<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Model for Assessing the Effectiveness of Information Security Systems of Interdependent Critical Infrastructures</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Мaksym Lutskyi</string-name>
          <email>m.lutskyi@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Viktoriia Sydorenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Artem Polozhentsev</string-name>
          <email>artem.polozhencev@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nataliia Apenko</string-name>
          <email>apenko_nata@ukr.net</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serhii Sydorenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>1, Liubomyra Huzara ave. Kyiv, 03058</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>214</fpage>
      <lpage>222</lpage>
      <abstract>
        <p>Today, critical infrastructure organization varies widely across countries, but important commonality is a close interconnection and significant interdependence on certain ICT. A state's national security and the quality of life of its citizens depend on the continued reliable operation of a complex, interdependent critical infrastructure, including transportation, electricity, oil, gas, telecommunications, and emergency services. A failure in one infrastructure can quickly and significantly affect another. Modern infrastructures are almost entirely dependent on ICT and often need to be interconnected through electronic communication channels to operate reliably. While these technologies offer tremendous efficiencies, they also create new vulnerabilities. Therefore, there is a need to develop new models and methods to ensure the stable operation of interdependent critical infrastructures. This paper proposes a model for assessing the effectiveness of information security systems, which, by representing interdependent critical infrastructures in the form of Markov and semi-Markov processes, introducing changes in the state space and transition matrix, allows optimizing costs and investments in the information security system while ensuring a given level of its security. In addition, an experimental study of the proposed model was conducted. The use of this model allows to comprehensively assess the main indicators of investment in ensuring the security of interdependent critical infrastructures of the state, considering budgetary constraints on the total costs incurred.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Critical infrastructure</kwd>
        <kwd>interdependent critical infrastructures</kwd>
        <kwd>critical infrastructure objects</kwd>
        <kwd>efficiency</kwd>
        <kwd>performance assessment model</kwd>
        <kwd>investment optimization</kwd>
        <kwd>level of security</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Today, critical infrastructure organization
varies widely across countries, but important
commonality is the close interconnection and
significant interdependence on certain ICT.
Infrastructure is defined as a network of
interdependent systems and processes that interact
to produce and distribute a continuous flow of
goods and services necessary for community
development. Critical infrastructures in different
countries are highly integrated and
interconnected, both physically and through a
range of ICT. As a result, failures in one
infrastructure can have a direct or indirect impact
on other infrastructure assets, damaging the entire
geographic region and having a significant impact
on the economy of the country or even the global
economy [
        <xref ref-type="bibr" rid="ref1 ref2">1–2</xref>
        ].
      </p>
      <p>A state’s national security and the quality of life
of its citizens depend on the continued reliable
operation of a complex, interdependent critical
infrastructure, including transportation, electricity,
oil, gas, telecommunications, and emergency
services. A failure in one infrastructure can quickly
and significantly affect another. Today critical
infrastructure (Fig. 1) contains the following
sectors (in the USA for example): Chemical Sector;
Critical Manufacturing Sector; Commercial
Facilities Sector; Communications; Dams Sector;
Defense Industrial Base Sector; Emergency
Services; Energy; Transportation etc.</p>
      <p>Modern infrastructures are almost entirely
dependent on ICT and the Internet and often need
to be interconnected through electronic
communication channels to operate reliably.</p>
      <p>In addition, the same technology that allows
information to be transmitted around the world
can be used to disrupt vital systems, including the
flow of electricity or water and emergency
services. And while these technologies provide
significant efficiencies, they also create new
vulnerabilities. These vulnerabilities point to an
important scientific need to assess the
effectiveness of the information security systems
of interdependent critical infrastructures.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Analysis of modern approaches and problem statement</title>
      <p>National and economic security depend on
critical infrastructure and ICT, which are
constantly supported. Special committees are
created, and requirements are established for each
sector of infrastructure to ensure their reliability
and protection.</p>
      <p>The activity of the mentioned committees is
aimed at protecting the system against hostile
penetration, or computer attacks, which can cause
a failure in critical infrastructure.</p>
      <p>
        According to [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ], critical infrastructures can
be conditionally divided into the following two
main categories:
      </p>
      <p>1. Infrastructures whose activities are based
exclusively on ICT refer to most financial
infrastructures.</p>
      <p>2. Infrastructures that operate through
SCADA systems (Fig. 2). This is a special control
and data collection system for critical infrastructure
objects, such as electricity, water, gas, fuel,
communications, transportation, etc. These systems
use real-time information-providing sensors and
allow for control and operational changes.</p>
      <p>
        Another useful model for describing the
behavior of critical infrastructure and the
interdependence between them is the model of
defining infrastructure systems as complex
adaptive systems (CAS) [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ].
