<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Conflict Analysis in the “Subject-to-Subject” Security System</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Svitlana Shevchenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yuliia Zhdanova</string-name>
          <email>y.zhdanova@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Halina Shevchenko</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Оlena Nehodenko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>аnd Svitlana Spasiteleva</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudriavska str., Kyiv, 04053</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>State University of Telecommunications</institution>
          ,
          <addr-line>7 Solomyanska str., Kyiv, 03110</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>The National University of Ostroh Academy</institution>
          ,
          <addr-line>2 Seminarska str., Ostroh, 35800</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>56</fpage>
      <lpage>66</lpage>
      <abstract>
        <p>The concept of conflict theory is widely used in various sectors of society. This study examines the problem of using the main provisions of the theory of conflicts in the field of information security. With the development of information technologies, the risk of information conflicts is increasing, which can create threats to the integrity, availability, and confidentiality of information, which determines the relevance and importance of this research. The presented work is a continuation of developments describing the applied aspects of the theory of conflict theory in information security systems through the interaction of data streams in the “subjectsubject” perspective. It is proposed to analyze the problem at four levels: the level of the individual (criminal-user); business level (internal and/or external violator-company manager); state level (violators/hackers-state institutions, state officials); the level of international relations (states, a group of subjects/hackers-institutions and/or political leaders of another state). Each level is defined as a complex conflict system that has a corresponding structure and stages. It was determined that the main characteristics of an information conflict in cyberspace are: unlimited territory, globality, the problem of attribution, and the superiority of attack over defense. It is substantiated that information security systems have all the features of complex conflict systems, which implies the application of the mathematical theory of conflict, namely, the Lotka-Volterra “predator-predator” model and the conflict triad model. The innovative function of information conflict is determined. The concept of conflict theory is widely used in various sectors of society. This study examines the problem of using the main provisions of the theory of conflicts in the field of information security. With the development of information technologies, the risk of information conflicts is increasing, which can create threats to the integrity, availability, and confidentiality of information, which determines the relevance and importance of this research.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Conflict</kwd>
        <kwd>information conflict</kwd>
        <kwd>information security systems</kwd>
        <kwd>cyber system</kwd>
        <kwd>cyber conflict</kwd>
        <kwd>conflict structure</kwd>
        <kwd>conflict stages</kwd>
        <kwd>mathematical model of conflict</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Our society, in the center of which is a person
and his activities, is a complex dynamic system,
which is characterized by many connections,
interactions, and relations in different spheres and
at different levels. Existence in such a system is
impossible without disagreements,
confrontations, contradictions, and conflicts.</p>
      <p>More and more scientists are turning to
theoretical and practical developments in conflict
theory. This is connected not only with the
problem of studying man as a conflicted creature,
but also with the growing tension in various
spheres of social interaction of the participants of
the organization, the state, and the world.</p>
      <p>There is no unequivocal opinion about the
concept of “conflict”. In modern literature, there
are more than a dozen different definitions of
conflict. All of them have the right to exist
because each emphasizes one or more
characteristics of this multifaceted phenomenon.</p>
      <p>
        For the term “conflict” we come across several
synonyms: clash of opposing interests, and views;
a sharp dispute; extreme aggravation of
contradictions, which leads to complications or
acute struggle [
        <xref ref-type="bibr" rid="ref2">1</xref>
        ]. However, contradiction and
conflict should not be equated. Contradiction
(opposite as its component) is a defining feature
of any phenomenon or event. Contradictions turn
into conflict if their level increases to a critical
limit and at the same time a subject is formed,
which will deliberately exacerbate them in its
interests [
        <xref ref-type="bibr" rid="ref1 ref3">2</xref>
        ].
      </p>
      <p>
        At the same time, the authors of the study [
        <xref ref-type="bibr" rid="ref4">3</xref>
        ]
emphasize that outside the subjects and
independently of them there are contradictions,
but not conflicts. The concept of conflict is not a
fixation, but a qualification of the state of relations
in a certain situation, which defines conflict as an
assessment of the nature of interaction. Such a
definition makes it possible to preserve the name
conflict for situations of the opposition of the
parties to each other, which are traditionally called
conflict, and at the same time to extend this
concept to situations of incompatibility of certain
elements in the composition of the whole [3, p.
41]. This interpretation will allow us to describe
conflicts of various natures, for example, a
conflict of immunities, a conflict between
software and a security system, and others.
      </p>
      <p>
        The transition of society to the information age
gave rise to innovative conflicts—informational.
Modern informational conflicts have significantly
transformed on both the micro and macro levels:
starting from communication in social networks
and ending with cyberespionage, cyberattacks,
cyberwars, and involvement of non-state actors in
relations in the international arena. With the
development of information technologies, the risk
of new conflicts that may threaten the integrity,
availability, and confidentiality of information
increases [
        <xref ref-type="bibr" rid="ref5 ref6 ref7">4–6</xref>
        ].
