=Paper=
{{Paper
|id=Vol-2616/paper28
|storemode=property
|title=Method of Cybersecurity Level Determining for the Critical Information Infrastructure of the State
|pdfUrl=https://ceur-ws.org/Vol-2616/paper28.pdf
|volume=Vol-2616
|authors= Sergiy Gnatyuk, Viktoriia Sydorenko, Artem Polozhentsev, Andriy Fesenko, Nurbol Akatayev, Gulnaz Zhilkishbayeva
|dblpUrl=https://dblp.org/rec/conf/coapsn/GnatyukSPFAZ20
}}
==Method of Cybersecurity Level Determining for the Critical Information Infrastructure of the State==
Method of Cybersecurity Level Determining for the Critical Information Infrastructure of the State Sergiy Gnatyuk 1,2,3[0000-0003-4992-0564], Viktoriia Sydorenko 1[0000-0002-5910-0837], Artem Polozhentsev 1[0000-0003-0139-0752], Andriy Fesenko4 [0000-0001-5154-5324], Nurbol Akatayev 5[0000-0001-5139-0792] and Gulnaz Zhilkishbayeva 3[0000-0001-9955-5994] 1 National Aviation University, Kyiv, Ukraine 2 State Scientific and Research Institute of Cybersecurity Technologies and Information Protection, Kyiv, Ukraine 3 Yessenov University, Aktau, Kazakhstan 4 Taras Shevchenko National University of Kyiv, Kyiv, Ukraine 5 Satbayev University, Almaty, Kazakhstan s.gnatyuk@nau.edu.ua, v.sydorenko@ukr.net, artem.polozhencev@gmail.com, aafesenko88@gmail.com Abstract. Protection of the state’s critical information infrastructure is a complex process, which requires effective tools for entities’ identification, assessing their criticality, threat and vulnerability assessment, protection against threats and also determining the cybersecurity level of the individual entities, industries, regions, and countries. The conducted analysis is shown that today there is no complex, multifunctional method which helps to evaluate the cybersecurity level of the critical information infrastructure entity or a certain industry of the state. With that in mind, in this paper the method of determining the cybersecurity level of the state’s critical information infrastructure was developed, taking into account the advantages and disadvantages of the known approaches. The method will be useful for CSIRT groups (or any other parties, who is responsible for cybersecurity in organization) to analyze a particular industry and evaluate its cybersecurity level. The developed method allows to calculate quantitative parameters, describing the analyzed sector, also to compare the security level of the critical entity before and after implementation of certain security measures. For example, the usage of the mentioned method in the civil aviation was shown but it can be used in various critical infrastructure sectors. Keywords: cybersecurity index, critical information infrastructure, civil aviation, cybersecurity level determining. 1 Introduction The current trends in the development of information and communication technologies (ICT) caused a phenomenal dependence on social services, which are provided by various sectors of infrastructure. Today, with the cutting-edge Copyright © 2020 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). COAPSN-2020: International Workshop on Control, Optimisation and Analytical Processing of Social Networks technologies, fundamentally new global concepts have emerged, such as information and cyber space, cybersecurity, cyber threat, critical infrastructure (CI), which have nearly unlimited power and a leading role in the economic and social development of each country in the world. However, in addition to its benefits, there are a number of problems caused by the growing vulnerability of the information assets from external cybersecurity impact, which the world’s community has also received. A number of planned in advance, well-executed attacks in cyberspace increase every year, these are so-called APT attacks (Advanced Persistent Threat). According to that, there is a need to control and further regulate the relevant relationships in cyberspace, and therefore urgently creat a reliable cybersecurity system [1]. In October 2017, the Parliament of Ukraine has signed the Law “On Basic Principles of Cybersecurity of Ukraine” [2], in that paper Article 8 clearly describes the definitions, main tasks and stages of the National Cybersecurity System operation. In order to provide the necessary protection (vital interests of the individual, society and state, national interests of Ukraine in cyberspace) of critical information infrastructure (CII) sectors, according to [2], it is necessary to