      </p>
      <p>These systems are complex because they are
diverse and contain many interconnected
components. They are adaptive, allowing
components of the system to make the right
decisions, and change in response to information
from other components and external
interventions.</p>
      <p>A detailed analysis of existing methods for
assessing the effectiveness of information security
systems for critical infrastructure is presented
below.</p>
      <p>
        A process-statistical approach to performance
evaluation is presented in papers [
        <xref ref-type="bibr" rid="ref6 ref7 ref8">6–8</xref>
        ]. As a result
of this approach, it is possible to obtain a histogram
of distribution and an integral percentage of the
distribution of the total value of predicted losses.
These values allow for the estimation of the
probability of a specific value at any selected point
or in each interval. This probability, with a specific
value of predicted losses, can be considered as
justification for the effectiveness of measures to
increase the information security level with a
guaranteed probability.
      </p>
      <p>
        The effectiveness assessment optimization
method described in [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] involves the creation of
scenarios for the development of system risk in the
form of a graph, which is a logical-probabilistic
model that reflects the functioning of the system.
This is a bipartite graph G (A, U), where the vertices
in set A correspond to the hardware and software
protection means, and the vertices in set U
correspond to the respective information threats.
Each element (vertex) in set A is characterized by its
price and its effectiveness in neutralizing
information threats. Each vertex in the set U is
assigned a weight equal to its value, and each edge
is assigned a weight r(i,j) = {1,0}. The last event
determines the dangerous state of the system.
      </p>
      <p>
        In the paper [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], the method of current and
planned operating system protection measures for
critical infrastructure functioning is presented,
which describes the process of verifying the
functionality and correctness of the operation of
current systems. If it is assumed that an
information protection means is functioning
correctly, but this is not confirmed during
business operations, then its functioning can
become a source of possible vulnerability. The
result of the method is a list of current and planned
protective measures with information on their
implementation status and use. The final
determination of the risk is made by calculating
the effectiveness indicator.
      </p>
      <p>Based on the comparison of the results, it is
concluded that if the risk is acceptable, the next
step is to prepare documents for assessing the
effectiveness of the information protection
system. If the risk exceeds the acceptable level, it
is necessary to adjust the protective measures and
then repeat the procedure for calculating the
potential security risk.</p>
      <p>
        The model proposed in papers [
        <xref ref-type="bibr" rid="ref11 ref12">11–12</xref>
        ] for
assessing the effectiveness of banking
information resources is based on the calculation
of a comprehensive investment efficiency
indicator, which is allocated to ensuring their
security and discounting future monetary inflows
and outflows. The proposed approach, based on a
comprehensive investment efficiency indicator,
allows a new (emergent) and efficient approach to
building effective security systems in terms of
both security and cost-effectiveness [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
      </p>
      <p>In Table 1, the results of the analysis of
methods for evaluating the effectiveness of the
functioning of information security systems are
summarized according to the following criteria
(proposed by authors and based on modern
approaches in this field):
1. Clarity of formalization (clarity and
comprehensibility of mathematical
calculations).
2. Ease of implementation (absence of
overly complex procedures).
3. Flexibility and universality (ability to
change parameters and apply them in different
areas).
4. Objectivity (ability to be independently
evaluated).</p>
      <p>Therefore, from Table 1, it can be seen that the
most appropriate model for all parameters is the
model for evaluating the effectiveness of banking
information resources, which calculates
efficiency, takes into account changes in security
investments over time, but is oriented (in most
cases) only to banking security and safety.</p>
      <p>The objective of this paper is to develop and
study a model for assessing the effectiveness of
information security systems in interdependent
critical infrastructures. To achieve this goal, the
following tasks must be addressed:
1. To analyze existing approaches to
assessing the effectiveness of information
security systems to determine their advantages
and disadvantages.
2. To develop a model for assessing the
effectiveness of information security systems in
interdependent critical infrastructures to enable
the comprehensive determination of key
investment indicators in information security
systems and the provision of a specified level of
security.
3. To conduct experimental research on the
developed model for assessing the
effectiveness of information security systems
to verify its effectiveness.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Model for Assessing the Effectiveness</title>
      <p>of Information Security Systems of</p>
    </sec>
    <sec id="sec-4">
      <title>Interdependent Critical Infrastructures</title>
      <p>
        The model for assessing the effectiveness of
information security systems of interdependent
critical infrastructures (for example, transport
[
        <xref ref-type="bibr" rid="ref15 ref16 ref17 ref18 ref19">15–19</xref>
        ]) consists of four stages, namely:
1. Identification of the connections
2. Identification of the links
3. Calculation of the system efficiency and
performance
4. Investments optimization [
        <xref ref-type="bibr" rid="ref1 ref2">1–2</xref>
        ]
Let’s consider them in more detail below.
