=Paper=
{{Paper
|id=Vol-3179/Short_5.pdf
|storemode=property
|title=Information Technology for Forecasting and Guaranteeing of Software-Hardware Complexes Information Security Indicators
|pdfUrl=https://ceur-ws.org/Vol-3179/Short_5.pdf
|volume=Vol-3179
|authors=Victoriia Mironova,Mykola Pyroh,Iryna Harko
|dblpUrl=https://dblp.org/rec/conf/iti2/MironovaPH21
}}
==Information Technology for Forecasting and Guaranteeing of Software-Hardware Complexes Information Security Indicators==
Information Technology for Forecasting and Guaranteeing of Software-Hardware Complexes Information Security Indicators Victoriia Mironovaa, Mykola Pyroha and Iryna Harkoa,b a Taras Shevchenko National University of Kyiv, Bohdana Havrylyshyna St, 24, Kyiv, 04116, Ukraine b National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute”, Politekhnichna St, 41, Academic building № 18, Kyiv, 03056, Ukraine Abstract The information technology of polyergatic organizations for forecasting and guaranteeing information security of software and hardware complexes is developed. The dependence of the final report document on changes in the processes of information activity forms knowledge with the active use of innovative technical and technological decisions is proved. The structural and functional support of each system intellectual agent computer integration efforts is proposed to ensure synergistic multicriteria efficiency and safety of the software and hardware complexes functioning in conditions of increased risk of cyber-attacks. The goal of this article is to develop the methodological and theoretical principles of system integration of heterogeneous technological processes based on the awareness of the future state of improving information security through the innovative development of the software-hardware complexes nowadays. Methods of analysis and synthesis of complex dynamic systems with fixation of role participation of each intellectual agent are described in accordance with the principles of Agile for development and construction and the fundamental contribution of procedures for measuring, predicting, testing and making step-by-step solutions. The result is displayed in the form of tables and a block diagram of hierarchical cyclic interactions for the purpose. Fundamental metrization of key concepts and system-forming processes provides the functional stability of future technological and technological solutions to the predicted interval of global awareness of space-time phenomena in the universe. Our proposed technology in the distributed hierarchical information analytical complex team in advance raises public awareness of certain trends in the external environment. Keywords1 information security, engineering knowledge, measurement, testing forecasting, innovations, security technology. 1. Introduction Ensuring the development of machinery and technology to improve information security depends on the development of science and engineering knowledge aimed on the future [1-3]. Aspects of the relationship between probable prediction and reliable existence of the predicted change in the processes information activities forms with cognition with the use of innovative technical and technological solutions [4-6]. Polyergatic production organizations of scientific and critical direction, for software and hardware complexes in open information systems implement acts of action. These acts record the transitions from known to unknown, from safe operation to volatile situations in non-stationary conditions of numerous environmental influences with significant changes in information and analytical parameters [7]. The purpose of the work is to develop methodological and theoretical principles of heterogeneous technological processes system integration based on awareness of the future information security improvement state through nowadays software and hardware innovative development. Information technology and implementation (IT&I-2021), December 1–3, 2021, Kyiv, Ukraine EMAIL: vicky.mironova@gmail.com (V. Mironova); mykola.pyroh@yahoo.com (M. Pyroh); garko.iryna@gmail.com (I. Harko) ORCID: 0000-0002-0878-0967 (V. Mironova); 0000-0003-2588-6066 (M. Pyroh); 0000-0003-0671-6336 (I. Harko) ©️ 2022 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings (CEUR-WS.org) 320 The set scientific task is achieved by solving partial goals. 1. Formalization of the terminological basis for predicting and forecasting the software and hardware complexes safety indicators. 2. Determining the conditions for the technical and technological solutions integration of modern intelligent technologies and methodologies for the functional stability management on the basis of innovative information analytical complex tools. 3. Guaranteeing the quality and efficiency of polyergatic means for the measurement processes controlling, forecasting, testing, generalization of thus formed technical and technological solutions. 