). aware of seven potential elementary threats and the existence of the connection of r1,2: As the complex threat C is implemented, its current model will be supplemented not only with new connections r, but also with the elements of the set Tс. Having calculated the evaluation function (13), where d (p, q) - is a certain measure of similarity, we obtain the closest to the current model the estimated model , which can be considered the most likely case scenario at discrete time: 𝑁𝑁 min(𝑑𝑑𝑖𝑖=1 (< 𝑇𝑇𝑖𝑖 , 𝑅𝑅𝑖𝑖 >, < 𝑇𝑇𝑐𝑐 , 𝑅𝑅𝑐𝑐 >)). (13) Thus, it is proposed to reduce the complex threat detection to finding the most “similar” model among the set of pairs of proposed models , which will be made by a special intelligent algorithm. Fig. 5. An example of a lack of knowledge about a partially implemented complex threat VII. CONCLUSION The task of predicting the next threat implementation, in this The proposed rules for the complex threats formalization case, seems to be quite difficult for human thinking even for into a basic model can be used as a basis for further research in seven threats. In reality, the number of potential threats that can the direction of the theory of complex security and hybrid be implemented next, can be measured in hundreds. threats protection, neurographic theory of complex security [9]. The example of constructing a basic model, given in the VI. METHOD INTELLIGENT DETECTION METHOD OF work, shows its applicability. The basic model can be COMPLEX THREATS supplemented with various aspects that will improve the We introduce three main terms. accuracy of the created models. 1. Potential elementary threats Tp – the set of all elementary In addition, some aspects identified in the paper remain threats existing within the considered protected system. In this open for further research, for example, the nature of the links case, the elements of the set Tp also satisfy (2), and the record between elementary threats. (1) can be supplemented in the following way (12): The second most important result of the work is the C = ; conclusion of a formalized task of complex threats detection 27 Copyright © 2019 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0) (13). The issue, in fact, directly leads to artificial intelligence [2] Barceló-Rico, F., Esparcia-Alcázar, A. I., & Villalón-Huerta, A. (2016). algorithms usage and big data processing in the construction of Semi-supervised classification system for the detection of advanced persistent threats. In Recent Advances in Computational Intelligence in integrated security systems, as there are three big tasks: Defense and Security (pp. 225-248). Springer, Cham. 1. Potential modeling of complex threats. The problem can [3] Chan, K. Y., Kwong, C. K., Wongthongtham, P., Jiang, H., Fung, C. K., be solved by creating an artificial intelligence system that has Abu-Salih, B., ... & Jain, P. (2018). Affective design using machine learning: a survey and its prospect of conjoining big data. International decent knowledge about complex threats modeling, the Journal of Computer Integrated Manufacturing, 1-19. structure of internal relationships, the features of the complex [4] Davis Jr, J. R. (2015). Continued evolution of hybrid threats. The Three threats implementation, etc. Sword Magazine, 19(28). Such knowledge can only be obtained by processing large [5] Elnagdy, S. A., Qiu, M., & Gai, K. (2016, June). Cyber incident classifications using ontology-based knowledge representation for amounts of data, collected during the operation of security cybersecurity insurance in financial industry. In 2016 IEEE 3rd monitoring systems. In general, there arises a range of tasks International Conference on Cyber Security and Cloud Computing typical for Big Data technologies, which are already widely (CSCloud) (pp. 301-306). IEEE. used in many fields, including the fields of data security and [6] Elnagdy, S. A., Qiu, M., & Gai, K. (2016, June). Understanding taxonomy cyber security systems [1, 9, 11, 13, 15, 16, 18]. of cyber risks for cybersecurity insurance of financial industry in cloud computing. In 2016 IEEE 3rd International Conference on Cyber Security 2. Creation of rules for determining the most similar and Cloud Computing (CSCloud) (pp. 295-300). IEEE. anticipated and current models of complex threats. The solution [7] He, Z., Situ, H., Zhou, Y., Wang, J., Zhang, F., & Qiu, M. (2018, May). of this problem includes a wide range of possibilities for A Fast Security Evaluation of Support Vector Machine Against Evasion applying data mining algorithms (Data Mining). Attack. In 2018 IEEE 4th International Conference on Big Data Security on Cloud (BigDataSecurity), IEEE