      </p>
      <sec id="sec-4-1">
        <title>Stage 1: Identification of connections</title>
        <p>To represent the system of associated critical
infrastructures, graphical theory should be used,
where the nodes of the graph represent critical
infrastructure objects and the arcs represent
infrastructure components or connections
between them. It should be noted that graph arcs
can change and even be uncertain. In addition,
certain capabilities of one component or
subsystem may be related to the performance of
several other components or subsystems, and the
failure of a particular link may cause the same or
more serious difficulties.</p>
        <p>For example, a critical infrastructure supply
network contains separate suppliers labeled S1
and S2. The critical infrastructure entering the
distribution network from supplier S1 enters
through node DS1. Similarly, critical
infrastructure that enters the distribution network
from supplier S2 enters through node DS2. There
are four different requirements for the critical
infrastructure served by this network, two of
which will be labeled as E1 and E2. By dividing
the generation facilities into two nodes and a
connecting arc (e.g., E1 and G1), a “node failure”
(partial or total loss of a generator) can be
represented as a loss of capacity on the connecting
arc. The critical infrastructure demand values
(during each period) are determined at nodes D1,
D2, L1, and L2. The numbers next to the
connections in the network represent the nominal
capacity of these connections.</p>
      </sec>
      <sec id="sec-4-2">
        <title>Stage 2: Identification of the links</title>
        <p>
          The SCADA equipment monitors, controls,
and regulates the transport of the critical
infrastructure objects at the connections a → b,
b → c, c → d, and d → e. Let’s assume that
SCADA has two main subsystems. One
subsystem supports the a → b and b → c links and
the other supports the c → d and d → e
connections. Changes in bandwidth over time may
include random failures (which reduce arc power)
or repairs of indefinite duration (which restore
performance). To determine the communication
states corresponding to different performance
levels, we use Markov and semi-Markov
processes [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] to represent state transitions in
time.
        </p>
        <p>The state of each of the two SCADA
subsystems is represented by a binary random
variable, where “0” indicates a reduced state
(partial loss of functionality) and “1” indicates full
functionality. Since links a → b and b → c are
controlled by the same SCADA subsystem,
changes in their performance determined by the
state of the SCADA system occur together,
creating a correlation between them. The same
applies to the c → d and d → e links. Since the
capabilities of the a → b, b → c, c → d, and
d → e link systems depend on the state of the
SCADA system, the definition of states depends
on the state of the corresponding SCADA
subsystem.</p>
      </sec>
      <sec id="sec-4-3">
        <title>Stage 3: Calculation of the system efficiency and performance</title>
        <p>Assessing the probability distribution of
critical infrastructure objects supplied at D1 and
D2, L1 and L2 is critical to understanding the
quality of service that can be provided to
customers. Understanding the “recovery time”
provides insight into the reliability of the system.</p>
        <p>Let’s consider the problem of an infinite
horizontal generalized network flow with a set of
nodes N and a set of arcs A. Let сt (i, j) be the arc
capacity (i, j)  A in period t.</p>
        <p>Let</p>
        <p>Ct = (сt (i, j))  E
and</p>
        <p>C = Ct   E
where E is the state space for the capacity on all
links in period t. Let’s consider C as a
semiMarkov process with a probability measure
 (C, ).</p>
        <p>Let D be the demand for each node in each
period. Let f be the performance indicator
defined on E . In the interim analysis, f is the
distribution of the time to “recover”. In the steady
state analysis, f is the probability distribution for
the product delivered to each demand node. It is
possible to estimate the probability distribution
and the recovery time using the model. The
procedure for creating an observation from this
distribution is as follows:
1. Let I = 1, then for each connection it
should be assumed that the capacitance has just
reached the lowest possible state.
2. Given the capacity of each link, determine
the demand satisfied at each location by
solving the generalized flow problem,
assuming that all demands are equally
important.</p>
        <p>3. Let I = i + 1.
4. When all the demands are satisfied, the
flow stops, and the value will reflect the
number of periods needed to recover.
5. Recover each link state based on the
associated stochastic process and continue with
Step 2.</p>
        <p>Since some stochastic processes have a
transition probability that is quite small and quite
long, many replications are likely to be needed. To
overcome this problem, important samples can be
used. The basic idea behind using importance
sampling is to select alternative transition
matrices and residence time distributions that are
more computationally efficient but to “adjust” the
results using the relative probability of observing
the initial parameters.</p>
      </sec>
      <sec id="sec-4-4">
        <title>Stage 4: Investments optimization</title>
        <p>Investment opportunities that may have an
impact on efficiency can be represented in Markov
models as changes in transition matrices. After all,
the transition matrix for a communication channel in
a network has an overall effect on the performance
of the system, and this effect can be estimated by
Markov models.</p>
        <p>That is, if C is a Markov or semi-Markov
process that depends on some parameter  , it has
a probability measure  (C, ), that determines
the probabilities of the system being in different
states. If the system has a performance measure
g (C ), the simulation model can be seen as an
estimate of the expected performance for a given
 , as follows:
f ( ) = E  g (C) =  g (C) (dC, ).</p>
        <p>To assess the effectiveness, the following
expression should be used:</p>
        <p>a( ) =  g (C) (C, ),
where g (C )
requirements</p>
        <p>is the
will be</p>
        <p>probability that all
met,  (C, ) is the
probability of a steady state at  .</p>
        <p>Therefore, the process is as follows:</p>
        <p>Step 1: It is necessary to compute 1000 sample
paths of the system, each with 1000 periods, using
transition matrices for each link that are similar to
those of the basic configuration of the system, but
that allows a more “efficient modeling”. Let  be
the stochastic processes chosen for each link.
