Informational and Procedural Description of an Energy-active Control Object Behavior Under Active Threats Conditions Liubomyr Sikoraa, Nataliia Lysaa, Rostyslav Tkachukb , Olga Fedevycha a Lviv Polytechnic National University, 28a Bandery Str., Lviv, 79000, Ukraine b Lviv State University of Life Safety, 35 Kleparivska Str., Lviv, 79000, Ukraine Abstract Infrastructure activities and energy-active objects management involves formation and processing of multifaceted information on production and sale of energy resources by its operative personnel system. The synergistic management effect will be achieved thanks to system’s emergent property, with formation of an integrated information environment in spatio-temporal dimension, which will reflect "life's multifacetedness" in the context of combining main activity with society’s value demands. Activity and decision-making of operational personnel creates characteristics of energy-active object and becomes a reflection of strategically verified cost-value content of its development in general. Such a motivational reference point manifests itself as acquisition of its information- procedural image (characteristic "portrait") of integrative quality. The activity effect will be reflected in result and state of energy-active object, which are evaluated based on image’s parametric information in space-time dimension. Integrative property of management system will be presented as an integration process that will continuously dynamically accompany executive processes that are activated by management influences and become integrated, just like management process. Integrative informational relevance of tactical and strategic assessments of energy-active facility activity and integrated decisions adoption that purposefully affect state and result of activity will be supported. Keywords 1 Integration, system, process, risks, decision-making, information technology, energy-active object 1. Introduction Problem of comprehensive improvement of infrastructure and energy-active object management is defined as need to achieve systematic optimization of problem solving under condition of ensuring sustainable activity and interconnected management of technological and organizational processes, design and research. This problem is solved during development of management system and with involvement of operative personnel with their practical experience. It is related to the problems of increasing efficiency of infrastructure and energy-active object, scientific and technical levels and quality of management system, which is developing as integrated system. Introduction of new tasks should increase integration synergistic effect. That is, management system must achieve a higher integration degree at all phases of its life cycle, starting with study of development problems, designing their automated solution as tasks, ending with IntelITSIS’2023: 4th International Workshop on Intelligent Information Technologies and Systems of Information Security, March 22–24, 2023, Khmelnytskyi, Ukraine EMAIL: lssikora@gmail.com (L. Sikora); lysa.nataly@gmail.com (N. Lysa); lvtk@ukr.net (R. Tkachuk); olha.y.fedevych@lpnu.ua (O. Fedevych) ORCID: 0000-0002-7446-1980 (L. Sikora); 0000-0001-5513-9614 (N. Lysa); 0000-0001-9137-1891 (R. Tkachuk); 0000-0002-8170-3001 (O. Fedevych) © 2023 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings (CEUR-WS.org) practical implementation as coordinated work of all compatible components (subsystems, sets of tasks) of system. Therefore, it is necessary to manage the operation of system itself, with an assessment of integration degree by management phases. 2. References analysis In [1], basics of hierarchical systems intellectual management by operative personnel are substantiated. Basic principles of systemology and complex systems management are outlined in the works [2- 3]. In monographs [4,5,6,7], basics of management theory and decision-making by operational personnel in complex systems under risk conditions and active factors effect on management systems are substantiated. Work [8] provides an analysis of risks types that may arise during management in hierarchical man-made systems. Work [9] substantiates systemic and logical-cognitive aspects of managing complex systems in emergency situations. Procedures for decision-making by operational personnel and their problems in making management decisions are considered in [10]. The justification of methods and project control means, which require an integrated approach using data protection and processing theory, interpretation of new data and situations, and management decision- making are considered in [11,12]. Works [14-16] consider management decisions problems in risk conditions and changes in situation under active factors influence directly on management process. Work [13] provides basics of managing an energy-active facility under risk conditions. In [17-20], main methods of protecting hierarchical systems from external and internal attacks are revealed. 