2. Problem statement At the same time, the real global problems of the state information security have a complex socio- natural character. Therefore, futurological (futurum + logos) research for information-analytical complex is performed in cooperation with experts of many countries and leading IT companies in order to obtain plausible forecasts for 20-30 years ahead to future epochs. Scientific regional or local predictions are aimed at basic knowledge of current situations, direct review trends, short (up to 5 years) intervals. The main thing is to have the available resources to carry out alternate self-adjustment of the plan, project and programs of management and acts of action implementation in accordance with the agreed tasks of the information analytical complex in the face of cyber-attacks and uncertainty. Such scientific and engineering forecasting of integrated technical and technological solutions allows to reveal possible variants according to situations with definition of space-time continuum. Then to answer the question "where, when, what awaits us (object) in the future?" it is necessary to implement step by step rational management according to sound strategies, tactics and operations to ensure the functional stability of a complex dynamic system [8]. 3. Review of the literature Current state of research in the area of information system security is quite wide and is developing from year to year. Modern researchers concentrate their attention on ongoing security problems, defending information and intellectual systems from external attacks and internal issues. Fundamental challenges and vulnerabilities of computing systems are described and determined [1-3]. Security mechanisms, indicators and techniques of control and monitor security of each type of distributed information analytical complexes are described [4-5]. Approaches for monitoring, intrusion detections, encrypting, distributing accesses and interfaces, authentication and authorization and more others give opportunity to have a sufficient level of security and functional stability of nowadays existing informational and intellectual systems [6-7]. On another hand, scientific literature from all over the world gives researchers strong understanding that fast development and growing amount of information technologies and systems requires from architectures, designers, and developers of such systems to overtake this grow with the new approaches of new approaches to ensure the safety and stability of both new and existing technical and technological solutions implementation [8]. All modern scientists agree that scientific knowledge in the field of information systems security requires constant research and expansion of scientific and technical approaches to ensure stability. Methodology of improving functional stability of various distributed information systems should include all past experience in models, methods and tools for automating the process for controlling ergatic innovative systems and investigate new approaches such as agile methodology, function distribution and microservice architecture to make system more robust and resistant to new vulnerabilities not known yet. 4. Presentation of the main research material The paradigm of key concepts fundamental metrization is designed to ensure the functional stability of the target resulting technical and technological solutions implementation in the yet unpredictable, undescribed, unreasonable future. 321 Intelligent system agent (IAS) [7,8] is a part of polyergatic production organizations’ information analytical complex. Intelligent system agent competence - knowledge of technical sciences in the field of informatization, engineering, technology, physics, dynamics, economic and intellectual security for information analytical complex by means of guaranteeing system resilience to failures and cyberattacks. Information spatial-situational awareness a set of security knowledge necessary and reliable for the further development and management of the formation processes according to continuous successive acts of action to transform the past-present into the future of information system software and hardware complex under the influence of environment. Collective awareness within polyergatic production organizations’ information analytical complex presupposes the level of information spatial-situational awareness competence of each specialist (as intelligent system agent, which has the ability according to its available resources and stocks) to perform professional acts in current situations. Separation of functions and hierarchy of subordination within polyergatic production organizations’ information analytical complex is clearly formalized and structured in work regulations depending on operational situations. An example of architectural construction (Table 1) is provided for future polyergatic production organizations’ information analytical complex. Each of the system unit provides concrete actions and tasks to provide stability for the whole system or for the system units separately. For example, ASSA keeps each intellectual agent of the system informed about global cybersecurity and monitors possible vulnerabilities. Depending on situation provides suggestion for system stabilization based on previous practical and theoretical knowledge. Table 1 Classification subsystems of information security indicators in the conditions of space-time continuum risks from independent effects of EI in the future Rand Defining subsystems of the future Symbol Purpose information analytical complex Competent knowledge of information Global information situation of 1 security (Space Situational Awareness) ASSA geo-relations for cybersecurity Secure response tools (Shared Early Early warning of attacks and 2 Warning) ASEW threats Navigation in the space-time continuum Local and global positioning of the 3 (Positioning Navigation Timing) PNT complex dynamic system and environment region