<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Cybersecurity Providing in Information and Telecommunication Systems, October</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Modified Genetic Algorithm for Solving the Problem of Selecting Hardware and Software for Information Security</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Valerii Lakhno</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrii Blozva</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dmytro Kasatkin</string-name>
          <email>d.kasatkin@nubip.edu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Dmytro Tyshchenko</string-name>
          <email>tyshchenko_d@knute.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tamara Franchuk</string-name>
          <email>franchuk_t@knute.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Kyiv National University of Trade and Economics</institution>
          ,
          <addr-line>Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National University of Life and Environmental Sciences of Ukraine</institution>
          ,
          <addr-line>Kiev</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2021</year>
      </pub-date>
      <volume>26</volume>
      <issue>2021</issue>
      <fpage>236</fpage>
      <lpage>243</lpage>
      <abstract>
        <p>This article proposes a modified genetic algorithm for solving the problem of hardware and software selection for information protection and information security of informatization objects. In contrast to existing solutions, it is proposed to apply a new coding method. It is also proposed to use the so-called elite strategy for the formation of new generations by a gene bank integration into the algorithm. The use of a gene bank allows one to reduce the number of generations in the process of the solution search. Therefore, it leads to a general reduction of genetic algorithm working time. Optimization, genetic algorithm, development of information security circuits, object of</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Correctly implemented selection of equipment to ensure information security (IS) of various objects
of informatization (OBI) largely determines the success of modern enterprises, where a variety of
information technologies (IT) have become a common component of business processes.</p>
      <p>Nowadays, a range of equipment for solving the problems of information security (IS) provision for
the objects of informatization (OBI) grants a scope of opportunities for the information security
acquisition, see Fig. 1.</p>
      <p>
</p>
      <p>However, the milestones of the equipment selection for each of the IS circuits do not lose their
relevance. It has become especially noticeable during recent years in the face of an increase in the
number and complexity of cyber attacks against various OBIs.</p>
      <p>The solution of problems related to the equipment selection for IS assurance of the OBI dictates the
need to take into account the opposite tendencies:
on the one hand, it is necessary to purchase information security hardware and software (H&amp;S),
which allows one to ensure a high degree of information security, both for an individual circuit
and for OBI as a whole;
on the other hand, if one does not consider the critically important objects of informatization
(for which a priori reliable protection is a primary task) in the conditions of market competition,
it should be taken into account that the costs of acquiring IS H&amp;S should be minimized, and
the funds invested into information security should pay off.
(A.</p>
      <p>2022 Copyright for this paper by its authors.</p>
      <p>Nowadays, many IS H&amp;S have similar characteristics, moreover, some IS H&amp;S receive broader
capabilities that are overlapping characteristics of more highly specialized information security tools
(IST).</p>
      <p>Problems of IS H&amp;S selection are especially relevant for state OBIs; since the lack or excess of
equipment for various IS circuits on large commercial OBI can be compensated by other IS H&amp;S on
another protection circuit. Meanwhile, it is impossible at the state-owned enterprises due to the limited
budget. Therefore, the wrong choice of IS H&amp;S can negatively affect the OBIs information security
metrics.</p>
      <p>There are various ways to optimize the process of IS H&amp;S selection for OBI. Quite a lot of scientific
publications are devoted to this topic. A short overview of such researches is given below. However,
within the scope of our study, we will focus on the possibilities of genetic algorithm (GA) usage within
the problems of components of IS H&amp;S selection along the contours of IS.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Review of Research Literature</title>
      <p>
        The expediency of GA usage can be substantiated by the fact that the problem being solved belongs
to multi-criteria and multi-extreme problems [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ].
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ] it is shown that GAs can be used in the course of solving multicriteria optimization
problems, which are variations of evolutionary search methods.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ] the features of GA usage for tasks related to the choice of equipment for OBI information
protection systems are analyzed. However, the solution proposed by the authors is essentially a
combination of the standard greedy and GA.
      </p>
      <p>It is quite difficult to unambiguously algorithmize the efficiency of the H&amp;S choice for the
multicircuit OBI due to the description of the objective function. The objective function should be
multivariable, as far as it is influenced by many factors. Moreover, these factors are often probabilistic.