      </p>
      <p>
        The beginning of the discussion of these
aspects of the analysis of information conflicts in
security systems was presented by us in the study
[
        <xref ref-type="bibr" rid="ref8">7</xref>
        ]. The analysis of the literature made it possible
to determine the following approaches to the
definition of conflicts in security systems:
1. Information conflicts as a part of conflicts
in various spheres and industries, since
information is a strategic resource, the value of
which acquires especially in the process of
creation, therefore it needs to be protected.
2. Information conflicts as conflicts in
information systems between implemented
programs or in telecommunication systems
between radio-electronic means and security
systems.
3. Cyber conflicts are part of international
information conflicts and are most often
associated with information wars, cyber
espionage, and cyber operations.
      </p>
      <p>It is substantiated that it is advisable to
consider the coverage of this problem through the
interaction of the planes of the theory of conflict
theory and the theory of information and
cybernetic security in three perspectives:
● “subject—subject” or “person—person”,
possibly “group of people—group of people”,
“person—group of people”.
● “subject—object” or “man—machine”.
● “object—object” or “machine—machine”.</p>
      <p>Within the scope of this article, it is intended
to consider the applied aspects of the theory of
conflict theory in information security systems
through the interaction of data flows from the
perspective of “subject—subject”. In particular,
analyze the issues at four levels:
1. Personality level (criminal—user)
2. Business level (internal and/or external
offender—company manager)
3. State level (violators/hackers—state
institutions, state officials)
4. The level of international relations (states,
a group of subjects/hackers—institutions
and/or political leaders of another state).</p>
    </sec>
    <sec id="sec-2">
      <title>2. Mathematical Models of “Subject</title>
      <p>Subject” Information Conflict</p>
      <p>
        Conflict is a very complex system with
adaptive structures and evolutionary mechanisms.
It is a system made up of interconnected parts that,
as a whole, exhibit properties that cannot be easily
understood just by disassembling and analyzing
the properties of the individual components. A
deep understanding of conflicts requires, on the
one hand, a systems thinking approach, and on the
other, a combination of many social and scientific
disciplines [
        <xref ref-type="bibr" rid="ref9">8</xref>
        ]. The analysis of analytical reports
and scientific literature confirms the fact that
together with the development of hardware and
software means of information protection, the
number of malicious software that allows one
subject (group) to gain unauthorized access to the
information
resources
of
another
subject
(institution) is growing rapidly. As a result of the
implementation of such a threat, information
protection is violated, and its destruction and/or
theft,
loss
of
integrity,
availability,
and
confidentiality are possible. The interaction of
these parties is conflictual. The modern theory of
researching models of real processes using the
mathematical theory of conflict. In this case, we
will use the well-known “prey—predator” model,
which is based on a system of two first-order
ordinary differential equations. The equation was
proposed independently
by
scientists
      </p>
      <p>
        Alfred
James Lotka and Vito Volterra in 1925 and 1926
[
        <xref ref-type="bibr" rid="ref10">9</xref>
        ]. The classical Lotka-Volterra “predator—
prey” mathematical model is used in many fields
of science and technology due to its successful
combination of relatively low complexity and
strong nonlinearity. The model has a high degree
of universality when describing the behavior of
complex systems operating in the mode of
selfoscillations [
        <xref ref-type="bibr" rid="ref11 ref12">10, 11</xref>
        ]. It should be noted the
existence
of
spot
developments
for
the
implementation of this model in the security
system [
        <xref ref-type="bibr" rid="ref13 ref14">12–13</xref>
        ].
      </p>
      <p>In general, the model looks as follows:
{
where  is the amount of information available to
the user and interest to the attacker,</p>
      <p>is the amount of information obtained by
hacking,
 is the duration of the process,
 1 is the probability that the volume of
information of interest to the attacker is well
Protected,
the information,
 2 is the probability that an attacker will obtain
 3 is the probability that an attacker will not be
able to obtain the information,</p>
      <p>4 is the probability that an attacker has
sufficient potential to breach the user’s protection.</p>
      <p>
        However, the
presented
model is of a
generalized nature, since this information security
system is not isolated from others and is in a
complex relationship with them. To bring the
model closer to real data, various modifications
are used. Thus, work [
        <xref ref-type="bibr" rid="ref15">14</xref>
        ] presents an approach
where x and y are vector values:
      </p>
      <p>= ( 1,  2 , . . . ,   ),</p>
      <p>= ( 1,  2 , . . . ,   ),  &gt; 1.</p>
      <p>Therefore, the</p>
      <p>values x and y can be
represented not only by the volume of information
but also by other characteristics of the security
system.</p>
      <p>The
model can
also
be improved
by
introducing the delay time of the argument t, the
value of which is determined by the method of
experimental selection.</p>
      <p>
        The next conflict system that can be modeled
in security systems is the conflict triad model [
        <xref ref-type="bibr" rid="ref16">15</xref>
        ].