space-time continuum sounding reconnaissance (Intelligence Surveillance Observations and express analysis 4 ISR and Reconnaissance) of the sounding field Situational support in space-time Distribution of functions, 5 continuum (Spare Situational Support) SSS resources tasks Telecommunications in networks (Internet Network channels of hierarchical 6 Communications Transponder Tracking) ICTT data exchange on request Comprehensive special solutions (Space Scope of Application Coordination 7 Control and domain Enhancement) SCDE Control for information analytical complex The basic concept of functional stability of information intellectual system (characterizes the synergistic property of a single complex dynamic system to guarantee a full range of operating modes normalized, invariant level of the resulting efficiency of technological processes, due to a specialized subsystem of intelligent agents, which are capable to accelerate procedures for recovery (compensation) of partially lost functions in accidental extreme conditions. The traditional block-modular principle of building an autonomous system involves the rigid consolidation of material, energy and information resources between autonomous components. They interact with each other on a limited number of 322 inputs and outputs of each multipole. If for any reason there is and there is a failure of a particular component, then its resources do not work in such a system. Restoration is achieved by including backup components that have so far only waited for the load. The functions of each IAS within the life cycle of solving practical problems of professional activity include the following stages: Formation of internal motivation and interest in active actions, according to the idea announced in the received request. Collection, accumulation and specification of any data necessary to overcome the existing uncertainty. Solving the current problem using specially organized and existing or borrowed software and hardware complexes. Control and evaluation of the obtained results of intellectual activity (natural and artificial) according to the agreed plans. Decision-making with the help of expert systems and tools to support optimal decision- making. Activation of external communication with other IASs that evaluate the results obtained in order to initiate further targeted actions within the joint program. The spatio-temporal continuum - space-time continuum always determines the specified limited share of ASSA. The future as a result of controlled and uncontrolled various processes, phenomena, transformations is formed in the space-time continuum, where variables are determined on the basis of two-parameter parameterization. They characterize the dimensions of the units and the similarity of the corresponding distances between objects [8]. The actual geometric dimensions of the objects embedded in the space-time continuum can correspond to nano (10-9), micro (10-6), macro (101-103), mega (106) and tera (1012) units of scale of the phenomenon in the equivalent multidimensional space. The above components are subsystems of a single integrated information technology based on computer networks and telecommunications. They interact with each other at different levels of the information analytical complex’s hierarchy. Each participant in the adaptation processes in the single information space provides an active focus of collegial joint efforts through its own adaptive role (the roles of each participant in the agile process). Such components development requires a clear and formalized integration process, where each of its components is a separate discipline. Ignoring the interaction between them sometimes leads to a fatal outcome. To a greater extent, this applies to the process of coordinating the architecture of the system as a stable basis for the entire design solution. Agile methodology [9-11] in the single information space provides (fast, situational, adaptive, early, efficient, ergatic) interaction through typical interface equipment. Under IASі, i i, n management the corresponding role software and hardware and information-analytical support of functioning quality indicators Q0 S (quality of security) in the joint polyergatic production organization are activated. Adaptive-collegial and simultaneously distributed in the single information space and space-time continuum system of situational response IASi to multiple changes in the effects of environment factors provides overcoming the great complexity of parallel events information analytical complex. Guaranteed adaptive control of complex dynamic system software and hardware processes due to the intelligent integration of heterogeneous technical and technological solutions according to the Agile concept [9-11]. The unique result of the guaranteed level of information security in the conditions of risky operation of open information systems arises as a result of large-scale combination of theoretical (scientific- analytical) and practical (ASSA) knowledge on the basis of rapid development of technologies of informatization of ergatic (human-computer) interaction. Each triangle generates a three-dimensional tetrahedron (quadrilateral). This states that the volume prediction arises due to the integration of various knowledge of specialists (experts Intelligent system agent). We are gaining experience in knowledge of technical and technological solutions (information and analytical