Then, it is necessary to calculate the probability
that all requirements are satisfied  and let this
value be Р*.</p>
        <p>Step 2: Identify the links that have enough
funds to make the next additional investments. If
there are no links, then stop the analysis.</p>
        <p>Step 3: For each of the links identified in
Step 2, calculate separately the probability that all
requirements can be met if additional investment
is made in the link. Each calculation requires an
“adjustment” of the 1000 sample routes identified
in Step 1, based on an “importance function” for
the links.</p>
        <p>Step 4: Make an additional investment in the link
that gives the largest increase in the probability that
all requirements can be met, if this increase is
positive. If the improvement is positive, update P,
reduce the budget available for these investments,
update the stochastic process set on the links O, and
proceed to Step 2; otherwise stop.</p>
        <p>The proposed model for assessing the
effectiveness of information security systems,
which, by representing interdependent critical
infrastructures in the form of Markov and
semiMarkov processes, introducing changes in the
state space and transition matrix, allows for
optimization the costs and investments in the
information security system while ensuring a
given level of its security.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>4. Experimental study of the model</title>
      <sec id="sec-5-1">
        <title>Stage 1: Identification of connections</title>
        <p>
          For the experimental study of the proposed
model, the following example of two
interdependent critical infrastructures which are a
gas distribution network, and an electricity
generation/distribution network is considered [
          <xref ref-type="bibr" rid="ref1 ref2">1–
2</xref>
          ]. The gas distribution network is supported by
dispatch control and a data collection system.
        </p>
        <p>The combined gas and electricity network is
shown in Fig. 3. It contains two separate suppliers,
labelled S1 and S2. Gas entering the distribution
network from supplier S1 is delivered through
node DS1.</p>
        <p>Similarly, gas entering the distribution
network from supplier S2 enters through node
DS2. There are four different gas consumers
served by this network, two of which are power
stations (E1 and E2). Each power plant can supply
the electrical load on L2, but only one of the
generators can supply the electrical load on L1. By
dividing the generating units into two nodes and
one interconnecting line (e.g. E1 and G1), it is
possible to represent a “node failure” (partial or
total loss of a generator) as a loss of capacity on
the interconnecting line.</p>
        <p>The gas and electricity demand values (during
each period) are recorded at nodes D1, D2, L1,
and L2. The numbers next to the network
connections represent the nominal capacity of
these connections.</p>
      </sec>
      <sec id="sec-5-2">
        <title>Stage 2: Identification of the links</title>
        <p>
          The SCADA system [
          <xref ref-type="bibr" rid="ref20 ref21 ref22 ref23">20–23</xref>
          ] consists of two
main sub-systems. One subsystem supports the
connections a → b and b → c and the other—
c → d and d → e. Fig. 1 shows the possibilities of
establishing connections that are considered to be
deterministic. In addition, stochastic processes
have been identified for those connections that are
considered to have an uncertain capacity. For
example, the S1 → DS1 link can have a capacity of
90, 95, 100, or 105. It is assumed that the capacity
evolution of gas transmission pipelines is a
semiMarkov process, while other links are characterized
by Markov processes. Observations of these
distributions are rounded to determine the number
of periods in which the process is carried out.
        </p>
        <p>The state of each of the two SCADA
subsystems is represented by a binary random
variable, where 0 indicates a reduced state (partial
loss of functionality) and 1 indicates full
functionality. Thus, if the part of the SCADA
system supporting a → b and b → c connections is
in a reduced state, then the maximum state of the
tank with the a → b connection is 250 instead of
300.</p>
      </sec>
      <sec id="sec-5-3">
        <title>Stage 3: Calculation of the system efficiency and performance</title>
        <p>Assessing the probability of gas supply to D1
and D2 and electricity supply to L1 and L2 is
essential to understand the quality of service
offered to customers. And indicator f contains
four possible distributions.</p>
        <p>Fig. 3 shows the distribution of the probability of
temporary restoration based on 1000 replications.