constantly maintain and improve the National Cybersecurity System of Ukraine, by developing and rapidly adapting the public cybersecurity policie; creating a legal and terminological framework for cybersecurity; establishing the mandatory information security requirements of CII sectors; involing the expert scientific institutions, professional and public associations in the preparation of conceptual documents in the cybersecurity field; conducting drills for emergency situations in cyberspace; developing and improving the technical and cryptographic information protection systems; ensuring compliance with the requirements of the legislation on protection of state’s information resources and public information; periodicaly review the National Cybersecurity System; developing the cybersecurity indicators etc. 1.Identification the state CII 2.Assessment the importance 3.Assessment vulnerabilities objects and forming the list of (criticality) of the state CII and threats of the state CII them objects objects 4.Development and 5.Identification the level of implementation methods and cybersecurity of state CII tools of the state CII objects objects protection Fig. 1. The general scheme of the state CIIP stages Rather complicated issues are the development of appropriate indicators and determination of the required protection level of cybersecurity, according to which the price of the security system will not be higher than the usefulness of the information to be protected. This problem can be solved, for example, by determining the necessary level of cybersecurity for a certain facility or relevant CII sector, according to basic approach, presented in [3] and CIIP concept (Fig. 1, Stage 5). Copyright © 2020 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). COAPSN-2020: International Workshop on Control, Optimisation and Analytical Processing of Social Networks 2 Related research analysis and problem statement In 2016, the International Telecommunication Union (ITU) conducted a complex study of the cybersecurity level of 143 countries. In 2017 the main results were announced in the report [4], accroding to which, the method for assessing state’s security in cyberspace was proposed. It has five pillars – Legal Measures, Technical Measures, Organizational Measures, Capacity Building, and Cooperation. There are twenty-five pillars in total of all indicators. Global Cybersecurity Index (GCI) is calculated as the arithmetic mean of all pillars. A representative from an analised state should answer the 157 question to compleate the poll. Having received the answers, ITU has defined a state’s index and a global ranking list was created. State’s security level in cyberspace takes value from “1” (highest) to “0” (smallest). What allows to define a worldwide overwiev of the cybersecurity level, to assess the protection level in some parts of the world and to analyze the cybersecurity level of each state separetly. The main disadvantage of this approach is unjustified used indicators, their assessment is subjective. Thus, obtaining the reliable data is a complicated task. A flexible method for determining the cybersecurity level is reflected in [5]. The authors propose to use cybersecurity metrics that can be used for evaluation, revision, and improvement of the research entity cybersecurity level. The approach is based on the metrics, which companies and organizations are using in their business processes. To determine the new metric or specific measures, which mathematically described, a set of relevant parameters should be identified. They can be used to analyze and continually improve the business of an organization or a state. The matrics usage is widely used nowadays. The disadvantages of this approach are preliminary modeling, mathematical justification for the development and implementation of these metrics, which is a difficult problem, also the result may not be unbiased enough. A comprehensive method is proposed in [6].The cybersecurity level can be determined by using completely independent metrics NSCI (National Cyber Security Index) and ISD (Informational Society Score). NSCI consists of some sub-indexes: ISD is divided on the following sub-indexes – IDI (The ICT Development Index) and NRI (Networked Readiness Index) [7]. The disadvantage of this method is necessity to allocate considerable resources for research due to the large number of indicators in order to collect a reliable