software in the memory of distributed computers), as well as knowledge of the implementation of fast telecommunications messaging between all participants of information analytical complex at different hierarchical levels (Table 1), which is proposed. As a result of the Agile interaction methodology, the method of decomposition of complex distributed system into particles (single information space into specific space-time continuums) and synthesis of future product due to alternate (iterative, sequential, asymptotic) approximations from the 323 current state to achievable goals with guaranteed prevention of disasters, accidents, catastrophes risks of entire environment [8,9]. The success of Agile methodology [9-11] for the management of information analytical complex’ processes is formed on the postulates of information security practice: Intelligent system agent collaboration has advantages over machines and tools. Crucial knowledge of technical and technological solutions is due to situational limitations; Continuous monitoring and diagnostics minimize unnecessary costs. a clear division of functions regulates the hierarchical priorities of polyergatic production organizations. Functional stability of the system due to adjustment, adaptation, coordination is maintained (stabilized) due to operational changes of tasks (plans, directives, guidelines). We adjust the current goals, criteria, standards, which no longer correspond to the processes, regimes and phenomena of entire environment interaction and complex dynamic systems for the expected end results of software and hardware. Agile constructive engineering technology according to the needs of determining a rational future is formed situationally in the single information space. The description of implementation operations in each ergatic node IASi has the form of the following cyclic chain procedure (sprint). For a step we integrate the 5 phases of activity: Plan, Design, Build, Test, Review. Activation of the IAS node begins with the Plan procedure. The full cycle of a specific mode of solving an activated task is completed by the Review procedure. Based on the change of time (ASSA situation) during interval a collegial hierarchical decision “what to do next?” is made. If the data is received by telecommunication channels by other IASj, j i whether to continue the next cycle (next + 1) to use the next step of interaction in the single information space of new additional information on entire environment and complex dynamic system. At each implementation of IASi ► IASj ► IASk messaging, interface tools implement their own interaction checks. Regulatory procedures are mandatory: access-transparency; diagnostics-control; conditions- adaptation. Changing the needs of service markers (access, diagnostics, conditions-restrictions) accordingly affects the subsequent roles, procedures and forms of response of individual intelligent system agent. As seen from the Figure 1, besides the main functions of each IAS it’s also worth to consider designing simple and stable interface for communication for each intellectual system agent. This interface must ensure uninterrupted communication between agents to solve the general problem of ensuring the security of the system. To ensure IASi ► IASj communication process it is necessary to define structural and functional schemes of dialogues between communicators, as well as well-defined access protocols and message formats that each student of the security process can recognize [12-13]. Format of the communication packages as well as structure and form of the messages is not a part of this scientific work and will be investigated in in subsequent studies. For current study, at the moment, we propose to assume that the format of messages and protocols for their exchange is based on generally accepted data formats of Transmission Control Protocol (TCP) transport layer of the web systems OSI model, such as, XML, JSON, CSV etc. Choice of the message format and protocol depends on the IAS interfaces and access protocols for each subsystem of information security indicators in the conditions of space-time continuum risks from independent effects of EI. In general, Data is disseminated through the formation of a special service focused on messaging (MOM - message- oriented middleware). This message-oriented middleware service guarantees delivery of the message from the AIS sender to the AIS recipient. A simpler mechanism is to copy the necessary data ESj and send them through telecommunications channels to another place of distributed system.The structural scheme of the formalized communication between the AISj (data file ESj) and the AISi (data file ESi) is functioning thanks to the messaging service that works for each sender and recipient is as follows: MOM(file) = ESj ⇔ netDIS ⇔ ESi (f ∗ ), (1) where f ∗- data file (which generates the ESj source and sends the distributed information system’s network to the ESi recipient), the content of which depends on certain МОМ (message-oriented middleware - special service focused on messaging) events. 