The dynamic model of the conflict triad is a model
that is defined by the interaction between three
natural substances: the population of a biological
species (life), the environment (resource of
existence), and negative factors for existence
(virus).
      </p>
      <p>Let’s apply the described model to the security
system. Let us denote by P, R, Q substances that
exist in a common space and interact with each
other in a certain way. Then, in the conflict system
of the “subject—subject” security system, we get
the following subsystems at different levels (see
Substances in the conflict triad of information security</p>
      <sec id="sec-2-1">
        <title>Subject— subject level</title>
        <sec id="sec-2-1-1">
          <title>Business level</title>
        </sec>
        <sec id="sec-2-1-2">
          <title>State level</title>
        </sec>
        <sec id="sec-2-1-3">
          <title>International relations level</title>
        </sec>
      </sec>
      <sec id="sec-2-2">
        <title>Space</title>
        <p>Substance 
Substance</p>
      </sec>
      <sec id="sec-2-3">
        <title>Substance</title>
        <p>
          Interdependence between substances P, R, Q
[
          <xref ref-type="bibr" rid="ref16">15</xref>
          ] is depicted by the diagram in Figure 1, where
an arrow with a certain sign corresponds to the
direction of positive or negative dependence of
one substance on another.
        </p>
        <p>Q
–
+</p>
        <p>P
–
–
+
–</p>
        <p>R
substances (anthropogenic source of threats—
security policy).</p>
        <p>The conflict triad is a complex dynamic system
since each of the three substances has an internal
structure

= ( 1,  2 , . . . ,   ),</p>
        <p>= ( 1,  2 , . . . ,   ),
= ( 1,  2 , . . . ,   ).</p>
        <p>Also, all the formulas for the interaction of
each substance with a pair of others are different
from each other: P with a pair { ,  }, 
with a
pair { ,  },</p>
        <p>with a pair { ,  }.</p>
        <p>
          The formulas defining the dynamic system of
the conflict triad are given in [
          <xref ref-type="bibr" rid="ref16">15</xref>
          ].
        </p>
        <p>The nature of things in the world is such that
any conflict process is endless. In each act, the
2.1.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Subject—Subject Informational</title>
    </sec>
    <sec id="sec-4">
      <title>Conflict: The Level of the Individual</title>
      <p>The birth of the Internet in 1989 caused a rapid
growth of computer equipment, in particular,
personal. The use of the World Wide Web led to
the creation of new interactions and relationships
between people—virtual, the era of digital society
began.</p>
      <p>
        Persons,
relationships,
and
social
institutions are formed by both software and
hardware [
        <xref ref-type="bibr" rid="ref17">16</xref>
        ]. Along with this, where there are
new social facts, new habits, new ways to meet,
buy, pay, store, protect, and transfer assets, new
digital identities, and new systems for gathering
information, it is only natural that new crimes
appear, related to information technologies [
        <xref ref-type="bibr" rid="ref18">17</xref>
        ].
      </p>
      <p>
        According to an analytical report [
        <xref ref-type="bibr" rid="ref19">18</xref>
        ] in 2022,
the frequency of email attacks has increased to
reach 86% of all file-based in-the-wild attacks,
Zip files are the most common format for hiding
malware, Joker mobile malware, which accesses
contact lists by hiding in at least 8 Google Store
apps, has been downloaded more than 3 million
times, allowing
attackers to
obtain
relevant
information. accesses users’ contact lists and
sends information to attackers. Every day, the
AV-TEST Institute registers more than 450,000
new
malicious
programs
(malware)
and
potentially unwanted programs (PUAs), in the last
year there have been about 70 million malicious
programs for Windows, which is 5000 times more
than for
samples)
macOS (where only
      </p>
      <p>about 12,000
and
60
times
more
than
the
corresponding
system, usually two participants (however, there
may be a third person—the customer). The
duration of such a conflict is determined by the
strength of the defenses and capabilities of the
attacker. Table 2 presents the stages of this
conflict.</p>
      <p>Regulation of this conflict is possible at a latent
stage, if the user has a high level of information
protection, following the basic rules: password
management; use of at least two-factor
authentication; use of licensed antivirus
programs; control over personal information
transmitted over the Internet; avoiding the use of
public Wi-Fi networks.</p>
    </sec>
    <sec id="sec-5">
      <title>2.2. Subject-Subject</title>
    </sec>
    <sec id="sec-6">
      <title>Conflict: Business Level</title>
    </sec>
    <sec id="sec-7">
      <title>Information</title>
      <p>The direction of our research will further be
directed to the analysis of possible conflict
situations between the head of the company and
a subordinate in the context of the existence of
an information conflict, which causes a violation
of the information protection system.</p>
      <p>Information conflict in security systems
“subject-subject” at the level of business
“internal employee—manager” is defined as the
result of an employee’s insider activity, which
led to a violation of the security policy in the
company’s information system.</p>
      <p>
        Insider activity—directed actions of
motivated subjects who have legitimate access to
information assets and skills to obtain valuable
information, know the vulnerabilities of
information systems and business processes, to
cause material losses and/or reputational losses
of the organization [
        <xref ref-type="bibr" rid="ref21">20</xref>
        ].