data. Mathematical and statistical approach is described in [8]. It is a method for assessing the cybersecurity level of CII assets, which allows to calculate a criticality index of the entity. In order to implement the method, it is necessary to identify key indicators, such as Severity level, the Availability of continuous operation systems, Cost, Downtime etc. Thereafter, a weighting factor must be used for each determinant indicator. Each of them must have a value from “0” to “100”, according to the proposed scale of the value calculation. The mportance index of the CII entity can be calculated based on the value of its criticality index. The disadvantage of this method is a difficult adaption to the new systems and complexity of justifying weighting factors and indicators. In the next paper [9] was proposed a methodology for assessing ICT security, using the example of automated banking systems, which is based on the concept of a complex security management of those systems. The mentioned concept Copyright © 2020 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). COAPSN-2020: International Workshop on Control, Optimisation and Analytical Processing of Social Networks provides a mutually valid approach to select the most effective ways of achieving the cybersecurity goals. Which also is taking into account the risk value at each level of the management model. It makes it possible to comprehensively select the alternative options for potential cybersecurity strategic decisions. However, the proposed concept is focused exclusively on the banking sector and is not flexible, which means it can not be used for other CII sectors. According to [3], the analysis results of the mentioned approaches of determining the cybersecurity level by the following criteria are reflected (Table 1): CS is consideration of cybersecurity means and measures; ICT is consideration of ICT implementation; QP is quantitative parameters; CIIP is CII sector protection; UM is universality [10-11]. Table 1. Cybersecurity level determination approaches Criteria CS ICT QP CIIP UM Name ICT Development index (ITU) + + + – – Method Black, Scarfone, Souppaya + + + – – NCSI (EGA) + + + – – Nestruhin's method – – + + – Yevseev's method + + + – – The analysis shows that the existing methods have a list of disadvantages, including unsubstantiated indicators, which are needed to develop metrics, complex modeling of the given systems, the need to use a complex mathematical tools, statistical resources involvement, which is needed for further analysis and creation of the cybersecurity metrics. Given the need to assess the cybersecurity level of a CII sector, a method for determining the cybersecurity level of the state’s CII sector needs to be developed. This issue will be a main target of this work. 3 The main part of the study A. Proposed method descryption According to [3] the method of determining the cybersecurity level of the CII sector is implemented in the following 3 stages: 1. Determination of metrics and cybersecurity index of a CII sector; 2. Determination of the ICT development and implementation metrics of a CII sector; 3. Calculation of quantitative parameters, that describe the cybersecurity level of a CII sector. Input data: information regarding critical infrastructure, cybersecurity methods and tools, ICT implementation. Output data: quantitative parameters, that describe the security of a particular industry or the state’s CII in general. Namely, cybersecurity metrics, ICT development and implementation metrics, also a relevant cybersecurity index. Consider in details each of the stage of the proposed method by itself. Stage 1. Determination of the metrics and the cybersecurity index of a CII sector Step 1.1. Formalization of the cybersecurity metrics Copyright © 2020 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). COAPSN-2020: International Workshop on Control, Optimisation and Analytical Processing of Social Networks Declaring a basic set of the cybersecurity metrics P : n P { Pi } {P1 , P2 , , Pn }, (1) i 1 where Pi P (i = 1, n) is a metrics subset. Based on the approach proposed in [12-13], the set (1) can be represented as a linked list as it shown in Fig. 2: P1 P2 ... Pn head / P tail Fig. 2. Representation of a basic set of cybersecurity metrics as a linked list The set Pi can be represented as a subset system: mi Pi { Pij } {Pi.1 , Pi.2 , , Pi.mi }, (2) j 1 where Pij (i = 1, n, j = 1, mi ) is metrics list of the i parameter (the metric’s range value is determined according to appropriate standards and recommended practices for each CII sector), mi is a number of metrics in i parameter. Taking into account (2), the set (1) can be represented as follows: n n mi P { Pi } { { Pij }} {{P1.1 , P1.2 ,..., P1.m1 }, i 1 i 1 j 1 (3) {P2.1 , P2.2 , ..., P2.m2 },..., {Pn.1 , Pn.2 ,..., Pn.mn }}, (i 1, n, j 1, mi ). Step 1.2. The value calculation of the index, that describes the CII sector cybersecurity level The index of the CII sector cybersecurity level is calculated according to (1-3) considering (4): n mi P ×100% ij , max Pij 0, i=1 j=1 I CS = (4) max Pij where max Pij is the sum of the maximum possible values of Pij metric. Stage 2. Determination of the ICT development and implementation metrics of a CII sector Step 2.1. Formalization of the ICT development and implementation metrics, that describe the ICT readiness and availability Copyright © 2020 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). COAPSN-2020: International Workshop on Control, Optimisation and Analytical Processing of Social Networks Declaring the metrics set M , that describe the ICT development and implementation: q M { M k } {M1 , M 2 ,, M q }, (5) k 1 where Mk M (k = 1, q) is the subset of the ICT development and implementation metrics, q is a number of the metric’s subsets. Similarly, taking into account [12-13], the set (5) was represented as a linked list as it shown in Fig. 3. M1 M2 ... Mn head / M tail Fig. 3. Representation of the ICT development and implementation metrics as a linked list The set M k can be represented as a subset system: pi Mk { M kr } {M k .1 , M k .2 ,, M k . pi }, (6) r 1 where M kr (k = 1, q, r = 1, pi ) are metrics of the set k , pi is metric’s number of the k set. Similarly, taking into account (6), the set (5) can be represented as: q q pi M { Mk } { { M kr }} {{M 1.1 , M 1.2 ,..., M 1. p1 }, k 1 k 1 r 1 (7) {M 2.1 , M 2.2 , ..., M 2. p2 },..., {M q.1 , M q.2 ,..., M q. pq }}, (k 1, q, r 1, pi ). Step 2.2. The value calculation of the ICT development and implementation metrics The metrics, that describe ICT development and implementation in the CII sector (7), can be calculated according to (8): q pi M ×100% kr , M 0, q 0. max I DDL = k=1 r=1 (8) q× M max kr kr It should be noted, that since the metric M k can have different dimensions, at this step, it also must be normalized using one of the known approaches. Stage 3. Calculation of quantitative parameters, that describe the cybersecurity level of a CII sector Based on (4) and (8), it is possible to calculate the quantitative parameters (9), that describe the cybersecurity level of a CII sector or a state: Copyright © 2020 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). COAPSN-2020: International Workshop on Control, Optimisation and Analytical Processing of Social Networks n mi q pi P ×100% M ×100% ij kr , P 0, M 0, q 0. (9) i=1 j=1 max max I ratio = ICS - I DDL = - k=1 r=1 q× M max max ij kr Pij kr B. An experimental study of proposed method in aviation According to [3. 10, 11], an example of the developed method usage for the civil aviation (CA) is showed below (Fig. 4). This sector includes to transportation and it is a part of CI for most of states (Table 2). Fig. 4. Civil aviation ICT communications scheme Stage 1. Determination of the metrics and cybersecurity index of a CII sector Step 1.1. Formalization of the cybersecurity metrics Taking into account [12, 14], for the cybersecurity metrics, for n = 4, m1 3, m2 4, m3 4, m4 1 the complete set of the cybersecurity metrics was defined as follows: 4 4 mi P ={ Pi } = { { Pij }} ={{PPLC ,PTHR ,PEDU }, i =1 i=1 j=1 {PBASS ,PESEV ,PEIDN ,PCIIP },{PCIRC ,PCRIS ,PCRIM ,PMIL },{PINT }} , (i = 1,n, j = 1,mi ). Step 1.2. The value calculation of index, that describes the CII sector cybersecurity level According to (4): (PPLC + PTHR + PEDU + PBASS + PESEV + PEIDN + PCIIP + PCIRC + PCRIS + PCRIM + PMIL + PINT ) 100 ICS = max max max max max max max max max max max max 35%. PPLC + PTHR + PEDU + PBASS + PESEV + PEIDN + PCIIP + PCIRC + PCRIS + PCRIM + PMIL + PINT Copyright © 2020 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). COAPSN-2020: International Workshop on Control, Optimisation and Analytical Processing of Social Networks Table 2. Industries of CI in accordance to ENISA Space&Research Public admin. Civil admin. Industry Transport Finance Energy