=Paper=
{{Paper
|id=Vol-2667/paper75
|storemode=property
|title=Definition of basic violators for critically important objects using the information probability method and cluster analysis
|pdfUrl=https://ceur-ws.org/Vol-2667/paper75.pdf
|volume=Vol-2667
|authors=Vladimir Kostin,Aleksandr Borovsky
}}
==Definition of basic violators for critically important objects using the information probability method and cluster analysis ==
Definition of basic violators for critically important objects using the information probability method and cluster analysis Vladimir Kostin Aleksandr Borovsky Orenburg State University Orenburg State University Orenburg, Russia Orenburg, Russia vladimirkostin5@mail.ru borovski@mail.ru Abstract—One of the approaches to analyzing the based on the theory of fuzzy logic and fuzzy hypergraphs relationships between the characteristics of critical objects and [3]. Recent methods do not allow us to estimate their typical intruders using the information-probabilistic method is weight contribution to the formation of the hazard potential considered. Categories of objects and typical intruders are of the object. In addition, sometimes when composing described by many common heterogeneous characteristics. fuzzy membership matrices (performing disjunction and The probabilistic information method ensured the conjunction operations) for certain data (if one of the homogeneity of the entropy potential of the offender training characteristics is significantly small), fuzzy logic methods characteristics and the characteristics of the consequences of the offender actions according to the Pearson chi-square show doubtfully low results. criterion and on this basis the characteristics of the offenders II. FORMULATION OF THE PROPLEM and critical objects are summarized in a common information field in single six-point measurement scales. Using the On the basis of processing the combined general information probabilistic method and the cluster analysis information field of the characteristics of violators and method for the general information field, we obtained the basic categorized objects with an information probabilistic type of intruder for each category of objects. The results can method and cluster analysis, it is necessary to determine be used to determine the requirements for physical protection each category of CIO of the corresponding typical intruder, systems of critical facilities. that is, it is necessary to determine the degree of potential Keywords—information-probability method; entropy; base impact of the i-type intruder on the j-th category of CIO, to type of intruder solve the problem of determining ratios and on this basis to propose the necessary amount of security for each category I. INTRODUCTION of objects. The source [4] discusses the finding of The analysis of the source [1] revealed that each correspondences on images presented in the form of graph protected object has an attractive potential, which is formed models, but this problem has a limitation — the number of by a hazard potential, in accordance with which the vertices in the image graphs must be the same. The source necessary security potential is formed in the form of a [5] provides an in-depth analysis of clustering methods. A physical protection system (PPS). In turn, each typical technique for clustering big data is proposed. The issues of intruder has the potential for preparedness (danger), which graph clustering are considered, while the weight of the is determined by the degree of his motivation. Thus, many signs of cluster analysis is not taken into account. typical intruders have a definite impact on many categorized III. PROBLEM SOLVING objects in accordance with their potential capabilities. Typical violators and categorized objects have many To solve this problem, it is necessary to form a common characteristics that determine their potential motivation information field in a unified scale for measuring the (danger) and attractiveness, which intersect informationally. characteristics of violators and CIO. Obviously, between the categories of critical objects (CIO) To assess the potential danger of the object from the and typical intruders (threats) there must be a certain actions of violators, six private types of losses were correspondence, which is based on the general introduced [4]: commensurability or ratios of the characteristics of these - political (determined by a decrease in all levels of sets (potentials). That is, each category of CIO must authority of the authorities and general instability); correspond to a certain basic type or types of violators. - human (consists in the loss of people's lives and The author of the article suggests, using the information health); probabilistic method (IPM) and cluster analysis, to - financial (consists in the loss of material values); determine the typical basic intruders for each category of - economic (take into account the costs of relocating CIO, i.e. identify existing compliance. Based on the hazard people from the accident zone and the related results of typical violators, an appropriate level of security compensation payments); (safety) of objects is proposed. - environmental (loss of natural resources leading to This problem is solved to differentiate the necessary environmental degradation in the region); requirements when determining the required value of - informational (losses consisting in the loss of advanced protection of categorized objects from basic typical technologies, confidential information and artistic violators. values). Currently, the task of determining the basic threats for For each particular type of loss, one of the six scales of various categories of objects is determined mainly by expert potential losses in the event of an emergency (ES) was methods [2], where there is an element of subjectivity, or Copyright © 2020 for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0) Data Science determined in the form of a six-point hazard scale, which To solve this problem, we describe typical intruders and are presented in Table 1. objects in a single scale of measurement of characteristics. The results of the hazard assessment (attractiveness) for Based on the data of Table 3 and expert evaluations of the seven categories of CIO in case of emergencies on a six- specialists, a transition was made from qualitative to point scale, obtained in article [7], are shown in table 2. quantitative characteristics of violators, which are TABLE I. THE SCALE OF POTENTIAL LOSSES IN CASE OF summarized in table 4. EMERGENCIES TABLE IV. QUANTITATIVE CHARACTERISTICS OF TYPICAL VIOLATORS Types of Emergencies The of the of the of the of the of the Characteristics of violators Indicators local municipal intermuni regional interregion federal chara cipal characte Level of cter character character character al character r A type Cold steel, no more than over 50, but violator Objectiv Consequen informati Level of firearms Injured more no more no more 50, but no Numbers e of ces of on physical no more over 500 (technical people than than 50 than 50 more than than 500 action actions awarenes fitness 10 500 equipment) s Size of no more than more than 5, property X1 11 10 0.8780 0.7 0.9 1 damage more no more no more 5, but not more than than 5 than 5 more than but not more than 500 X2 4 9 0.5546 0.6 0.8 0.9 (million 0.1 500 than 500 rubles) X3 1 8 0.1731 0.4 0.7 0.8 The scale of the X4 1 2 0.0067 0.3 0.3 0.3 partial losses of 1 2 3 4 5 6 the six-point X5 1 2 0.1158 0.9 0.3 0.3 scale [13] X6 1 5 0.1731 1 1 0.6 TABLE II. CHARACTERISTICS OF THE CONSEQUENCES OF For a comparative assessment of the danger potentials of EMERGENCIES AT FACILITIES ON A SIX-POINT SCALE violators, an IWM was used, which allows one to reduce the The scale of losses of categories of objects particular characteristics of the considered violators Private types of loss of 1- 2- 3- 4- 5- 6- 7- (objects) to a complex potential in the form of an entropy objects cat cat cat cat cat cat cat index. The essence of the method is as follows. Political 5 4 4 3 2 2 1 Human 5 5 4 3 2 2 1 The decision to determine the entropy indicator is Financial 5 5 4 3 3 2 1 Economic 6 5 4 3 3 2 1 associated with the definition