The average recovery time is 10.6 periods, but there
is about a 5% chance that it will take 20 or more
periods, and in one experiment it took 36 periods to
recover the system. The structure of the analysis
makes it relatively easy to determine the conditions
that led to each recovery time observation. Such
information is likely to be particularly valuable to
policymakers seeking to improve system efficiency.</p>
        <p>Then, using the algorithm described in Step 3,
the stationary probability distribution for the
product delivered to each demand location was
estimated. Fig. 4 illustrates the probability
distribution for the products delivered to each
demand node based on 1000 replications of the
stationary sampling scheme.</p>
        <p>In addition, Fig. 5 shows the probability
distribution for the products delivered to each
demand node (if the storage tank is not available),
based on 1000 replications of the steady-state
sample. The proportion of periods in which
demand is met by different “load nodes” of the
system varies from about 94% to 99%. In general,
it is more difficult to meet demand at D2 than at
D1 because of the uncertainty associated with the
b → c, c → d, and d → e connections.</p>
      </sec>
      <sec id="sec-5-4">
        <title>Stage 4: Investments optimization</title>
        <p>Investment opportunities that can improve
efficiency are represented in the Markov models
as changes in the transition matrices. For example,
the reliability of a particular piece of equipment
can be improved, and this improvement can be
represented as a reduction in the probability of
fault injection in the Markov model by capacity.
This alternative transition matrix for the network
link and the overall impact on system performance
can be evaluated using simulation. Replacing the
old transition matrix also has a cost associated
with its improvement. Thus, the investment
optimization task is to determine which
investments (changes in specific transition
matrices) should be made to maximize system
performance, given the budget constraints on the
total cost incurred.</p>
        <sec id="sec-5-4-1">
          <title>a) Product delivery to D1</title>
        </sec>
        <sec id="sec-5-4-2">
          <title>b) Product delivery to L1</title>
        </sec>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>5. Results and discussion</title>
      <p>Let us consider in detail what investments can be
made to improve the reliability of gas supply from
suppliers, SCADA system, gas pipelines, and
generators. Let’s assume that for $100 thousand
invested in the connection, the lowest state of the
tank is removed and the possibility of transition to
this state is added to those for the next lower state.
For each successive state removed, the cost is $150,
$200, $250, $300, $350, and $400 thousand,
respectively. Link investments must be made
properly. For example, securing at least 100,000
cubic feet of gas from Supplier 1 requires an
investment of $250,000. The goal of cost
optimization is to find a tradeoff that satisfies the
condition of maximizing the steady-state probability
that all requirements will be met.</p>
      <p>The proposed order of investments is to ensure
the reliability of gas supplies from supplier 2 first,
then to invest in gas pipelines c → d and d → e,
and then in power generation lines E1 → G1 and
E2 → G2.</p>
      <p>The most significant improvement in overall
system reliability is the increased reliability of gas
supply from supplier 2. Without this supply,
further “downstream” capacity increases are
ineffective. Further investments in gas pipelines
and power generation may slightly improve
system reliability, but the optimization points to
gas supply as the most important investment area.</p>
      <p>
        This example is both simple and complex
enough to illustrate processes in much larger,
complex real-world networks [
        <xref ref-type="bibr" rid="ref24 ref25 ref26 ref27 ref28 ref29 ref30">24–30</xref>
        ].
      </p>
      <p>
        As the experiment has shown, the usage of the
proposed model allows a comprehensive
assessment of the main indicators of investment in
the security of the state’s interdependent critical
infrastructure [
        <xref ref-type="bibr" rid="ref24 ref31 ref32 ref33 ref34">24, 31–34</xref>
        ], considering budgetary
constraints on the total cost incurred.
      </p>
    </sec>
    <sec id="sec-7">
      <title>6. Conclusions</title>
      <p>The paper analyzes existing approaches to
assessing the effectiveness of interdependent
critical infrastructures and identifies their main
advantages and disadvantages. It is found that the
model for assessing the effectiveness of banking
information resources has the greatest advantages,
which calculates efficiency and takes into account
changes in security investments over time, but
mostly focuses only on banking security and
security of information resources.</p>
      <p>A model for assessing the effectiveness of
information security systems has been developed,
which, by representing interdependent critical
infrastructures in the form of Markov and
semiMarkov processes, introducing changes in the
state space and transition matrix, allows
optimizing costs and investments in the
information security system while ensuring a
given (required) level of its security.</p>
      <p>In addition, the paper conducts an
experimental study of the mentioned model,
which confirms its effectiveness in the
comprehensive assessment of the main indicators
of investment in ensuring the security of
interdependent critical infrastructure of the state,
considering budgetary constraints on the total cost
incurred.</p>
    </sec>
    <sec id="sec-8">
      <title>7. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>L.</given-names>
            <surname>Nozick</surname>
          </string-name>
          , et al.,
          <source>Assessing the Performance of Interdependent Infrastructures and Optimizing Investment, 37th Hawaii International Conference on Systems Sciences</source>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>N.</given-names>
            <surname>Xu</surname>
          </string-name>
          , et al.,
          <source>Optimizing Investment for Recovery in Interdependent Infrastructure, 40th Annual Hawaii International Conference on System Sciences (HICSS'07)</source>
          , Waikoloa,
          <string-name>
            <surname>HI</surname>
          </string-name>
          , USA,
          <year>2007</year>
          ,
          <fpage>112</fpage>
          -
          <lpage>112</lpage>
          . doi:
          <volume>10</volume>
          .1109/HICSS.