      </p>
      <p>
        As the 2022 Cost of Insider Threats: Global
Report reveals, insider threat incidents have risen
44% over the past two years, with costs per
incident up more than a third to $15.38 million;
the cost of credential theft to organizations
increased 65% from $2.79 million in 2020 to
$4.6 million at present; the time to contain an
insider threat incident increased from 77 days to
85 days, leading organizations to spend the most
on containment [
        <xref ref-type="bibr" rid="ref22">21</xref>
        ].
      </p>
      <p>
        The authors [
        <xref ref-type="bibr" rid="ref23">22</xref>
        ] propose to consider the
portrait of an insider from the point of view of
psychological characteristics and activities:
lowclass and high-class insiders. The activities of
low-class insiders have been exposed and
punished. The profile of such a violator includes
the following features: these people do not have
high-quality technical education; worked in
various positions; are motivated by personal gain
and are influenced by emotions; are not aware of
the potential negative consequences of their
actions; their behavior arouses suspicion on the
part of colleagues.
      </p>
      <p>High-class insiders see their malicious
mission as their career decision. The portrait of
such a violator is high-quality professional
abilities, diligence, reliability, leadership, and
dedication. Such insiders are very dangerous.
The structure and stages of the informational
conflict are different for each of these types. The
description is presented in Table 3 and Table 4.</p>
      <p>It should be noted that an insider can be an
external actor, for example, a former employee,
whose motive may be revenge for, in his opinion,
unfair dismissal from work.</p>
      <p>An information conflict is also possible if the
insider activity was unintentional, but the loss of the
company’s information data occurred. Moreover,
the manager learned about this event after this
incident. The structure of such a conflict does not
contain a latent stage, since the informational
conflict has occurred. The stage of the end of the
conflict is the punishment of the employee (verbal
or written penalty, material penalty, dismissal from
work).</p>
      <p>
        The conflict struggle is most often caused by a
primitive perception of reality, as if one of the parties
is capable of winning, and the other—is defeated.
There is some redistribution of the spectral
characteristics of the opposing sides in the conflict.
The victorious gain in one aspect means inevitable
loss, defeat, and loss in another. The essence of the
contradiction is transformed and appears again in the
future at another level of gradation of the complex
structure of interests [
        <xref ref-type="bibr" rid="ref15">14</xref>
        ]. This process is
demonstrated by an example of a dismissed
employee. Therefore, it is important to understand
the problem of conflict prevention. The authors of
the study [
        <xref ref-type="bibr" rid="ref24">23</xref>
        ] proposed three approaches to
detecting insider threats:
● Sociological, psychological, and
organizational.
● Socio-technical.
● Technical.
      </p>
      <p>In our opinion, this will make it possible to stop
the informational conflict before the active stage.</p>
      <p>
        The current stage is characterized by the
introduction of mixed systems and methods of
detecting insider threats [
        <xref ref-type="bibr" rid="ref21">20</xref>
        ]. Scientists are trying
to combine two approaches in this direction:
● Psychosocial approach, the basis of which
is the analysis of the mental and emotional
states of employees, and it is possible to predict
the behavior of an insider.
● Continuous monitoring in the network.
      </p>
      <p>A large business has the material resources to
implement software products to detect insider
threats, for example, the CHAMPION system
(Columnar Hierarchical Autoassociative Memory
Processing in Ontological Networks), small and
medium-sized businesses practically do not deal
with this issue. In this regard, we offer the
following recommendations regarding the
possible forecasting of conflicts in the company’s
information security. This process is based on two
components:
1. Software for determining the user’s
computer activity, the main of which is:
● Role-based access policy.
● Restrictions on data transmission and
copying.
● Using MPI (Microsoft Purview Insider or
DLP (Digital Light Processing).
2. Psychological methods for personality
profiling can be used:
• “Big Five” test
• Test “Ability to self-govern”
• Individual psychological test.</p>
      <p>As a result of processing the obtained results,
if everything is satisfactory, then there is constant
monitoring of the information system on the one
hand and training with employees on the other.
Otherwise, the security policy should be further
reviewed and additional methods of detecting and
countering insiders should be added. Fig. 2
presents the algorithm of this process.</p>
      <p>
        Therefore, increasing investments in the
company’s information security will reduce the
likelihood of information conflicts. However,
companies stop at a level of rational investment
that is equal to or less than the expected losses
from a hack. This leads to a gap in investments
(Fig. 3) in the cyber defense of companies [
        <xref ref-type="bibr" rid="ref25">24</xref>
        ].
Special measures of the government would allow
the filling of this delta. For example, to subsidize
equipment, software, and training, and increase
the number of cyber specialists who know how to
work with systems, programs, and equipment and
ensure the functioning of all these components.