of a vector that quantitatively Environmental 6 5 4 4 3 2 2 displays the hazard potential of an emergency (intruder, Informational 6 5 5 4 3 2 2 object).We will present the information display of a specific situation in the form of the following scheme: there are Characteristics of typical violators are determined by dangerous emergencies being compared (violators, objects); order of the Minister of Industry and Energy of the Russian each emergency is associated with a set of characteristics Federation N150 [8] and Government Resolution N875 [9], that determine its potential hazard. In this case, the which are summarized in table 3. situation of assessing the potential of each emergency in a TABLE III. CHARACTERISTICS OF TYPICAL VIOLATORS detailed form is characterized by table 5. Characteri Type of violator TABLE V. MODIFIED MORPHOLOGICAL MATRIX stics of X1 X2 X3 X4 X5 X6 violators Name of Many dangerous emergencies (violators, objects) Number 5 – 20 3–5 1 1 1 1 characteristics {𝐴1 } … {𝐴𝑖 } … {𝐴𝑛 } of of of Theft, The goal terror. terror. terror. Theft Theft 𝑋1 𝑋11 … 𝑋1𝑖 … 𝑋1𝑛 ter. Act Act Act Act Beyond Within Within 𝑋𝑗 𝑋𝑗1 … 𝑋𝑗𝑖 … 𝑋𝑗𝑛 Consequen federal, ces of the regiona the the the Within Within … … … … … … actions of l, boundar boundar boundar the the 𝑋𝑚 𝑋𝑚1 … 𝑋𝑚𝑖 … 𝑋𝑚𝑛 ies of ies of ies of the territori facility facility the the the offender al The weight of parameters in the formation of the facility facility facility average low low high high estimated potential is characterized by a quantitative The level is the level of level of level of level of level of measure of the degree of confidence in the situation, of general awarene awarene awarene awarene awarene objectively existing uncertainty and is identified with the awareness level ss ss ss ss ss probability distribution Pji. Characteristics {Xji} are uniquely Melee and set in various physical scales. Therefore, to bring the high high high low low firearms weapons probabi probabil probabil probabil probabil Armed characteristics {Xji} to a single common scale, we use the lity ity ity ity ity natural normalization, carried out relative to the extreme equipment Level of values {Xji} of the components as without changing the training to ingredient to the opposite: High High Low Low medium overcome High level of level of level of level of level of 𝑟𝑗𝑖 = 𝑥𝑗𝑖 /𝑥𝑚𝑎𝑥 𝑗 (1) barriers, level of and with the change of ingredient to the opposite: preparat preparat preparat preparat preparat willingness training to engage ion ion ion ion ion 𝑟𝑗𝑖 = 𝑥𝑚𝑖𝑛 𝑗 /𝑥 𝑗𝑖 (2) in battle VI International Conference on "Information Technology and Nanotechnology" (ITNT-2020) 344 Data Science with display in xji → r[0,1]. Dependencies (1) and (2) 𝑝̂𝑗 (𝑟) = ∑𝑛𝑖=1 𝑟𝑗𝑖 / ∑𝑚 𝑛 𝑗=1 ∑𝑖=1 𝑟𝑗𝑖 (4) ensured the mapping of the sample space shown in Table 5 The principle of the potential probability distribution is to another having the power of the continuum shown in based on the fact that it is preferable to choose with greater table 6. probability those characteristics of the system whose properties have a large contribution to the total value of the TABLE VI. MODIFIED MORPHOLOGICAL MATRIX estimated potential. At the same time, we note that for the Name of Many dangerous emergencies (violators, principle of potential probability distribution, V.V. characteristics objects) Khomenyuk, a priori information about the state of {𝐴1 } … {𝐴𝑖 } … {𝐴𝑛 } characteristics is based on the principle of insufficient 𝑋1 𝑟11 … 𝑟1𝑖 … 𝑟1𝑛 knowledge. 