Therefore, it is better to evaluate and model indicators in relation to the IS H&amp;S complexes. And only
after such evaluation, the impact of these complexes on the performance indicators of OBI can be
evaluated, in particular using the information security metrics of the enterprise. The values of these
indicators, including the information security metrics, can be used in the H&amp;S selection for the
information security.</p>
      <p>All of the above written has determined the relevance of our research.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Models and Methods</title>
      <p>The formation of the IS infrastructure contours of OBI implies the process of delimiting the tasks
related to information protection and cybersecurity between these contours. As shown in Fig. 2.</p>
      <p>The contours (perimeters) of the IB OBI in Fig. 2:
 PIS (I) – the perimeter of the information system of OBI;
 PCOI (II) - perimeter of control of information object;
 UAP (III) - User Access Perimeter;
 PNE (IV) - the perimeter of the network equipment;
 OPIO (V) - the outer perimeter of information object.</p>
      <p>In Fig. 2, the following designations are adopted: AVP - anti-virus software; DIC - OBI data integrity
control tools; AEIS - audit of cyber incidents; PSIO - providing physical protection for OBI; B - backup
of OBI information arrays; UAC - control over the actions of OBI personnel; SDCA - subsystems for
detecting cyber attacks on OBI; MACS - event monitoring subsystem; NLAC - control of network
activity on OBI.</p>
      <p>The goal function for the problem of IS H&amp;S infrastructure optimization for the OBI information
security circuit will be described as the cost of an information security tools set. It can be represented
as the following expression:
where~ ci  cost of the i  the contour of IS OBI;
c zj  cost of additional means of protection (IS H&amp;S) for the i  the OBI IS circuit
k  number of protection means (IS H&amp;S) for the i  the OBI IS circuit;
m  number of IB contours OBI
u  the number of options for filling each of the OBI IS contours
ciril  the number of IS circuits of OBI, for which specific IS H&amp;S are needed to achieve the
required indicators for IS metrics
nij  the number of IS H&amp;S type for the go contour of the IS OBI.</p>
      <p>Wherein</p>
      <p>m m k  di !
u   hi   ,</p>
      <p>i 1 i 1 di!k!
di  number of IS H&amp;S for the OBI circuit.</p>
      <p>Optimization can be done for variables c zj and ciril , which are contained in the expression (1).
One can write the limitation on the number of minimum required IS H&amp;S as follows:
k
 nij  di ,
j 1</p>
      <p>i  1..cir.
 k 
  nij  met j 
k  j 1
 
i 1 SM



  N M ,




(1)
(2)
(3)
(4)</p>
      <p>
        Restriction on the sufficiency of the integral metric [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] of information security for all OBI contours
for a finite set of IS H&amp;S, which provides a given level of information security for the analyzed object:
where met j – IS metrics for the OBI IS contour;
      </p>
      <p>SM  total IS metric for OBI;
NM  the required number of APS IS for the safe operation of OBI.</p>
      <p>Constraint that describes the integer nature of the current task:
ciril , nij  0, ciril , nij  integral.</p>
      <p>In the considered GA, the population is a set of decisions in the course of the IS H&amp;S choice.
Namely, these are, in fact, different combinations of IS contours sets. Therefore, the individuals in the
population will contain one chromosome with the number of genes, which is equal to the number of
variants of possible arrangements of the IB contour. It is determined by expression (2). In contrast to
the classical GA, which uses binary coding, the study used the coding list</p>
      <p>The list item contains such information:
 IS contour OBI in accordance with Fig. 1 and 2;
 the composition of the IS H&amp;S for the circuit;
 general indicators for safety metrics for the circuit;
 the cost of a set of IS H&amp;S for the circuit.</p>
      <p>The number of genes in the chromosome ( ch ) is taken to be equal to the number of elements in the
list of variants of the APS IB sets of the corresponding IB contour.