          <year>2007</year>
          .413
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Boyer</surname>
          </string-name>
          ,
          <source>SCADA Supervisory Control and Data Acquisition</source>
          , USA: ISAInternational Society of Automation,
          <volume>179</volume>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>H.</given-names>
            <surname>Abbas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mohamed</surname>
          </string-name>
          ,
          <source>Review in the Design of Web-Based SCADA Systems Based on OPC DA Protocol, Int. J. Comput. Netws</source>
          .
          <volume>2</volume>
          (
          <issue>6</issue>
          ) (
          <year>2011</year>
          )
          <fpage>266</fpage>
          -
          <lpage>277</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>S.</given-names>
            <surname>Rinaldi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Peerenboom</surname>
          </string-name>
          , T. Kelly, Identifying, Understanding, and
          <article-title>Analyzing Critical Infrastructure Interdependencies</article-title>
          ,
          <source>IEEE Control Systs. Magazine</source>
          ,
          <volume>21</volume>
          (
          <issue>6</issue>
          ) (
          <year>2001</year>
          )
          <fpage>11</fpage>
          -
          <lpage>25</lpage>
          . doi:
          <volume>10</volume>
          .1109/37.969131
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>D.</given-names>
            <surname>Mussington</surname>
          </string-name>
          ,
          <article-title>Concepts for Enhancing Critical Infrastructure Protection: Relating Y2K to CIP Research and Development</article-title>
          ,
          <source>RAND: Sci. Technol. Inst. Santa Monica</source>
          ,
          <year>2002</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>F.</given-names>
            <surname>Petit</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Wallace</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Phillips</surname>
          </string-name>
          , An Approach to Critical Infrastructure Resilience,
          <source>The CIP Report</source>
          ,
          <article-title>Center for Infrastructure Protection</article-title>
          and
          <string-name>
            <given-names>Homeland</given-names>
            <surname>Security</surname>
          </string-name>
          , George Mason University School of Law, January,
          <volume>12</volume>
          (
          <issue>7</issue>
          ),
          <year>2014</year>
          ,
          <fpage>17</fpage>
          -
          <lpage>20</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>J.</given-names>
            <surname>Phillips</surname>
          </string-name>
          , et al.,
          <article-title>A Framework for Assessing Infrastructure Risk, M4-I Resilience Evaluation Approaches for the Analysis of Complex Systems, Risk Analysis: Advancing Analysis</article-title>
          ,
          <source>Society for Risk Analysis</source>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>G.</given-names>
            <surname>Gürkan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Ozge</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Robinson</surname>
          </string-name>
          , Sample Path Optimization in Simulation,
          <source>Winter Simulation Conference</source>
          ,
          <year>1994</year>
          ,
          <fpage>247</fpage>
          -
          <lpage>254</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>H.</given-names>
            <surname>Abbas</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Mohamed</surname>
          </string-name>
          ,
          <source>Review in the Design of Web-Based SCADA Systems Based on OPC DA Protocol, Int. J. Comput. Netws</source>
          .
          <volume>2</volume>
          (
          <issue>6</issue>
          ) (
          <year>2011</year>
          )
          <fpage>266</fpage>
          -
          <lpage>277</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S.</given-names>
            <surname>Yevseyev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Korol</surname>
          </string-name>
          ,
          <article-title>Complex Indicator of Investments Efficiency in Bank Information Security Based on a Synergistic Threat Model</article-title>
          , VI International Scientific Conference “Information, Communication,
          <year>Society 2017</year>
          ”, Slavske, Ukraine,
          <year>2017</year>
          ,
          <fpage>18</fpage>
          -
          <lpage>19</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>S.</given-names>
            <surname>Yevseyev</surname>
          </string-name>
          ,
          <article-title>Methodology for Building a Security System for Banking Information Resources, [Qualifying Scientific Work in Manuscript]</article-title>
          . National Aviation University, Kyiv,
          <year>2018</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>N.</given-names>
            <surname>Limnios</surname>
          </string-name>
          , G. Oprisan,
          <article-title>Semi-Markov processes and reliability</article-title>
          , Birkhäuser,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <article-title>SCADA Projects and System</article-title>
          . URL: https://www.ssla.co.uk/scada-projects/
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>O.</given-names>
            <surname>Okoro</surname>
          </string-name>
          , et al.,
          <source>Optimization of Maintenance Task Interval of Aircraft Systems, Int. J. Comput. Netw. Inf. Secur</source>
          .