𝑋𝑗 𝑟𝑗1 … 𝑟𝑗𝑖 … 𝑟𝑗𝑛 However, the weight of various characteristics in the … … … … … … formation of the estimated potential is different. Obtaining 𝑋𝑚 𝑟𝑚1 … 𝑟𝑚𝑖 … 𝑟𝑚𝑛 estimates of the a priori distribution is related to the order relation 𝑝𝑗 , which was studied in detail in the works of Elements rji (continuum power spaces) in a single scale Fishborn [6]. For a simple linear relationship, the order of will be identified with elementary events. Moreover, the the Fishborn estimates of a priori probabilities form a measure defined on rji the normalized corresponds to the decreasing arithmetic progression of the form: probability p(r), which is identified with the concept of the 𝑝̌𝑗 = 2 ∗ (𝑚 − 𝑗 + 1)/𝑚 ∗ (𝑚 + 1) integral potential of a given complex of elementary events. Introducing an a priori probability based on Fishborn The meaning of this measure is to appropriately interpret the estimates, we, setting the “input” to the method, take into concept of probability. Moreover, probability, as a category account the different weight of the characteristics in the of dialectics, combines both the measure of the objective formation of the estimated potential. Then, using the possibility of an event and the degree of subjective principle of potential distribution (4) and the provisions of confidence in the occurrence of events. In order to the Bayesian theorem, we obtain a logically justified “exit” formalize the problem of choosing a solution, we identify from the model in the form of posterior conditional many alternatives with the event space {A}, and many probabilities in the form: attributes with events {x}. Then the connection between all 𝑝𝑗 = ∑𝑛𝑖=1 𝑟𝑗𝑖 ∗ 𝑝̌𝑗 / ∑𝑚 𝑛 𝑗=1 ∑𝑖=1 𝑝̌𝑗 (5) the characteristics that form the estimated potential of the Thus, the benefit of introducing a priori probability is emergency is carried out through the normalized measure that it provides an attachment of the information necessary defined on these characteristics, which is identified with for analysis. probability p(a). The probability distribution p(a) provides After introducing the a priori probability into the an estimate of entropy Hi. decision-making method and calculating the a posteriori Information in probabilistic-statistical theory acts as a value of the conditional probability 𝑝𝑗 , we proceed to the removable, diminished uncertainty. Therefore, further next modeling stage, which is associated with obtaining construction of the method is associated with the study of probabilistic estimates of the influence of the j-th the laws of transformation of the information field of the characteristic of the i-th emergency on the hazard potential. Cartesian product of two sets (emergency situations and To this end, we use the Bayesian theorem, in which we are their characteristics) into quantitative components of talking about reversing the order of statements in information. For this purpose, we introduce concepts such conditional probability, that is, in the notation we have as a priori, a posteriori, and conditional probabilities into the adopted 𝑝𝑗𝑖 (𝑟) and are related 𝑝𝑗 . Then the probability logic diagram, apply the Bayesian theorem and the formula for the total probability, and introduce the concept of the 𝑝(𝑎) in the considered information situation is determined conditional p probability of the j-th characteristic in the by the dependence: formation of the estimated potential, provided that the 𝑝𝑗𝑖 (𝑎) = 𝑝𝑗𝑖 (𝑟) ⋅ 𝑝𝑗 / ∑𝑛𝑖=1 ∑𝑚 𝑗=1 𝑝𝑗𝑖 (𝑟) ⋅ 𝑝𝑗 (6) events that form the estimated potential have occurred. Then the significance level of the emergency (intruder, To obtain the dependence of determining the quantity object) is estimated through the uncertainty function: p(r), which is a normalized measure on elementary events 𝐻𝑖 (𝑝) = − ∑𝑚 𝑗=1 𝑝𝑗𝑖 (𝑎) 𝑙𝑔 𝑝𝑗𝑖 (𝑎) . {r}, we use the fact that the concept of the estimated For the data in Table 4, the entropy potential of each potential of a given complex of elementary events can be type of intruder was evaluated using an IVM. The results identified with the membership function, which associates are presented in Figure 1. each r with a real number in the interval [0,1]. Moreover, Entropy without violating the generality of reasoning, the desired dependence of the membership function is represented in 0,8 the form: 0,6 𝑝𝑗𝑖 (𝑟) = 𝑟𝑗𝑖 / ∑𝑛𝑖=1 𝑟𝑗𝑖 (3) 0,4 One of the methods for calculating the probability of manifestation of the j-th characteristic of the compared 0,2 emergency situations (violators, objects) to the formation of 0 Types of intruders the estimated potential is based on the input V. Khomenyuk Х1 Х2 Х3 Х4 Х5 Х6 concept of the potential probability distribution, which is determined by the formula: Fig. 1. Entropic training