No
1
      </p>
      <p>Rational
Investment Level</p>
      <p>Minimum</p>
      <p>Risk Level Possible
Approaches to information
conflict resolution
g
n
i
r
o
t
i
n
o
m
S
I
s
u
o
u
n
i
t
n
o
C</p>
      <sec id="sec-7-1">
        <title>Requirements for the</title>
        <p>Organization’s IS to
determine activity</p>
      </sec>
      <sec id="sec-7-2">
        <title>1. Access policy based on roles</title>
        <p>and their needs to perform
official functions</p>
      </sec>
      <sec id="sec-7-3">
        <title>2. Limitation of data</title>
        <p>transmission and copying.</p>
      </sec>
      <sec id="sec-7-4">
        <title>3. Using MS Purview</title>
      </sec>
      <sec id="sec-7-5">
        <title>Insider or DLP</title>
        <p>Psychological and diagnostic
testing of behavior
1. Individual psychological tests.
2. “Big five” test.
3. The “Ability to
self-governance” test
n
o
i
t
a
r
e
p
o
o
c
d
n
a
s
g
n
i
n
i
a
r
T
Maximum
Investment</p>
        <p>Investment in information Security</p>
        <p>Information conflict in security systems
“subject-subject” at the level of the state
“hackers—state institutions, state officials” is the
process of resisting hacker attacks on the
information systems of critical infrastructure
objects of the state, as a result of which there is a
possible disruption of the functioning of data
about objects</p>
        <p>It should be noted that most of the incidents are
disclosed by the relevant state structures. Table 5
presents the structure of this conflict.</p>
        <p>
          Combating online threats requires the state
to go beyond the whole government paradigm
and adopt a public-private partnership
approach, as the tools needed to respond are
often in the hands of others [
          <xref ref-type="bibr" rid="ref25 ref26">24, 25</xref>
          ]. This
cooperation should include specialized
information and cyber security firms, IT
companies, hardware companies, banks and
financial sector entities, politicians and
members of government, and private entities.
The effectiveness of work is monitored
through reporting and transparency of their
activities, which will reduce the likelihood of
information conflicts.
2.4. Information Conflict “Subject—
Subject”: International Relations
        </p>
      </sec>
    </sec>
    <sec id="sec-8">
      <title>Level</title>
      <p>
        The relevance of the issue of information
conflict at the level of international relations is
confirmed by a large number of studies in the field
of politics, law, military affairs, and cyber security
[
        <xref ref-type="bibr" rid="ref27 ref28 ref29 ref30 ref31 ref32 ref33 ref34 ref35 ref36">26–35</xref>
        ].
      </p>
      <p>
        Analysis of the literature made it possible to
identify the following features and characteristics
of information conflict in security systems:
● the geography of the conflict (in
traditional battles, the defender has an
advantage due to his knowledge of the terrain
and the direction of the attack, in the cyber
world these advantages disappear, since states
often do not know where the attack will come
from or even if an attack is happening [
        <xref ref-type="bibr" rid="ref31">30</xref>
        ]).
● the globality of the conflict (in any
conflict, cyberattacks quickly become global
as secretly acquired or hacked computers and
servers around the world are brought into
action [
        <xref ref-type="bibr" rid="ref31">30</xref>
        ]).
● responsibility for the conflict (in the
digital sphere, identifying perpetrators is more
difficult: most states deny any involvement in
actions that can be considered military in
cyberspace; it is easy to hide behind proxies,
raise false flags and act on behalf of another
person [
        <xref ref-type="bibr" rid="ref28 ref32">27, 31</xref>
        ]).
● an imbalance between offense and
defense (a single weak point may be enough
for an attacker to enter systems and networks
to achieve their goals, while defenders need to
guard many systems, often without adequate
resources [
        <xref ref-type="bibr" rid="ref28 ref29 ref32">27, 28, 31</xref>
        ]).
      </p>
      <p>An information conflict in security systems
“subject-subject” at the international level “states,
a group of subjects/hackers—institutions and/or
political leaders of another state” is called the
process of confrontation between subjects of
international relations in cyberspace, where
offensive means and techniques of subjects of one
state are aimed at information systems of critical
infrastructure objects of another state, as a result
of which it is possible to disrupt the functioning of
these objects.</p>
      <p>The increase in the number of information
conflicts at the international level is especially
intensified during the period of armed conflicts
between states. Thus, cyberattacks on the
Ukrainian government and the military sector
increased by 196% in the first three days of the
Russian Federation’s war against Ukraine [18.</p>
    </sec>
    <sec id="sec-9">
      <title>3. Conclusions</title>
      <p>Summarizing the above, we have the following
results:
1. The study of information conflicts from
the point of view of information and cyber
security is relevant and important since the
relationships between participants in the
virtual space are completely different.