3. Main research results In technological structures, it is impossible to manage processes without data selection, their processing, and in case of incompleteness - replenishment due to scientific, engineering, professional knowledge and experience of an expert in structure of decision support system (DSS). In fact, expert system in decision support system structure has two intellectual components to be applied: 1. Formalized knowledge acquired while processing situations, data, scientific and technical theories and technologies, abstracting cognitive knowledge, logically ordered and recorded in engineering-normative knowledge base, as a basis for supporting and correcting management decisions in the structure of ACS-TP (technological process of automated control system) at the operational level; 2. Scientific-engineering knowledge and personal professional experience of a high-level expert, whose cognitive system, based on creative logical-analytical system thinking, forms abstract structures, which are basis of categorical models of strategic coordination goal-oriented management for the upper level of man-made system infrastructure hierarchy that is affected by active threat factors and targeted information attacks. 3.1. Methodology for object management determination, taking into account operator’s nervous system Subject-oriented information-procedural description of an energy- active facility behavior of infrastructure management under active threats conditions will be described below. Structural diagram of formation of management object subject-oriented description based on production hierarchical structure and activity cognitive structure and operator's nervous system way of thinking has the form (Fig. 1) and includes following components of information and intellectual technology. According to the hierarchical system structure, a data exchange interface is built between technological, operational and strategic management layers, which is necessary for intelligent data processing formation and management operations. The acquisition of expert knowledge by operational personnel in process of working in energy- active units’ limit modes is characterized by the fact that expert system performs cognitive intellectual functions, which consist in assessing image of situation and making decisions based on the processed data (CIA →ACS) (Fig. 1) obtained during process of professional activity at all infrastructure hierarchy levels. Designation in Fig. 1. ITS – information-technological system, IMS – information-measuring system, ACS – automated control system, MO – management object, CIA – cognitive intelligent agent, {Fn } – factors of active actions on system,αrisk – risks.Therefore, role of a cognitive intellectual agent person is reduced to the fact that an expert- consultant performs in an active cognitive mode an intellectual operation (IA) of the type: IA1 – processes data and knowledge of subject area; IA2 – in accordance with target task chooses a scheme, procedure, algorithm and strategy for its solution based on risk factors identification due to action of threats and attacks; IA3 – in case of insufficient data and incomplete knowledge, searches for methods of supplementing their knowledge within basic theory management framework, system analysis, logic- cognitive methods of generating ideas and creative solutions; IA4 – based on heuristics, generates hypotheses about problem solving schemes; IA5 – chooses procedures or algorithms, according to reference models of production system functioning and goal-oriented strategies; IA6 – finding the appropriate scheme for problem solving, expert describes problem area in the form of a set of facts and rules (proof, solution) and ties them to target tasks; IA7 – fills ES with new knowledge (as basis of ES self-learning process), organizes and formalizes on basis of logical rules and system analysis; IA8 – transmits data to operational personnel for decisions formation. On the basis of system approach and cognitive diagrams, appropriate stages of searching for a method of solving management problems in dialog mode are developed with appropriate sequence, for target task and problem situation; IA9 – generation of infrastructure functioning