324 Figure 1. Fragment of Intellectual system’s agents integration by means of message-oriented middleware in scope of finding solution in concrete situation that influence information system security and stability. But each ergatic node, which performs its own work sprint on the list, implements messaging on a system-specific transport protocol at the end of such a cycle. Specialized knowledge bases, data and information and analytical software (Table 2), integrate a specific manipulations fund. Thanks to the thematic specialization and disclosure of the essence, features and specifics of each activation phase according to the Agile methodology we will get 5 * 3 = 15 variable possibilities for each cycle of functioning of this competent specialist. According to the communication plan each variable possibility is communicated to the proper recipient in considerable format respecting chosen transportation protocol. An example of a slave interaction for 4 intelligent system agents is shown in Figure 2. According to (Table 1,2), the origin of the future solution of the information analytical complex security problem begins with the ASSA subsystem. It is from the situational awareness of the fact of changes and threats in the factors of influence of entire environment and complex dynamic system that structures the primary leading given system. Further in the competitive software and hardware complex and information system the necessary decomposition and formation of concrete subtasks is realized. Hierarchical deployment on subtask graphs is performed quickly until typical trivial problems (TTPs) are obtained. In the opposite direction, situationally defined TTPijk determine plans for the implementation of specific results by synthesis. According to the Agile methodology, all available and designated IT resources have: the linguistic name of the object; syntax, semantics, ontology and grammar of the rules of description of the information and analytical software scope; acceptance criteria; quantitative and qualitative criteria for agreeing the deviation degree; requirements for components and security modes of information security. Symbolization of all components of IT allows the use of non-numerical methods of data processing. Various thematic, object-oriented tables provide tasks: recognition, translation, simulation, identification, analysis, synthesis, forecasting, planning, modeling, testing, evaluation, documentation in various forms of knowledge. The useful result of the joint work of IASi forms the expected future product for implementation and safety and stability guaranteeing in information system’s software and hardware complex. In this final parallel step, it receives the DoD (Definition of Done)[14, 15] ID of the officially completed 325 document. In electronic form, it provides all the necessary forms of scientific and technological progress of society for the next external steps to further improve the safety of today's software and hardware complex. In such way we accumulate knowledge from the design, development, security and stability of systems that already have proven effectiveness and create a container of knowledge base where data will be entered into observations of this system, to analyze the decision in the dynamics of life. Table 2 Similarity of the 5 chain K cyclic functions of Sprint of each ergatic intelligent system agent in the integrated team of polyergatic production organizations’ information analytical complex, which coordinates the measurement, prediction and testing of future technical and technological solutions in software and hardware complex Rand Defining The essence features of the 3-forms specifics of integral ASSA subsystems of the Strategic possibility Tactical capacity of Operational resonant future information of the future resource provision synergy of analytical complex performers 1 Plan Tasks, design of the Project programming Measuring modes of space-time 2 Design Composition, Logical calculations Detailed expectation architecture conditions> how> 3 Build Construction, Determination of Functional system stages of stability realization of forms, construction what situations> 4 Test Compliance control Determination of Accumulation of expert plans complex dynamic experience and stability measurement facts 5 Review A varied review of Critical analysis of Periodic check for the future operating modes next sprint* usefulness * Each Sprint IASi has a task to start (begin) implementation of 5 step iterations of those K cycles with 3 forms of completion (go end). Only then is it possible to address the report with the provision of IT product and start (next + 1) Sprint implementation of this competence of the next task, which is coordinated by polyergatic production organizations’ information analytical complex. 5. Conclusions 1. Ensuring the continuity and integration efficiency of information technologies that accompany scientific and technological progress in the areas of forecasting, planning, design, development, testing, information security indicators of innovative models of future software and hardware complexes, requires the formation of an appropriate linguistic and terminological basis. This basis should be enshrined in the relevant directories, regulations, guidelines, ISO standards. Globalization of conceptual awareness of intellectual agents of polyergatic organizations of software and hardware complex guarantees rational multicriteria definition - how it is possible to reform and move away from the usual, traditional, unexpected threats and limitations in order to realistically and reliably overcome the problems of information security of software packages in open systems. 