2. When analyzing information conflicts in
cyberspace, the following key issues should be
considered:
● the problem of attribution (anonymity of
the created cyber attack, it is difficult to
distinguish different types of actors,
including states, non-state groups, and
individual hackers; the reward is a high level
of information protection).
● the advantage of offense over defense
(cyberspace encourages offensive strategies
as opposed to defensive ones; attackers act
without warning, looking for vulnerabilities,
while cyber defense monitoring must be
realtime and constant).
● unlimited territory.</p>
      <p>● globality.
3. Effective prevention of cyber conflicts
and their resolution requires public-private
cooperation (involvement of security experts,
IT technologies, members of the government,
and scientists).
4. The creation of mathematical models in
the process of analyzing information conflicts
in cyber security systems will become an
adequate tool for knowledge, description, and
modeling of real phenomena in this field.
5. The theory of information conflicts in
information and cyber security systems has an
innovative character, strengthening the
creation and development of new technologies
for ensuring the integrity, availability, and
confidentiality of information.</p>
    </sec>
    <sec id="sec-10">
      <title>4. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>2.3. Information Conflict “Subjectto-Subject”: State Level</mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Yaremenko</surname>
          </string-name>
          , et. al.,
          <source>New Glossary of Ukrainian Language in Three Volumes, Aconite</source>
          ,
          <volume>1</volume>
          (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Piren</surname>
          </string-name>
          , Conflictology: Textbook. MAUP, Kyiv, (
          <year>2007</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>A.</given-names>
            <surname>Girnyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Rezanenko</surname>
          </string-name>
          ,
          <article-title>The Concept of “Conflict” in Western Culture and in the Culture of Traditional Societies of the Far East</article-title>
          . Scientific Notes of NaUKMA,
          <volume>136</volume>
          (
          <year>2012</year>
          )
          <fpage>37</fpage>
          -
          <lpage>42</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>M.</given-names>
            <surname>Vladymyrenko</surname>
          </string-name>
          , et al.,
          <article-title>Analysis of Implementation Results of the Distributed Access Control System</article-title>
          .
          <source>2019 IEEE International Scientific-Practical Conference Problems of Infocommunications, Science and Technology</source>
          (
          <year>2019</year>
          ). doi:
          <volume>10</volume>
          .1109/picst47496.
          <year>2019</year>
          .9061376
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Sadykov</surname>
          </string-name>
          , et al.,
          <article-title>Technology of Location Hiding by Spoofing the Mobile Operator IP Address</article-title>
          ,
          <source>in: IEEE International Conference on Information and Telecommunication Technologies and Radio Electronics</source>
          (
          <year>2021</year>
          )
          <fpage>22</fpage>
          -
          <lpage>25</lpage>
          . doi:
          <volume>10</volume>
          .1109/UkrMiCo52950.
          <year>2021</year>
          .9716700
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>V.</given-names>
            <surname>Buriachok</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <article-title>Security Rating Metrics for Distributed Wireless Systems</article-title>
          ,
          <source>in: Workshop of the 8th International Conference on "Mathematics. Information Technologies. Education": Modern Machine Learning Technologies and Data Science</source>
          , vol.
          <volume>2386</volume>
          (
          <year>2019</year>
          )
          <fpage>222</fpage>
          -
          <lpage>233</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.</given-names>
            <surname>Shevchenko</surname>
          </string-name>
          , et. al.,
          <source>Study of Applied Aspects Ofconflict Theory in Security Systems, Cybersecur. Educ. Sci. Technol</source>
          .
          <volume>2</volume>
          (
          <issue>18</issue>
          ) (
          <year>2022</year>
          )
          <fpage>150</fpage>
          -
          <lpage>162</lpage>
          . doi:
          <volume>10</volume>
          .28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2022</year>
          .
          <volume>18</volume>
          .150162
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>G.</given-names>
            <surname>Gallo</surname>
          </string-name>
          ,
          <source>Conflict Theory, Complexity and Systems Approach, Systs. Res. Behav. Sci</source>
          .
          <volume>30</volume>
          (
          <issue>2</issue>
          ) (
          <year>2013</year>
          )
          <fpage>156</fpage>
          -
          <lpage>175</lpage>
          . doi:
          <volume>10</volume>
          .1002/sres.2132
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Lotka</surname>
          </string-name>
          , Elements of Physical Biology,
          <source>Nature</source>
          <volume>116</volume>
          ,
          <issue>461</issue>
          (
          <year>1925</year>
          ). doi:
          <volume>10</volume>
          .1038/116461b0 1925
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>D.</given-names>
            <surname>Trubetskov</surname>
          </string-name>
          ,
          <source>Phenomenon of LotkaVolterra Mathematical Model and Similar Models</source>
          ,
          <string-name>
            <surname>Izvestiya</surname>
            <given-names>VUZ</given-names>
          </string-name>
          , Appl. Nonlinear Dyn.