Expression (1) will be used as a fitness function.</p>
      <p>Possible combinations of IS H&amp;S sets of individual contours will constitute a population ( pop ). At
the same time, restrictions were adopted on the number of minimum required APS IS and their total
cost.</p>
      <p>In Fig. 3 the procedure, which was applied during the creation of the initial population, is shown</p>
      <p>We randomly select the number of the record in the list of IS H&amp;S sets. Add 1 to the gene that
corresponds to this set.</p>
      <p>Then we check that chromosome ( ch ) meets constraints (3) and (4).</p>
      <p>We repeat the procedure shown in Fig. 3 until the required indicators for the IS metrics for the
analyzed OBI are achieved. In a specially created data structure we enter the numbers ( NG ) of
generations of chromosomes ( ch ).</p>
      <p>
        The size of the population depends on the number of chromosomes. For each chromosome ( ch ) in
the population, fitness is assessed by calculating the fitness function. The lower the value of the fitness
function will be - the quality of the chromosome will be higher. At the next step of the modified GA
operation, see Fig. 4, we sort the obtained values. It is so-called rank selection [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref8 ref9">8–13</xref>
        ].
      </p>
      <p>The general scheme of the GA is shown in Fig. 4.</p>
      <p>Crossing or crossing over is the exchange of chain fragments between two parental chromosomes.
In accordance with the block diagram of the algorithm shown in Fig. 4, the partition point is chosen
randomly. Next, we attach the left side of the first chromosome in a pair to the right side of the second
chromosome. Accordingly, we attach the left side of the second chromosome to the right side of the
first chromosome.</p>
      <p>We carry out selection for each generation.</p>
      <p>We select "viable" individuals on the basis of constraint (4). Then the ranking is performed by the
value of the fitness function (1).</p>
      <p>The best individuals are transferred unchanged to the next generations.</p>
      <p>The computation ends when the specified number of generations is reached. As shown by
computational experiments, the convergence of the algorithm is achieved for at least fifty generations.</p>
      <p>To check the adequacy of the model described in the work, the corresponding computational
experiments were carried out, see Fig. 5.</p>
      <p>Computational experiments were carried out for randomly generated IS H&amp;S sets to protect OBI
circuits. The efficiency of the three algorithms was compared, see Fig. 5.</p>
      <p>In the course of computational experiments, it was found that the modified GA is distinguished by
a sufficiently high efficiency and speed. It was found that the time spent on solving the problem when
using the modified GA described above is approximately 15–20 times less in comparison with the
indicators of the branch and bound method. This circumstance allows, in the future, when finalizing the
decision support system, to opt for this particular algorithm.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusions</title>
      <p>A modified genetic algorithm (MGA) was proposed; it can be applied in the problem of hardware
and software selection for information protection and ensuring information security of informatization
objects. In contrast to existing solutions, it was proposed to use a different coding method, as well as to
use an elite strategy, selecting the best individuals for the gene bank. The use of a gene bank allows one
to reduce the number of generations in the search for the solution. Moreover, it leads to a general
reduction in the operating time of the MGA.</p>
    </sec>
    <sec id="sec-5">
      <title>5. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Chiba</surname>
          </string-name>
          , et al.,
          <article-title>New anomaly network intrusion detection system in cloud environment based on optimized back propagation neural network using improved genetic algorithm</article-title>
          .
          <source>International Journal of Communication Networks and Information Security</source>
          <volume>11</volume>
          (
          <issue>1</issue>
          ) (
          <year>2019</year>
          )
          <fpage>61</fpage>
          -
          <lpage>84</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Nozaki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Yoshikawa</surname>
          </string-name>
          ,
          <article-title>Security evaluation of ring oscillator PUF against genetic algorithm based modeling attack</article-title>
          .
          <source>In: International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>338</fpage>
          -
          <lpage>347</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -22263-5_
          <fpage>33</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Dwivedi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Vardhan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Tripathi</surname>
          </string-name>
          ,
          <article-title>Incorporating evolutionary computation for securing wireless network against cyberthreats</article-title>
          .
          <source>The Journal of Supercomputing</source>
          (
          <year>2020</year>
          )
          <fpage>1</fpage>
          -
          <lpage>38</lpage>
          . doi:
          <volume>10</volume>
          .1007/s11227- 020-03161-w.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>F.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , et al.,
          <article-title>Multilayer data-driven cyber-attack detection system for industrial control systems based on network, system, and process data</article-title>
          ,
          <source>in: IEEE Transactions on Industrial Informatics</source>
          <volume>15</volume>
          (
          <issue>7</issue>
          ) (
          <year>2019</year>
          )
          <fpage>4362</fpage>
          -
          <lpage>4369</lpage>
          . doi:
          <volume>10</volume>
          .1109/tii.