strategic and local goals. In accordance with the target expert tasks, lets highlight management consulting modes (Fig. 2) R1 – ES mode of client-IA consultation: during operator-intelligent agent (IA) with ES dialogue, problem solution is ensured from subject-oriented area, using formed knowledge base and DB, ES, and situational data of certain reliability level; R2 – ES awareness mode of one's own essence of cognitive component through self-testing includes decision-making procedures based on logical explanation schemes, scheme mechanisms, proof procedures when solving test problems (self-diagnosis) in production system structure – a system involved in strategic management. R3 – Filling database and knowledge by expert mode, formation of interface, strategies and dialogue modes (operator – ES – DSS) in the initial and current operation mode. R4 – Testing mode, when an expert and a knowledge engineer (ІАе, ІАd) using dialogue and explanatory tools check ES competence to a given level of plausibility and correctness according to the model and a specific interpretation of production situation; R5 – Working mode with clients at all levels of operational and strategic management hierarchy. To increase cyber security level, following data processing and selection procedures are used on the basis of intelligent operations using information technology methods (Fig. 2), which, accordingly, is the reason for minimizing risk level in the event of threats complex to infrastructure. ІTS Situation { Fi} CІА1 IMS {Fn} Х CІА2 Operations type selection ACS MO {FR} CІАn Strategic infrastructure management level Σαrisk Х Expert system {KTAi} - experts R1 IA1 α1 risk Consultation IA2 α2 risk IA3 α3 risk R2 IA4 α4 risk Cognitive crisis situation essence IA5 α5 risk IA6 α6 risk R3 Situations intelligent assessment and scheme IA7 α7 risk selection for problem solving IA8 α8 risk R4 IA9 α9 risk Management strategies choice Figure 1: Structural-functional scheme of a set of informational and intellectual operations for management process implementation in countering threats, attacks, and risk conditions Intelligent procedures of system structuring: PR1 – extracting knowledge from the expert and operational staff to fill procedural knowledge base; PR2 – management hierarchy organization for effective operation of production structure based on corporate agreement strategy; PR3 – submission of requests and knowledge in a form understandable by ES in dialogue mode in access mode according to access level; The essence of knowledge discovery process by experts consists in procedures for conducting heuristic and logical analyzes of problem area in accordance with target tasks, taking into account the cognitive characteristics of each agent, and formation of system knowledge models that provide situations awareness of their information structure, which is basic for problem solving. Informational and intellectual knowledge assessment about CIA operation, about effective management processes includes: PI1 – objects and concepts of subject area for identifying goals, assessing situations, building procedures, decision-making schemes; PI2 – characteristics of object and situations state (probability of events occurrence, goals significance coefficients, alternatives ranking, identification of advantages signs); PI3 – comparison indicators of situations in (threat management) mode to establish cause-and- effect relationships between objects and influence degree in objects hierarchy and management structures. Infrastructure problematic situation KFi M (sit ПCi (t)) Expert consultation _(КІАЕ) Еі Team of R1 – consultations Е1 experts X R2 – cognitive operations Е2 R3,4 – testing knowledge DSS Е3 replenishment R5 – teamwork Е4 Dialogue Intelligent procedures PRK Si ПR1 – knowledge formation Z1 IACS management system infrastructure X ПR2 - structuring Gi ПR3 – consultations Di SIi Assessing situation procedures in IASU Pri РІ1 – DSS mode Rj Technology X production РІ2 – situation assessment in ACS Is infrastructure object РІ3 – threats signs detection Iz FR FE Fn Figure 2: Structural-functional scheme: a set of informational and intellectual operations for management process implementation in countering threats, attacks, and risk conditions Accordingly, information ensures preparation of scheme and management process procedure. VSS1 – hierarchical management structure, which includes strategic, administrative, operational management and ACS-TP; VSS 2 – information module that includes strategy synthesis, problem generators, situations identification, data processing unit, logic-mathematical processor, knowledge jams structures, diagnostic system and test generators; VSS3 – management object model with aggregated series-parallel connected, active blocks of processing of material and energy resources. VSS4 – logical-cognitive model of knowledge organization structure of operator (CIAi) - agent, which ensures decision-making process in hierarchical management system. 