Health Water Food ICT EU state Austria + + + + + + + + + - Cyprus + + - + + - + + + - Czech Rep. + + + - + + + + + - Estonia + + + + + + + + + - Finland + + + + + + + + - - France + + + + + + + + + + Hungary + + + + + + + + - - Lithuania + + + + + + - + - - Netherlands + + + - + + - + + - Poland + + + + + + - + - - Slovenia + + + + + + - + - - Spain + + + + + + + + + + Switzerland + + + + + + + + + - UK + + + + + + - + - - Stage 2. Determination of the ICT development and implementation metrics of a CII sector Step 2.1. Formalization of the ICT development and implementation metrics, that describe the ICT readiness and availability Based on [12, 15], for q 2, p1 3, p2 10 and considering (5-6), the set of ICT development and implementation metrics can be shown as: q q pi M = { M k } = {{ { M kr }}= {{M ACC , M USE , M SKI }, k =1 k =1 r =1 {M POL , M INN , M RDN , M AFF , M BUS , M GOV , M SOC , M SKIL , M USE , M IMP }}, (k = 1,q, r = 1, pi ). Step 2.2. The value calculation of the index, that describes the CII sector cybersecurity level According to (8) the index can be calculated as: ((M ACC + M USE + M SKI ) I DDL max ( M ACC M USE max max + M SKI ) ( M POL + M INN + M RDN + M AFF + M BUS + M GOV + M SOC + M SKI + M USE + M IMP )) 100% max max max max max max max max max max 62,5% ( M POL + M INN + M RDN + M AFF + M BUS + M GOV + M SOC + M SKI + M USE + M IMP )) Copyright © 2020 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). COAPSN-2020: International Workshop on Control, Optimisation and Analytical Processing of Social Networks Stage 3. Calculation of the quantitative parameters, that describe the cybersecurity level of CA Based on the results in Step 1.2, Step 2.2 and considering (9), quantitate parameters, that describe the cybersecurity level of CA can be calculated as follows: I ratio = ICS - I DDL 35 % 62,5 % 27,5 %. The difference between I CS and I DDL indicators shows the correlation between the cybersecurity level and ICT development and implementation index. A positive result shows that cybersecurity level meets a sufficient level of ICT index for CA (or even overcame it), on the other hand, a negative result shows that cybersecurity level is not sufficient for current ICT index. The obtained result I ratio = 27,5 % for CA shows that cybersecurity level should be improved. 4 Conclusion and future research study Consequently, in this paper the modern methods, tools for assessing the cybersecurity level and their supporting instruments were analyzed. The research found that currently there are no comprehensive, flexible methods that can quantify the cybersecurity level of the CII sector. A method for determining the cybersecurity level has been developed. This method provides the sets of cybersecurity level and ICT development and implementation metrics in a linked lists view, also helps to calculate its relevant metrics. It allows to determine quantitative parameters, that describe the cybersecurity level of a particular industry or the state’s CII in general. The developed method can be used to analyze a particular state’s CII, determine the cybersecurity level, identify critical systems, which need to be protected from external and internal threats. For example, the proposed method can be applied for comparing the cybersecurity level before and after the implementation of certain ICT security measures. References 1. S. Gnatyuk, “Critical Aviation Information Systems Cybersecurity”, Meeting Security Challenges Through Data Analytics and Decision Support, NATO Science for Peace and Security Series, D: Information and Communication Security. IOS Press Ebooks, vol.47, №3, рр. 308-316, 2016. 2. The Law of Ukraine “On Basic Principles of Cyber Security of Ukraine” of 15.10.2017, №2163-VIII, Available Online, URL: http://zakon3.rada.gov.ua/laws/show/2163-19 3. V. Sydorenko, A. Polozhentsev, S. Gnatyuk, “The method of determining the security level of the critical information infrastructure”, Academy of Engineering of Ukraine News, vol. 42, pp. 81- 89, 2017 (in Ukrainian). 4. Global Cybersecurity Index, Available Online, URL: https://www.itu.int/en/ITU-D/. 5. P. Black, K. Scarfone, M. Souppaya, “Cyber security metrics and measures”, Wiley Handbook of Science and Technology for Homeland Security, vol. 4, 2010. 6. National Cyber Security Index, Available Online, URL: http://ncsi.ega.ee/ncsi-index/. 