potential of violators. VI International Conference on "Information Technology and Nanotechnology" (ITNT-2020) 345 Data Science In Table 7, the characteristics of the damage caused by 5 - state (damage to the limits of more than two typical violators of the CIO on the same six-point scale constituent entities of the Russian Federation) -H= 0.621; were formed in such a way that the entropy assessment of 6 - interstate (damage extends beyond the borders of the the potentials of preparation (danger) of violators coincided Russian Federation) - H = 0.878. with the entropy assessment of the potentials of the The transition from the six-point scale to the entropy consequences of the target implementation of violators. hazard potentials is justified by the requirement to increase That is, the entropy estimates in Figures 1 and 2 are uniform the reliability of the damage assessment scale [1]. according to the Pearson chi-square criterion. Applying ICM to the data in Table 8, we obtained the TABLE VII. ASSESSMENT OF THE CONSEQUENCES OF THE TARGET entropy potentials of typical intruders and categorized IMPLEMENTATION OF VIOLATORS WITH A SIX-POINT SCALE objects (shown in the bottom row of Table.8 and in fig. 3). Private types of losses from The scale of losses from the type of the actions of violators violator X1 X2 X3 X4 X5 X6 1 Political 6 5 4 1 2 3 Human 6 5 4 1 2 3 Financial 3 2 2 3 5 4 Economic 6 5 4 2 2 3 Environmental 6 5 4 1 3 2 Informational 3 2 1 2 5 5 0 Model violators and categories of X1 X2 X3 X4 X5 X6 1-к 2-кCIOC 3-к 4-к 5-к 6-к 7-к Fig. 3. Graph of the entropy potential of the CIOC and typical violators. 0,8 Having solved the problem of combining homogeneous 0,6 potentials into clusters by the agglomerative method using Entropy 0,4 Statistika 10.0 SPP, we obtained the results of combining typical intruders and categorized KBO into clusters - 0,2 categories (Table 9). An analysis of Table 9 and Figure 3 Types of intruders shows that the first type of intruder is lower in potential 0 capabilities than an object of the first category, so he needs X1 X2 X3 X4 X5 X6 to combine with internal intruders X5 or X6. Fig. 2. Entropy potentials of the target implementation of violators. TABLE VIII. CHARACTERISTICS OF CATEGORIES OF CIO AND TABLE IX. THE TABLE OF CORRESPONDENCE OF THE BASIC VIOLATORS AND CATEGORIES OF OBJECTS TYPICAL VIOLATORS ON THE ENTROPY SCALE Typical Category CIO Entropy probability of a Private Typical violators and categories of objects breaker danger H safe condition types of X1 X2 X3 X4 X5 X6 1-c 2-c 3-c 4-c 5-c 6-c 7-c X1+(X5,X6) 1- st category 0.733 0.98 losses X1 2 - nd category 0.633 0.96 Political .878 .621 .555 .007 .116 .173 .621 .555 .173 .173 .116 .116 .007 X2 3 - category 0.497 0.93 Human .878 .621 .555 .007 .116 .173 .621 .555 .555 .173 .116 .116 .007 X3 3, 4– category 0.446 0.85 Financial .173 .116 .116 .173 .621 .555 .621 .621 .555 .173 .116 .116 .007 X4 4, 5 - category 0.375 0.60 Economic .878 .621 .555 .116 .116 .173 .878 .621 .555 .173 .116 .116 .007 X5 4, 5– category 0.368 0.64 Environmen X6 5, 6, 7 - category 0.160 0.68 .878 .621 .555 .007 .173 .116 .878 .621 .555 .173 .116 .116 .116 tal Information .173 .116 .007 .116 .621 .621 .878 .621 .555 .173 .173 .116 .116 It should be noted that the preparedness potential is Entropy consistent with the hazard potential of the consequences of .633 .497 .446 .160 .368 .375 .733 .629 .547 .269 .219 .210 .122 potential the actions of violators and with their capabilities to overcome the PPS of objects, i.e. each potential of the On this basis, information on violators and CWS (tables intruder can be assigned the corresponding protection 2 and 7) should be combined into one information field. As potential of the object (PPS potential) - for example, the a result, we get table 8 with a common information field in a probability of a safe state of the object. That is, it is single measurement scale. In table 8, we replace the six- required to determine the necessary probability of the safe point scale with the entropy scale of the danger of state of the object depending on the hazard potential