3.2. Information and management interaction in infrastructure The interrelationship of informational and managerial interaction components, respectively, is based on informational-systemic and logical-cognitive procedures that reflect the agent's thinking process in formation and implementation of targeted countermeasures against threats and active attacks on infrastructure. Let's define basic components of informational-systemic and logical-cognitive activity: PR 1LK – generation of target task using operator’s cognitive system based on acquired experience and knowledge; PR 1IC – formation of subject knowledge hierarchy for management; 2 PR IC – creation of knowledge terms subject-oriented field dictionary; PR 2LК – strategies generation and procedures of its solving according to tasks purpose; PR 3LK – logical-cognitive procedures synthesis for getting out of conflict on the basis of a conceptual model which is based on existing knowledge structure and intellectual agent experience; PR 4LК – logical-mathematical procedure development for choosing management strategies, based on a typical procedure and algorithms for solving object management non-standard problems under conflict risk conditions; PR 3IC – building a model of structure and a model of states space as well as taking into account space of goals, which is parameterized using operator's knowledge organization cognitive structure; PR 5LК – creation of diagnostic system for choice adequacy of decision-making strategies for target management task implementation. In combating attacks and resource threats system, let’s highlight following IACS levels (Fig. 3.): 1. Strategic management level with problem situation assessment and indication system in (IACS) – an integrated automated control system. 2. Basic components of informational and intellectual activity of management cognitive states ( ) ( 0 ) and CIA4 - CIA4 strategic and operational. S 3. Cognitive expert's knowledge base (CEKB), which is personally formed by an intellectual agent with a creative way of thinking and intelligence. 4. Blocks (1,2,3), which characterize methods, processes, procedures necessary for assessing situations and expert support. 5. Data flows information processing blocks about dynamic situation in IASU and control object (OC) based on crisis states selection of indicators and limit control modes from mode data. 6. Management risks control block (α risk (C , U )) in case of object mode deviation from target K area. 7. Expert active consultations formation block for new strategies (ACE – experts) formation. 8. Risk level classification block (α risk C i ≥ α d ) according to the permissible level. Accordingly, cognitive and intellectually logical operations are performed by intelligent agents both inside structure of management team and individually: • {CIAEi } – a team of experts; • {CIA } – an expert with appropriate level of decision-making authority; Ep • {CIA } – system management experts team; S U • {CIA } – operational management agents team at IACS; 0 U • {IAT } – strategic level experts; E SR • {IF ( A )} – team for forming an active attacks complex on infrastructure. ij AS In accordance with target task, let’s consider system, information and intellectual operations and their integration while formation of management procedures and countering attacks (Fig. 3). According to the scheme in Fig. 2. of information-cognitive interaction of IACS and (IFij ( A)) - integrated attack system on management process -, two components of risk integration can be distinguished, which, if level is exceeded, lead to accidents: • logical-cognitive errors in decision-making procedures due to incomplete knowledge and incorrect decisions; • systemic, logical and cognitive errors in selection of mathematical models of management objects dynamics and structure as well as procedures and algorithms for processing heterogeneous data. 4. Results & Discussion If take into account that management structure includes an automatic system for implementation of object management process (ACS – TP-ACS) and management operators team (cognitive agents) than behavior of such structure has a high risk of failure under threats influence. Accordingly, lets provide list of active threat attacks on man-made