          <volume>14</volume>
          (
          <issue>2</issue>
          ) (
          <year>2022</year>
          )
          <fpage>77</fpage>
          -
          <lpage>89</lpage>
          . doi:
          <volume>10</volume>
          .5815/ijcnis.
          <year>2022</year>
          .
          <volume>02</volume>
          .07.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>J.</given-names>
            <surname>Al-Azzeh</surname>
          </string-name>
          , et al.,
          <article-title>A Method of Accuracy Increment Using Segmented Regression</article-title>
          , Algorithms,
          <volume>15</volume>
          (
          <issue>10</issue>
          ) (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>24</lpage>
          . doi:
          <volume>10</volume>
          .3390/a15100378
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>M. TajDini</surname>
            , V. Sokolov,
            <given-names>P.</given-names>
          </string-name>
          <string-name>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <article-title>Performing Sniffing and Spoofing Attack Against ADS-B and Mode S using Software Define Radio</article-title>
          ,
          <source>IEEE International Conf. on Information and Telecommunication Technologies and Radio Electronics</source>
          ,
          <year>2021</year>
          . doi:
          <volume>10</volume>
          .1109/ukrmico52950.
          <year>2021</year>
          .9716665
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <source>Critical Aviation Information Systems Cybersecurity</source>
          ,
          <article-title>Meeting Security Challenges Through Data Analytics and Decision Support</article-title>
          , IOS Press Ebooks,
          <volume>47</volume>
          (
          <issue>3</issue>
          ) (
          <year>2016</year>
          )
          <fpage>308</fpage>
          -
          <lpage>316</lpage>
          . doi:
          <volume>10</volume>
          .3233/978-1-
          <fpage>61499</fpage>
          -716-0-308
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>R.</given-names>
            <surname>Odarchenko</surname>
          </string-name>
          , et al.,
          <source>Improved Method of Routing in UAV Network</source>
          ,
          <source>2015 IEEE 3rd International Conference on Actual Problems of Unmanned Aerial Vehicles Developments (APUAVD)</source>
          , Kyiv, Ukraine,
          <year>October 2015</year>
          ,
          <fpage>294</fpage>
          -
          <lpage>297</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>M.</given-names>
            <surname>Fall</surname>
          </string-name>
          , et al.,
          <source>Enhancing SCADA System Security</source>
          ,
          <source>2020 IEEE 63rd International Midwest Symposium on Circuits and Systems (MWSCAS)</source>
          , Springfield, MA, USA,
          <year>2020</year>
          ,
          <fpage>830</fpage>
          -
          <lpage>833</lpage>
          . doi:
          <volume>10</volume>
          .1109/MWSCAS48704.
          <year>2020</year>
          .9184532
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>O.</given-names>
            <surname>Ivanchenko</surname>
          </string-name>
          , et al.,
          <source>Dependability Assessment for SCADA System Considering Usage of Cloud Resources</source>
          ,
          <source>2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT)</source>
          , Kyiv, Ukraine,
          <year>2020</year>
          ,
          <fpage>13</fpage>
          -
          <lpage>17</lpage>
          . doi:
          <volume>10</volume>
          .1109/DESSERT50317.
          <year>2020</year>
          .9125052
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>A.</given-names>
            <surname>Khadra</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Rammal</surname>
          </string-name>
          ,
          <source>SCADA System for Solar Backup Power System Automation</source>
          ,
          <source>2022 International Conference on Smart Systems and Power Management (IC2SPM)</source>
          , Beirut, Lebanon,
          <year>2022</year>
          ,
          <fpage>75</fpage>
          -
          <lpage>79</lpage>
          . doi:
          <volume>10</volume>
          .1109/IC2SPM56638.
          <year>2022</year>
          .9988760
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Chen</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Work-</surname>
          </string-name>
          in-Progress:
          <article-title>Reliability Evaluation of Power SCADA System with Three-</article-title>
          <string-name>
            <surname>Layer</surname>
            <given-names>IDS</given-names>
          </string-name>
          , International Conference on Compilers, Architecture, and
          <article-title>Synthesis for Embedded Systems</article-title>
          , Shanghai, China,
          <year>2022</year>
          ,
          <fpage>1</fpage>
          -
          <lpage>2</lpage>
          . doi:
          <volume>10</volume>
          .1109/CASES55004.
          <year>2022</year>
          .
          <volume>00007</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <surname>Yu</surname>
            . Danik,
            <given-names>R.</given-names>
          </string-name>
          <string-name>
            <surname>Hryschuk</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <source>Synergistic Effects of Information and Cybernetic Interaction in Civil Aviation, Aviation</source>
          ,
          <volume>20</volume>
          (
          <issue>3</issue>
          ) (
          <year>2016</year>
          )
          <fpage>137</fpage>
          -
          <lpage>144</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>V.</given-names>
            <surname>Sydorenko</surname>
          </string-name>
          ,
          <article-title>Experimental FMECABased Assessing of the Critical Information Infrastructure Importance in Aviation</article-title>
          ,
          <source>CEUR Workshop Proc</source>
          .