of the emergency consequences, which was determined using the base intruder for the corresponding hazard category of the IWM to the data of table 1 [9] (H is the corresponding object. Obviously, there should be a correspondence entropy value of damage): between the danger potential of a typical intruder and the 1 - local (damage within the territory of the facility) - H degree of protection from his actions, i.e. the nature of the = 0.007; change in the dependencies of the potentials of violators and 2 - local (damage within the territory of the settlement) their counteraction should be similar functions. - H = 0.116; 3 - territorial (damage to the territory of the constituent If the function of changing the entropy potentials of the entity of the Russian Federation) - H = 0.173; type of intruder is related to the required probability of a 4 - regional (damage on the scale of two constituent safe state according to the first type of intruder (the highest entities of the Russian Federation) - H = 0.555; estimate is the probability of protection 0.98 - the value is close to the limit), and the weakest type of intruder (the VI International Conference on "Information Technology and Nanotechnology" (ITNT-2020) 346 Data Science sensitivity of the detection sensor is 0.7 and the probability [3] A.S. Borovskiy and A.D. Tarasov, “Automated design and assessment of physical protection systems for potentially hazardous of timely arrival - 0.9 gives a value of a safe state of 0.6), (structurally complex) objects. Part 1. System analysis of the i.e. we associate with each type of intruder the required problem of design and assessment of physical protection systems,” value of the object's security (the probability of a safe state) Samara, Orenburg: SamGUPS, 2012, 155 p. from its actions. The results of the probabilities of the safe [4] A.A. Zakharov, A.L. Zhiznyakov and V.S. Titov, “A method for feature matching in images using descriptor structures,” Computer state of the PPS, as similar values to hazards (typical Optics, vol. 43, no. 5, pp. 810-817, 2019. DOI: 10.18287/2412- violators), are shown in table 9. 6179-2019-43-5-810-817. [5] A.A. Agafonov, A.S. Yumaganov and V.V. Myasnikov, “Big data CONCLUSION analysis in the geoinformation problem of short-term forecasting of traffic flow parameters based on the method of k nearest neighbors,” The basic typical violators for each category of CIO are Computer Optics, vol. 42, no. 6, pp. 1101-1111, 2018. DOI: defined, which are shown in table 9. The results obtained do 10.18287 /2412-6179-2018-42-6-11-11-1-111. not contradict the physical meaning. The results of the [6] V.N. Kostin, “Assessment of the magnitude of the significance of probabilities of the safe state of categorized objects (Table emergency situations based on the information probabilistic model,” Information security problems. Computer systems, vol. 3, pp. 21-32, 9) can be used to justify the requirements for the 2019. effectiveness of the PPS CIO. [7] V.N. Kostin and A.K. Ponomarev, “Informational probabilistic method of forming a category of potentially dangerous objects,” REFERENCES Bulletin of Computer and Information Technologies, vol. 6, pp. 34- 42, 2015. [1] V.N. Kostin, “Assessment of the danger potential of violators based [8] Order of the Minister of Industry and Energy of the Russian on the informational probabilistic method and the method of Federation 04.05.2007 No 150 “On the approval of principal components,” Information technology and computing recommendations on anti-terrorist security of industry and energy,” systems, vol. 3, pp. 74-81, 2016. 2007, 72 p. [2] A.V. Boyarintsev, A.N. Brazhnik and A.G. Zuyev, “Antiterrorism [9] Decree of the Government of the Russian Federation 08/29/2014 Issues: Categorization and Vulnerability Analysis of Objects,” SPb.: No. 875 "On anti-terrorist protection of facilities of the federal “ISTA–Sistems”, 2006, 252 p. service for technical and export control of territorial bodies and subordinate organizations, 2014, 64 p. VI International Conference on "Information Technology and Nanotechnology" (ITNT-2020) 347