systems, both internal and external (Table 1). Table 1 Active threats and attacks on man-made systems № Name 1 Threats and information- intelligent attacks on infrastructure destruction 2 Structures of target threat to block technological process 3 Resource attacks to disrupt technological process 4 Information attacks in data transmission network fordistortion 5 Structural attacks on production systemorganization 6 Complex attacks on ACS - TP 7 Attacks on target disorientation 8 Attacks on authority hierarchy 9 Strategic management attacks 10 Attacks on processor systems of ACS control complex 11 Attacks on changing the mode of energy-active objects 12 Information-mental attacks on personnel to change stress resistance and goal orientation 13 Complex attacks on hierarchical management structure and internal conflicts 14 Attacks on complex destruction of man-madesystem IFj(Ar) Problematic situation in IACS MO KSU ПRЛК + CIAu Strategic level Goal generation W1 ZU1 CIAus ПRic 1 Management knowledge W2 hierarchy ZU2 Logical - cognitive procedures Cognitive KDB ПRic 2 Subject-oriented W3 knowledge base ZU3 α risk (Ci,U) 3 ПRлк Subject-oriented W4 knowledge base K1l Intellectual operations ПКлк2 Cognitive procedures for W5 CІАЕ getting out of conflict K2l ІАCЕ - strategies ПRлк4 Strategy for solving non- W6 standard problems K3l ПRR 3 Cognitive logic - Cognitive structuring W7 mathematical K4l operations ПR1k 5 Adequacy of goals to W8 strategies K5l αriskCi>αd Figure 3: Informational - system structural diagram of combating attacks technology Strategic management main goal is development of sustainable self-renewing production process methods based on goal orientation, integration, and coordination strategies under active goal-oriented threats conditions. Let's analyze the negative factors that influence on the functioning and management of an energy active object and infrastructure: 1. Subject-oriented description formation structure of management object based on its production hierarchical structure; 2. The structure of cognitive way of thinking of operator's neural system; 3. To analyze all components of man-made system functioning; 4. Give a source of risks and its impact on the structure of man-made system; 5. Give a source of active factors for functioning and management of the system; 6. To analyze the sources of possible negative attacks on structure management. So, after characterizing possible negative factors on the management and functioning of man- made system, the risks that affect management and functioning of the infrastructure can be assessed. Infrastructure integration risk assessment is presented in Table.2. Table 2 Infrastructure integration risk assessment № Component Integration Integration Informational Structural Resource risks integration requirements signs risks risks 1. Goal <0.55 >0.95 0.8 0.85 >0.85 orientation 2. Structure 0.9 0.95 >0.95 >0.95 >0.95 goals coordination 3. Functional 0.9 0.8 <0.15 <0.25 0.1 goals coordination 4. Goal >0.85 >0.75 >0.25 >0.2 >0.25 orientation of structure functioning 5. Consistency 0.9 >0.95 <0.15 <0.1 >0.15 of management organization 6. Ensuring 0.8 >0.9 <0.1 <0.15 <0.2 management actions 7. Structure 0.75 0.75 <0.25 0.35 <0.3 management organization 8. Resistance of 0.85 0.8 <0.25 <0.3 >0.3 structure to threats 9. Management 0.8 0.75 <0.35 <0.25 <0.45 mode analysis 10. Integration 0.95 0.9 0.15 0.1 <0.2 project team cognitive level analysis 11. n-system µn (CF ) µn (Bd ) Pr ob Pr ob Pr ob structural (0.7 ÷ 0.9) (0.7 ÷ 0.9) αr1 (0.1 ÷ 0.9) αr2 (0.1 ÷ 0.9) αr3 (0.1 ÷ 0.4) integration generalized risks 5. Conclusion According to informational and procedural description of target task of infrastructure and energy- active object management, the following was carried out: • Analysis of literature sources about intellectual management of man-made systems and infrastructure problems, and their resistance to external and internal attacks; • Problem of infrastructure and energy-active object complex management under complex threats conditions to management is substantiated; • Role of cognitive intellectual agent on management process in difficult conditions is substantiated; • Structural diagram of subject-oriented description formation of management object based on production hierarchical structure and cognitive activity structure as well as way of thinking of operator's nervous system is presented; • Relationship between informational and managerial interaction components, which is based on informational-systemic and logical-cognitive procedures, is substantiated; • System, information and intellectual operations and their integration in management procedures formation and countering attacks were considered; • A list of active threat attacks on man-made systems, both internal and external, and an infrastructure integration risk assessment table were given. Solving the above problems at system, procedural and information levels can help modernize existing infrastructure management and improve their design and management process. 