          <volume>19</volume>
          (
          <issue>2</issue>
          ) (
          <year>2011</year>
          ),
          <fpage>69</fpage>
          -
          <lpage>88</lpage>
          . doi:
          <volume>10</volume>
          .18500/
          <fpage>0869</fpage>
          -6632-2011-19-2-
          <fpage>69</fpage>
          -88
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bratus'</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Novozhilov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Platonov</surname>
          </string-name>
          ,
          <source>Dynamic Systems and Models of Biology</source>
          , Draft, (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [12]
          <string-name>
            <surname>І. Kononovich</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Mayevskiy</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Podobniy</surname>
          </string-name>
          ,
          <article-title>Models of System of the Cibersecurity Providing with Delay of Reaction on Incidents</article-title>
          ,
          <source>Inf. Math. Methods Simul</source>
          .
          <volume>5</volume>
          (
          <issue>4</issue>
          ), (
          <year>2015</year>
          )
          <fpage>339</fpage>
          -
          <lpage>346</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gorman</surname>
          </string-name>
          , et. al.,
          <string-name>
            <given-names>A Predator</given-names>
            <surname>Prey</surname>
          </string-name>
          <article-title>Approach to the Network Structure of Cyberspace, (</article-title>
          <year>2004</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>S.</given-names>
            <surname>Yevseiev</surname>
          </string-name>
          , et. al.,
          <article-title>Development of a Method for Assessing the Security of CyberPhysical Systems Based on the LotkaVolterra Model</article-title>
          ,
          <source>Eastern-European Journal of Enterprise Technologies</source>
          ,
          <volume>5</volume>
          (
          <issue>9</issue>
          ) (113) (
          <year>2021</year>
          ). doi:
          <volume>10</volume>
          .15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2021</year>
          .241638
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>V.</given-names>
            <surname>Koshmanenko</surname>
          </string-name>
          ,
          <source>Spectral Theory of Dynamic Conflict Systems</source>
          , Naukova Dumka, Kyiv, (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>V.</given-names>
            <surname>Koshmanenko</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Samoilenko</surname>
          </string-name>
          ,
          <article-title>Model of a Dynamic System of a Conflict Triad</article-title>
          , Nonlinear Oscillations,
          <volume>14</volume>
          (
          <issue>1</issue>
          ) (
          <year>2011</year>
          )
          <fpage>56</fpage>
          -
          <lpage>76</lpage>
          . doi:
          <volume>10</volume>
          .1007/s11072-011-0141-5
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>D.</given-names>
            <surname>Lupton</surname>
          </string-name>
          , Digital
          <string-name>
            <surname>Sociology</surname>
          </string-name>
          (
          <year>2015</year>
          )
          <article-title>Taylor</article-title>
          and Francis. doi:
          <volume>10</volume>
          .4324/9781315776880-
          <fpage>1</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>A.</given-names>
            <surname>Nicola</surname>
          </string-name>
          ,
          <article-title>Towards Digital Organized Crime and Digital Sociology of Organized Crime</article-title>
          .
          <source>Trends. Organ. Crim</source>
          . (
          <year>2022</year>
          ). doi:
          <volume>10</volume>
          .1007/s12117-022-09457-y.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          <source>[19] Check Point Software's 2023 Cyber Security Report, Cyber Security Report.</source>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Malware</surname>
          </string-name>
          ,
          <string-name>
            <surname>AV-TEST</surname>
            <given-names>URL</given-names>
          </string-name>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>S.</given-names>
            <surname>Shevchenko</surname>
          </string-name>
          , et. al.,
          <source>Іnsiders and Insider Information: Essence</source>
          , Threats, Activities and
          <string-name>
            <given-names>Legal</given-names>
            <surname>Responsibility</surname>
          </string-name>
          ,
          <source>Cybersecur. Educ. Sci. Technol</source>
          .
          <volume>3</volume>
          (
          <issue>15</issue>
          ) (
          <year>2022</year>
          )
          <fpage>175</fpage>
          -
          <lpage>185</lpage>
          . doi:
          <volume>10</volume>
          .28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2022</year>
          .
          <volume>15</volume>
          .175185
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          <source>[22] 2022 Ponemon Cost of Insider Threats Global Report, Proofpoint US.</source>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>E.</given-names>
            <surname>Cole</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ring</surname>
          </string-name>
          . Insider Threat:
          <article-title>Protecting the Enterprise from Sabotage, Spying, and</article-title>
          <string-name>
            <surname>Theft</surname>
          </string-name>
          , Elsevier/Syngress, Amsterdam, (
          <year>2005</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>J.</given-names>
            <surname>Hunker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Probst</surname>
          </string-name>
          .
          <article-title>Insiders and Insider Threats: An Overview of Definitions and Mitigation Techniques</article-title>
          ,
          <source>J. of Wirel. Mob. Netws. Ubiquitous Comp. Dependable Appls</source>
          .
          <volume>2</volume>
          (
          <issue>1</issue>
          ) (
          <year>2011</year>
          )
          <fpage>4</fpage>
          -
          <lpage>27</lpage>
          . doi:
          <volume>10</volume>
          .22667/JOWUA.