          <year>2019</year>
          .
          <volume>2891261</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>U.</given-names>
            <surname>Baroudi</surname>
          </string-name>
          , et al.,
          <article-title>Ticket-based QoS routing optimization using genetic algorithm for WSN applications in smart grid</article-title>
          .
          <source>Journal of Ambient Intelligence and Humanized Computing</source>
          (
          <year>2019</year>
          ).
          <source>doi:10.1007/s12652-018-0906-0.</source>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>T.</given-names>
            <surname>Llansó</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>McNeil</surname>
          </string-name>
          ,
          <string-name>
            <surname>C.</surname>
          </string-name>
          <article-title>Noteboom, Multi-criteria selection of capability-based cybersecurity solutions</article-title>
          .
          <source>In: 52nd Hawaii International Conference on System Sciences</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>7322</fpage>
          -
          <lpage>7330</lpage>
          . doi:
          <volume>10</volume>
          .24251/hicss.
          <year>2019</year>
          .
          <volume>879</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>V.</given-names>
            <surname>Lakhno</surname>
          </string-name>
          , et al.,
          <article-title>The use of a genetic algorithm in the problem of distribution of information security organizational and financial resources</article-title>
          ,
          <source>in: 2020 IEEE 2nd International Conference on Advanced Trends in Information Theory, ATIT</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>251</fpage>
          -
          <lpage>254</lpage>
          , doi:10.1109/atit50783.
          <year>2020</year>
          .
          <volume>9349310</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Lakhno</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          , et al.,
          <article-title>Funding Model for Port Information System Cyber Security Facilities with Incomplete Hacker Information Available</article-title>
          ,
          <source>Journal of Theoretical and Applied Information Technology</source>
          <volume>96</volume>
          (
          <issue>13</issue>
          ),
          <fpage>4215</fpage>
          -
          <lpage>4225</lpage>
          ,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>D. K.</given-names>
            <surname>Proskurin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K. A.</given-names>
            <surname>Makoviy</surname>
          </string-name>
          ,
          <article-title>Modified genetic algorithm for solving the problem of selecting server, resources in building the infrastructure of virtual desktops</article-title>
          , Voronezh State Technical University, Voronezh, Russia,
          <year>2021</year>
          , pp.
          <fpage>6</fpage>
          -
          <lpage>51</lpage>
          . doi:
          <volume>10</volume>
          .36622/vstu.
          <year>2021</year>
          .
          <volume>17</volume>
          .3.
          <fpage>006</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          , et al.,
          <article-title>Invasion Detection Model using Two-Stage Criterion of Detection of Network Anomalies</article-title>
          ,
          <source>Cybersecurity Providing in Information and Telecommunication Systems (CPITS)</source>
          , pp.
          <fpage>23</fpage>
          -
          <lpage>32</lpage>
          , Jul.
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>V.</given-names>
            <surname>Lakhno</surname>
          </string-name>
          , et al.,
          <article-title>Allocation of organizational and financial resources of the information protection side using a genetic algorithm</article-title>
          ,
          <source>Lecture Notes in Networks and Systems</source>
          (
          <year>2021</year>
          )
          <fpage>41</fpage>
          -
          <lpage>53</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -77448-
          <issue>6</issue>
          _
          <fpage>5</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>K.</given-names>
            <surname>Khorolska</surname>
          </string-name>
          , et al.
          <article-title>Usage of clustering in decision support system</article-title>
          .
          <source>In: Raj J.S.</source>
          ,
          <string-name>
            <surname>Palanisamy</surname>
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Perikos</surname>
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shi</surname>
            <given-names>Y</given-names>
          </string-name>
          . (eds),
          <source>Intelligent Sustainable Systems. Lecture Notes in Networks and Systems</source>
          , vol.
          <volume>213</volume>
          , Springer, Singapore (
          <year>2022</year>
          ). doi:
          <volume>10</volume>
          .1007/
          <fpage>978</fpage>
          -981-16-2422-3_
          <fpage>49</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>B.</given-names>
            <surname>Bebeshko</surname>
          </string-name>
          , et al.,
          <article-title>Use of neural networks for predicting cyberattacks</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>2923</volume>
          ,
          <year>2021</year>
          , pp.
          <fpage>213</fpage>
          -
          <lpage>223</lpage>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>