6. References [1] J. Zhou, L. Xing, and C. Wen, Adaptive control of dynamic systems with uncertainty and quantization. Boca Raton, FL: CRC Press, 2021. doi: 10.1201/9781003176626 [2] G. Boy, The handbook of human-machine interaction: A human-centered design approach. 1st ed. Boca Raton, FL: CRC Press, 2011. doi: 10.1201/9781315557380 [3] M. Wiggins, Introduction to human factors for organisational psychologists 1st ed. Boca Raton, FL: CRC Press, 2022. doi: 10.1201/9781003229858 [4] H. Jantan, A. Hamdan and Z. Othman Intelligent Techniques for Decision Support System in Human Resource Management: in International Journal of Innovative Computing, Information and Control, 7(1), ICIC International, Hong Kong, 2011, pp. 13-24. doi: 10.5772/39401 [5] T.Hovorushchenko, O.Pavlova Method of activity of ontology-based intelligent agent for evaluating the initial stages of the software lifecycle: in Oleg Chertov, Tymofiy Mylovanov, Yuriy Kondratenko, Janusz Kacprzyk, Vladik Kreinovich, Vadim Stefanuk (Eds.), Recent Developments in Data Science and Intelligent Analysis of Information, volume 836 of Advances in Intelligent Systems and Computing, Springer-Verlag, London, 2019, pp. 169– 178. doi: 10.1007/978-3-319-97885-7_17. [6] L. Sikora, R. Tkachuk, N. Lysa, I. Dronyuk, O. Fedevych Information and logic cognitive technologies of decision-making in risk conditions in: Proceedings of the 1st International Workshop on Intelligent Information Technologies & Systems of Information Security IntellTSIS 2020, Khmelnytskyi, Ukraine, 2623 (2020) 340-356. [7] L.Sikora, R. Tkachuk, N. Lysa, I. Dronyuk, O. Fedevych, R. Talanchyk. Information- resource and cognitive concept of threat's influence identification on technogenic system based on the cause and category diagrams integration in: Proceedings of the 2nd international workshop on intelligent information technologies & systems of information security IntellTSIS 2021, Khmelnytskyi, Ukraine, 2853 (2021) 398-416. [8] P. Melin and O. Castillo, Modelling, simulation and control of non-linear dynamical systems: An intelligent approach using soft computing and fractal theory. Boca Raton, FL: CRC Press, 2019. doi: 10.1201/9781420024524 [9] H. Yousef, Power system load frequency control: Classical and adaptive fuzzy approaches. Boca Raton, FL: CRC Press, 2017. doi: 10.1201/9781315166292 [10] T.Aven, S. Thekdi, Enterprise risk management: advances on its foundation and practice 1st ed. London, UK, Routledge, 2019. doi: 10.4324/9780429425028 [11] D. O'Connor, I. McDermat, Systemic thinking and search for extraordinary creative solutions. Kyiv: Nash format, 2018. (In Ukrainian). [12] L. Sikora, N. Lysa, R. Tkachuk, B. Fedyna, O. Fedevych. Information and cognitive components of knowledge formation in procedures for assessing dynamic situations in cyber- physical in: Proceedings of the 3rd international workshop on intelligent information technologies & systems of information security IntellTSIS 2022, Khmelnytskyi, Ukraine, 3156 (2022) 129–139. [13] S. Demri, V. Goranko, M.Lange, Temporal Logics in Computer Science, Cambridge, Cambridge University Press, 2016. https://doi.org/10.1017/CBO9781139236119 [14] I. Goodfellow, J. Pouget-Abadie, M. Mirza, B. Xu, D. Warde-Farley, S. Ozair, A. Courville, Y. Bengio. Generative adversarial nets: in Advances in neural information processing systems, NIPS Foundation, Montreal (2014) 2672–2680. [15] D. Stirzaker, Stochastic processes and models. Cambridge University Press, 2016. doi: 10.1017/CBO9781316576532 [16] M. Groover, Automation, Production Systems, and Computer-Integrated Manufacturing. 4th ed. London, UK, Pearson, 2013. [17] A. S. Nejad, Fundamentals of System Analysis & Design Publisher. LAP LAMBERT Academic Publishing, 2014. doi:10.13140/2.1.1469.7280 [18] J. Girdhar, Management information systems. New Delhi Oxford University Press, 2013. [19] NATO Strategic Communication: More to be Done? / Steve Tatham, Rita Le Page; National Defence Academy of Latvia Center for Security and Strategic Research. – Rīga, 2014. URL: http://www.academia.edu/6808986/NATO_Strategic_ Communication_More_to_be_done. [20] V. Bhise, Decision-making in energy systems 1st ed. Boca Raton, FL: CRC Press, 2021. doi:10.1201/9781003107514