326 2. Necessary and sufficient conditions for highly effective integration of heterogeneous numerous technical and technological solutions with promising acts of action are preserved by telecommunication channels and Internet subnets. This means with the similarity of messaging functions form functional stability, coordinated controllability and rational development of future software and hardware complexes and information systems. Such approach can ensure informational and intellectual system’s functional stability under influence of changing entire environments. Figure 2: Conceptual scheme of team formation of synergistically adapted technical and technological solutions of the managed future software and hardware complex. 3. Natural and social randomness and variability of a single space-time system during the technological forecasting process of sequential and simultaneous cyclic iterative design, construction and testing of materials, parts, assemblies, units and complexes of future information analytical complex’s tools can not realize the level of safety and uncertainty of future modes of operation. The proposed technology in the distributed hierarchical information analytical complex’s team in advance raises public awareness ahead of knowledge of the patterns of certain trends in the external environment. As well as propose new approach for collecting empirical knowledge that were got after applying one or another solution. 327 4. Communication between each information analytical complex’s team should be constructed according to the interfaces and access protocols for each subsystem of information security indicators in the conditions of space-time continuum risks from independent effects of entire environment. Format of the communication packages should take more consideration as it can influence not only the speed of response to the system but also its stability in general. This topic will be investigated in subsequent studies. 6. References [1] J. Andress, The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice, Syngress, 2014. [2] J. Biskup, Security in computing systems: challenges, approaches and solutions, Berlin, Springer, 2009. [3] M. E. Whitman, H. J. Mattord, Management of Information Security (5th ed.). Cengage Learning. 2016. p. 592. [4] Seungwan Hong, Sangho Park, Lee Won Park, Minseo Jeon, Hangbae Chang, An analysis of security systems for electronic information for establishing secure internet of things environments: Focusing on research trends in the security field in South Korea, Future Generation Computer Systems (2018) Vol. 82, pp. 769 – 782. [5] M. Hajizadeh, T. V. Phan, T. Bauschert, Probability Analysis of Successful Cyber Attacks in SDN- based Networks, in Proceedings of IEEE Conf. Netw. Function Virtualization and Software Defined Networks (NFV-SDN), 2018, pp. 1–6. [6] T. Norman, A Complete Reference for Building Enterprise-Wide Digital Security Systems, Integrated Security Systems Design (Second Edition), 2014, pp. 33 – 47. [7] E. Slawiñski, V. A. Mut, J. F. Postigo, Stability of systems with time-varying delay, Latin American applied research (2006) Vol. 36, No.1, pp. 41 – 48. [8] H. L. Baranov, O. A. Mashkov, V. R. Kosenko, Syntez struktury skladnoi systemy na osnovi metodiv ranzhuvannia pokaznykiv yakosti [Synthesis of the structure of a complex system based on methods of ranking quality indicators], in: Proceedings of the International Scientific Conference “Intellectual systems of decision-making and problems of computational intelligence” (ISDMCI’2014), Ukraine, Kherson, HNTU, 2014, pp. 108-114. (in Ukrainian) [9] Agile-software development manifesto, 2001. URL: http://agilemanifesto.org/iso/ru/ manifesto.html. [10] P. Salza, P. Musmarra, F. Ferrucci, Agile Methodologies in Education: A Review. In Agile and Lean Concepts for Teaching and Learning, Springer (2019), pp. 25–45. [11] H. S. Tooranloo, S. Saghafi, The relationship between organisational agility and applying knowledge management, International Journal of Agile Systems and Management (2018) Vol. 11, No.1, pp. 41 – 66. [12] H. L. Baranov, V. L. Mironova, Intehratsiia informatsiinykh tekhnolohii dlia pidvyshchennia rivnia bezpeky rukhu vysokoshvydkisnykh transportnykh zasobiv [Integration of information technologies to increase the level of traffic safety of high-speed vehicles], in Proceedings of the International scientific-practical conference “Development of economic education and formation of bases of financial literacy of student's youth – a basis of development of a civil society and formation of economy of knowledge”, Kyiv, Institute of Gifted Children NAPS of Ukraine, 2017, pp. 54 – 57. (in Ukrainian) [13] H. L. Baranov, V. L. Mironova, H. H. Sobolevskyi, Ratsionalnyi rozpodil funktsii v erhatychnykh systemakh navihatsii ta upravlinnia rukhom vysokoshvydkisnykh transportnykh zasobiv z metoiu harantuvannia pidvyshchenoho rivnia bezpeky u kryzysnykh sytuatsiiakh [Rational distribution of functions in ergatic navigation and traffic control systems for high-speed vehicles in order to ensure an increased level of safety in crisis situations], Kharkiv (2013) Science and technology of the Air Force of the Armed Forces of Ukraine, Ivan Kozhedub Kharkiv National University of the Air Force, Vol. 1, pp. 189-193. (in Ukrainian) [14] Definition of Done - scruminc. URL: https://www.scruminc.com/definition-of-done/. [15] D. Smith, The Definition of Done: What does “done” actually mean? URL: https://medium.com/@dannysmith/the-definition-of-done-what-does-done-actually-mean- ef1e5520e153. 328