7. Network Readiness Index 2016. Available Online, URL: http://www3.weforum.org/ docs/GITR/2014/GITR_OverallRanking_2016. Copyright © 2020 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). COAPSN-2020: International Workshop on Control, Optimisation and Analytical Processing of Social Networks 8. A. Nestrugin, Technique of automatic ranking of objects protection according to the level of potential danger on the example of oil refineries, pp. 77-84, 2014 (in Russian). 9. S. Evseev, “Methodology of Information Security Assessment of Automated Banking Systems of Ukraine”, Information Security, vol. 22, No.3, pp. 297-309, 2016 (in Ukrainian). 10.Gnatyuk S., Polishchuk Yu., Sydorenko V., Sotnichenko Yu. “Determining the level of importance for critical information infrastructure objects”, Proceedings of 2019 IEEE International Scientific-Practical Conference: Problems of Infocommunications Science and Technology, PIC S and T 2019, Kyiv, Ukraine, October 8-11, 2019, pp. 829-834. 11.R. Odarchenko, V. Gnatyuk, S. Gnatyuk, A. Abakumova, Security Key Indicators Assessment for Modern Cellular Networks, Proceedings of the 2018 IEEE First International Conference on System Analysis & Intelligent Computing (SAIC), Kyiv, Ukraine, October 8-12, 2018, pp. 1-7. 12.T. Kormen, C. Leiserson, R. Rivest, C. Stein, “Algorithms: Construction and Analysis, 3rd Edition”, Moscow: LTD Williams, 1328 p., 2013. 13.Smirnov O., Kuznetsov A., Kiian A., Zamula A., Rudenko S., Hryhorenko V., “Variance Analysis of Networks Traffic for Intrusion Detection in Smart Grids”, 2019 IEEE 6th International Conference on Energy Smart Systems, Kyiv, Ukraine, 2019, P. 353-358. 14.Zhukov I.A. “Implementation of integral telecommunication environment for harmonized air traffic control with scalable flight display systems”, Aviation, 2010, №14 (4), 117-122. 15.Smirnov O., Kuznetsov A., Kavun S., Babenko B., Nakisko O., Kuznetsova K., “Malware Correlation Monitoring in Computer Networks of Promising Smart Grids’, 2019 IEEE 6th International Conference On Energy Smart Systems, Kyiv, Ukraine, 2019 P. 347-352. 16.Boyko N., Pylypiv O., Peleshchak Y., Kryvenchuk Y., Campos J.: Automated document analysis for quick personal health record creation. 2nd International Workshop on Informatics and Data-Driven Medicine. IDDM 2019. Lviv. p. 208-221. (2019) 17.Kryvenchuk Y., Mykalov P., Novytskyi Y., Zakharchuk M., Malynovskyy Y., Řepka M.: Analysis of the architecture of distributed systems for the reduction of loading high-load networks. Advances in Intelligent Systems and Computing. Vol.1080. p.759-550. (2020) 18.Kryvenchuk Y.,Vovk O., Chushak-Holoborodko A., Khavalko V., Danel R.: Research of servers and protocols as means of accumulation, processing and operational transmission of measured information. Advances in Intelligent Systems and Computing. Vol.1080. p.920-934. (2020) 19.Mishchuk O., Tkachenko R., Izonin I.: Missing Data Imputation through SGTM Neural- like Structure for Environmental Monitoring Tasks. Advances in Computer Science for Engineering and Education. ICCSEEA2019. Advances in Intelligent Systems and Computing. Springer, Cham, 2019, pp. 142-151 20.Fedushko S., Ustyianovych T.: Predicting Pupil’s Successfulness Factors Using Machine Learning Algorithms and Mathematical Modelling Methods. Advances in Intelligent Systems and Computing series, ICCSEEA 2019, AISC 938, vol. 938, pp. 625-636 (2020). https://doi.org/10.1007/978-3-030-16621-2_58 21.Korobiichuk I., Fedushko S., Juś A., Syerov Y.: Methods of Determining Information Support of Web Community User Personal Data Verification System. Automation 2017. ICA 2017. Advances in Intelligent Systems and Computing, vol. 550, pp. 144-150. Springer (2017). https://doi.org/10.1007/978-3-319-54042-9_13 22.Korobiichuk I., Syerov Y., Fedushko S.: The method of semantic structuring of virtual community content. Advances in Intelligent Systems and Computing, vol. 1044, pp. 11-18 (2020). https://doi.org/10.1007/978-3-030-29993-4_2 23.Shakhovska N., Shakhovska K., Fedushko S.: Some Aspects of the Method for Tourist Route Creation. Proceedings of the International Conference of Artificial Intelligence, Medical Engineering, Education (AIMEE2018). Advances in Artificial Systems for Medicine and Education II series, vol. 902, pp. 527-537 (2020) https://doi.org/10.1007/978-3-030-12082-5_48 Copyright © 2020 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). COAPSN-2020: International Workshop on Control, Optimisation and Analytical Processing of Social Networks