          <year>2011</year>
          .
          <volume>03</volume>
          .31.004
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>S.</given-names>
            <surname>Castro</surname>
          </string-name>
          ,
          <article-title>Towards the Development of a Rationalist Cyber Conflict Theory, Cyber Def</article-title>
          .
          <source>Rev</source>
          .
          <volume>6</volume>
          (
          <issue>1</issue>
          ) (
          <year>2021</year>
          )
          <fpage>35</fpage>
          -
          <lpage>62</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>B.</given-names>
            <surname>Buckland</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Schreier</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Winkler</surname>
          </string-name>
          .
          <article-title>Democratic Governance Challenges of Cyber Security</article-title>
          .
          <source>DCAF Horizon 2015 Working Paper</source>
          ,
          <volume>1</volume>
          (
          <year>2015</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>D.</given-names>
            <surname>Sherengovskij</surname>
          </string-name>
          ,
          <article-title>The Concept and Essence of International Conflict in the Science of International Relations</article-title>
          , Actual Problems of Politics, Phoenix, Odesa,
          <volume>43</volume>
          (
          <year>2011</year>
          )
          <fpage>98</fpage>
          -
          <lpage>108</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>M.</given-names>
            <surname>Wohlfeld</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Jasper</surname>
          </string-name>
          , Cyberattacks and Cyber Conflict: Where Is Conflict Resolution? University of Malta.
          <article-title>Centre for the Study and Practice of Conflict Resolution, (</article-title>
          <year>2018</year>
          )
          <fpage>5</fpage>
          -
          <lpage>17</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>J.</given-names>
            <surname>Healey</surname>
          </string-name>
          ,
          <source>The Five Futures of Cyber Conflict and Cooperation. Georgetown J. Int. Affs</source>
          . (
          <year>2011</year>
          )
          <fpage>110</fpage>
          -
          <lpage>117</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>M.</given-names>
            <surname>Intriligator</surname>
          </string-name>
          ,
          <source>Research on Conflict Theory: Analytic Approaches and Areas of Application, J. Confl. Resolut</source>
          .
          <volume>26</volume>
          (
          <issue>2</issue>
          ) (
          <year>1982</year>
          )
          <fpage>307</fpage>
          -
          <lpage>327</lpage>
          . doi:
          <volume>10</volume>
          .1177/0022002782026002006
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>B.</given-names>
            <surname>Valeriano</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Maness</surname>
          </string-name>
          ,
          <source>What Do We Know About Cyber Conflict? Scope</source>
          , Impact, and Restraint in Cyberspace.
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>R.</given-names>
            <surname>Inversini</surname>
          </string-name>
          , Cyber Peace: And How It Can Be Achieved,
          <source>The Ethics of Cybersecurity, Int. Libr. of Eths. Law Technol</source>
          .
          <volume>21</volume>
          (
          <year>2020</year>
          )
          <fpage>259</fpage>
          -
          <lpage>276</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -29053-5_
          <fpage>13</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>R.</given-names>
            <surname>Kazansky</surname>
          </string-name>
          ,
          <article-title>Тhe Conflict Theory as a Pillar of Security Science</article-title>
          ,
          <source>Secur. Sci. J</source>
          .
          <volume>1</volume>
          (
          <issue>2</issue>
          ) (
          <year>2020</year>
          ).
          <source>doi:10.37458/ssj.1.2.3</source>
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>H.</given-names>
            <surname>Lin</surname>
          </string-name>
          , Cyber Conflict and International Humanitarian Law,
          <source>Int. Rev. Red Cross</source>
          ,
          <volume>94</volume>
          (
          <issue>886</issue>
          ) (
          <year>2012</year>
          )
          <fpage>515</fpage>
          -
          <lpage>531</lpage>
          . doi:
          <volume>10</volume>
          .1017/S1816383112000811
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          [35]
          <string-name>
            <given-names>M.</given-names>
            <surname>Christen</surname>
          </string-name>
          , et. al.,
          <article-title>A Review of ValueConflicts in Cybersecurity</article-title>
          , ORBIT J.
          <volume>1</volume>
          (
          <issue>1</issue>
          ) (
          <year>2017</year>
          )
          <fpage>1</fpage>
          -
          <lpage>19</lpage>
          . doi:
          <volume>10</volume>
          .29297/ORBIT.V1I1.28
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          [36]
          <string-name>
            <surname>I. Alakbarova</surname>
          </string-name>
          ,
          <article-title>Рroblems Created by Cyberconflicts and Methods to Solve Them, Probls</article-title>
          .
          <source>Inf. Soc</source>
          .
          <volume>2</volume>
          (
          <year>2015</year>
          )
          <fpage>29</fpage>
          -
          <lpage>33</lpage>
          . doi:
          <volume>10</volume>
          .25045/jpis.v06.
          <year>i2</year>
          .
          <fpage>04</fpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>