          <volume>2732</volume>
          (
          <year>2020</year>
          )
          <fpage>136</fpage>
          -
          <lpage>156</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <given-names>V.</given-names>
            <surname>Grechaninov</surname>
          </string-name>
          , et al.,
          <source>Formation of Dependability and Cyber Protection Model in Information Systems of Situational Center, in: Workshop on Emerging Technology Trends on the Smart Industry and the Internet of Things</source>
          , vol.
          <volume>3149</volume>
          (
          <year>2022</year>
          )
          <fpage>107</fpage>
          -
          <lpage>117</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <surname>M. TajDini</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Sokolov</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Buriachok</surname>
          </string-name>
          ,
          <article-title>Men-in-the-Middle Attack Simulation on Low Energy Wireless Devices using Software Define Radio</article-title>
          ,
          <source>in: 8th International Conference on "Mathematics. Information Technologies. Education": Modern Machine Learning Technologies and Data Science</source>
          , vol.
          <volume>2386</volume>
          (
          <year>2019</year>
          )
          <fpage>287</fpage>
          -
          <lpage>296</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <given-names>P.</given-names>
            <surname>Anakhov</surname>
          </string-name>
          , et al.,
          <article-title>Evaluation Method of the Physical Compatibility of Equipment in a Hybrid Information Transmission Network</article-title>
          ,
          <source>Journal of Theoretical and Applied Information Technology</source>
          <volume>100</volume>
          (
          <issue>22</issue>
          ) (
          <year>2022</year>
          )
          <fpage>6635</fpage>
          -
          <lpage>6644</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <given-names>V.</given-names>
            <surname>Grechaninov</surname>
          </string-name>
          , et al.,
          <article-title>Decentralized Access Demarcation System Construction in Situational Center Network</article-title>
          ,
          <source>in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems II</source>
          , vol.
          <volume>3188</volume>
          , no.
          <issue>2</issue>
          (
          <year>2022</year>
          )
          <fpage>197</fpage>
          -
          <lpage>206</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <given-names>O.</given-names>
            <surname>Potii</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Tsyplinsky</surname>
          </string-name>
          ,
          <source>Methods of Classification and Assessment of Critical Information Infrastructure Objects</source>
          ,
          <source>2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT)</source>
          , Kyiv, Ukraine,
          <year>2020</year>
          ,
          <fpage>389</fpage>
          -
          <lpage>393</lpage>
          . doi:
          <volume>10</volume>
          .1109/ dessert50317.
          <year>2020</year>
          .9125028
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <given-names>F.</given-names>
            <surname>Adochiei</surname>
          </string-name>
          et al.,
          <article-title>Intelligent System for Automatic Assessment and Interpretation of Disguised Behaviour for Critical Infrastructure Personnel, 2022 E-Health and Bioengineering Conference (EHB), Iasi</article-title>
          , Romania,
          <year>2022</year>
          ,
          <fpage>01</fpage>
          -
          <lpage>04</lpage>
          . doi:
          <volume>10</volume>
          .1109/EHB55594.
          <year>2022</year>
          .9991710
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <given-names>V.</given-names>
            <surname>Rosato</surname>
          </string-name>
          et al.,
          <source>The European Infrastructure Simulation and Analysis Centre (EISAC) initiative and its technological assets</source>
          ,
          <source>2020 43rd International Convention on Information, Communication and Electronic Technology (MIPRO)</source>
          , Opatija, Croatia,
          <year>2020</year>
          ,
          <fpage>1848</fpage>
          -
          <lpage>1851</lpage>
          . doi:
          <volume>10</volume>
          .23919/MIPRO48935.
          <year>2020</year>
          .9245340
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <given-names>G.L.</given-names>
            <surname>Pahuja</surname>
          </string-name>
          ,
          <article-title>Component Importance Measures based Risk and Reliability Analysis of Vehicular Ad Hoc Networks</article-title>
          ,
          <source>Int. J. Comput. Netw. Inf. Secur</source>
          .
          <volume>10</volume>
          (
          <issue>10</issue>
          ) (
          <year>2018</year>
          )
          <fpage>38</fpage>
          -
          <lpage>45</lpage>
          . doi:
          <volume>10</volume>
          .5815/ijcnis.
          <year>2018</year>
          .
          <volume>10</volume>
          .05
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , E. Izquierdo,
          <string-name>
            <given-names>K.</given-names>
            <surname>Chandramouli</surname>
          </string-name>
          , Critical Infrastructure Security Using Computer Vision Technologies, Secur. Technols. Social Implic. (
          <year>2023</year>
          )
          <fpage>149</fpage>
          -
          <lpage>180</lpage>
          . doi:
          <volume>10</volume>
          .1002/9781119834175.ch6
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>