International Conference on High Among the Data Mining algorithms used in relation to this Performance and Smart Computing,(HPSC) and IEEE International Conference on Intelligent Data and Security (IDS) (pp. 258-263). IEEE. problem can be noted clustering, classification and affinity [8] Hunter, E., & Pernik, P. (2015). The challenges of hybrid warfare. analysis. It is possible to use regression analysis and genetic International Centre for Defence and Security. algorithms. Data Mining technologies are also widely used in [9] Korneev, N. V. (2019, January). A Neurograph as a Model to Support many areas of activity, successfully solving assigned tasks, Control Over the Comprehensive Objects Safety for BIM Technologies. including the field of security [2, 3, 7, 9, 12, 17]. In IOP Conference Series: Earth and Environmental Science (Vol. 224, No. 1, p. 012021). IOP Publishing. 3. Tracking and current integrated threat modeling. [10] Mälksoo, M. (2018). Countering hybrid warfare as ontological security According to the authors, this task can be solved by creating management: the emerging practices of the EU and NATO. European certain analysis and information system, which can be based on security, 27(3), 374-392. existing corporate information systems and security tools [11] Mishra, A. D., & Singh, Y. B. (2016, April). Big data analytics for security within specific enterprises. Integration and data flow and privacy challenges. In 2016 International Conference on Computing, monitoring [14], emphasis on critical deviations, events Communication and Automation (ICCCA) (pp. 50-53). IEEE. recording and relation determination by methods of intellectual [12] Mohammed, B., Awan, I., Ugail, H., & Younas, M. (2019). Failure analytics are the main assets, the totality of which will solve this prediction using machine learning in a virtualised HPC system and application. Cluster Computing, 22(2), 471-485. problem. [13] More, Rohit, et al. "Real time threat detection system in cloud using big The paper describes the basic principles of complex threats data analytics." 2017 2nd IEEE International Conference on Recent modeling, and the task of complex threats detection is Trends in Electronics, Information & Communication Technology (RTEICT). IEEE, 2017. formalized. The proposed modeling principles are based on the [14] Offia, C. E., & Crowe, M. (2019). A theoretical exploration of data idea of identifying the links between elementary threats as part management and integration in organisation sectors. International Journal of a complex one. As an example, the process of constructing a of Database Management Systems, 11(1), 37-56. complex threat model based on the proposed modeling rules is [15] Petrenko, S. A., & Makoveichuk, K. A. (2017). Big data technologies for given. Based on the examples presented in the work, the paper cybersecurity. In CEUR Workshop (pp. 107-111). includes the description of tasks while working with complex [16] Rawat, D. B., Doku, R., & Garuba, M. (2019). Cybersecurity in Big Data threats: the tasks of complex threats detection, the identification Era: From Securing Big Data to Data-Driven Security. IEEE Transactions of their inner structure and purposes of the implementation. on Services Computing. Based on the formulated principles of basic modeling, the paper [17] Singh, J. (2014, March). Real time BIG data analytic: Security concern also gives a formal statement of complex threats detection and challenges with Machine Learning algorithm. In 2014 Conference on IT in Business, Industry and Government (CSIBIG) (pp. 1-4). IEEE. problem, which explains the possibility for applying data [18] Srivastava, Neha, and Umesh Chandra Jaiswal. "Big Data Analytics mining algorithms and big data processing technologies in the Technique in Cyber Security: A Review." 2019 3rd International construction of protection systems against complex threats and Conference on Computing Methodologies and Communication (ICCMC). developing the neurographic theory of complex security [9]. IEEE, 2019. [19] Stepanova, T., Pechenkin, A., Lavrova, D. Ontology-based big data approach to automated penetration testing of large-scale heterogeneous REFERENCES systems (2015) ACM International Conference Proceeding Series, 08-10- [1] Anavangot, Vijay, Varun G. Menon, and Anand Nayyar. "Distributed Big Sep-2015, DOI: 10.1145/2799979.2799995. Data Analytics in the Internet of Signals." 2018 International Conference [20] Probabilistic Modeling in System Engineering / By ed. A. Kostogryzov – on System Modeling & Advancement in Research Trends (SMART). London: IntechOpen, 2018. 278 p. DOI: 10.5772/intechopen.71396. IEEE, 2018. 28