=Paper= {{Paper |id=Vol-3736/paper17 |storemode=property |title=Decision-making support of emergency risk identification in complex hierarchical control systems |pdfUrl=https://ceur-ws.org/Vol-3736/paper17.pdf |volume=Vol-3736 |authors=Volodymyr Sabat,Bohdan Durnyak,Myroslava Kulynych,Yurii Lozynskyi,Pavlo Hibey |dblpUrl=https://dblp.org/rec/conf/icyberphys/SabatDKLH24 }} ==Decision-making support of emergency risk identification in complex hierarchical control systems== https://ceur-ws.org/Vol-3736/paper17.pdf
                                Decision-making support of emergency risk
                                identification in complex hierarchical control systems⋆
                                Volodymyr Sabat1,∗,† , Bohdan Durnyak1,†, Myroslava Kulynych1,†, Yurii Lozynskyi2,†
                                and Pavlo Hibey1,†

                                1 Ukrainian Academy of Printing, 19 Pid Holoskom Str., Lviv, 79061, Ukraine
                                2 Lviv State University of Internal Affairs, 26 Horodotska Str., Lviv, 79007, Ukraine




                                                 Abstract
                                                 An analysis of a complex man-made hierarchical structure with an automated control and
                                                 document management system is carried out in the conditions of active information and resource
                                                 attacks, using the category algebra, which allows detecting attacks on a dynamic system,
                                                 determining the risk levels of emergency situations and creating appropriate countermeasures. For
                                                 the first time, the methodology of constructing categorical models for the representation of a
                                                 dynamic hierarchical structure in the space of states is substantiated and developed, diagrams of
                                                 energy-active objects of a dynamic system are provided, taking into account the effect of resource
                                                 and information attacks on it, and methods of decision-making in emergency situations using risk
                                                 assessment. For the first time, a structural diagram of the balance of the game between threats and
                                                 control in the system is formed, taking into account the factors of threats and their influence on the
                                                 objects of the system, on the basis of which a functional diagram of the information-resource
                                                 hierarchy of the aggregated system control in the mode of countering threats is proposed. For the
                                                 first time, the categorical diagram of an information attack is substantiated and the systemology of
                                                 the formation of the object structure and the assessment of the dynamic state under resource
                                                 threats and information attacks is proposed. As a result of the research, a hierarchical structure of
                                                 the control system of the technological complex is formed under the risk of emergency situations,
                                                 with the selection of security features of the document flow in the formation of control decisions at
                                                 the techno-aggregate, operational administrative and strategic levels, which allows the use of the
                                                 proposed methodology in the conditions of decision-making support during the functioning of
                                                 complex hierarchical control systems.

                                                 Keywords
                                                 Decision-making support, categorical models, man-made systems, threats, risk assessment,
                                                 hierarchical systems control. 1




                                ICyberPhyS-2024: 1st International Workshop on Intelligent & CyberPhysical Systems, June 28, 2024, Khmelnytskyi,
                                Ukraine
                                ∗ Corresponding author.
                                † These authors contributed equally.

                                   v_sabat@ukr.net (V. Sabat); bohdan.durnyak@gmail.com (B. Durnyak); kumyr@ukr.net (M. Kulynych)
                                nevdet@ukr.net (Yu. Lozynskyi); pavlo.hibey@gmail.com (P. Hibey)
                                   0000-0001-8130-7837 (V. Sabat); 0000-0003-1526-9005 (B. Durnyak); 0000-0002-9271-7855 (M. Kulynych); 0000-
                                0003-2908-7747 (Yu. Lozynskyi); 0009-0008-2034-1060 (P. Hibey)
                                          © 2023 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).




CEUR
                  ceur-ws.org
Workshop      ISSN 1613-0073
Proceedings
1. Introduction
The structure of the hierarchical man-made control system has a complex organization, so it
is not an easy task to cover all aspects of its functioning, to present and identify energy-
information connections. The problem is especially complicated if the dynamic system is
affected by negative factors in the form of information and resource attacks, which can lead to
uncontrolled changes in the state of aggregates and objects in the technological cycle of
system control. In addition, the action of information and infrastructure attacks of an
aggressive type can lead to the destruction of hierarchical connections and the system
structure, which, in turn, threatens the emergence of emergency situations with a high level
of accident risk. These problems are not fully solved both in the classical control theory and in
modern approaches based on system analysis. Only the use of the category algebra by
constructing diagrams of the structure of connections and determining the cores of influence
on the system space of states allows detecting attacks on a dynamic system and creating
means of countering possible attacks.
   To achieve the goal of scientific research, it is necessary to solve the following tasks:

   •   to justify the use of the category algebra methods for solving the problems of
       constructing the structures of hierarchical dynamic systems with complex connections
       and under external negative influences;
   •   to construct categorical structural diagrams of transformations in an energy-active
       system under the threats, in the space of states and dynamics in time of a complex
       system;
   •   to propose a categorical representation of the model of threats to the system and to
       develop a structural diagram of the game between threats and control in the system;
   •   to develop a functional scheme of information-resource countermeasures against
       threats in the hierarchy of the man-made system and the hierarchical structure of the
       control system of the technological complex at risk.

2. Related works
The analysis of the problem of emergency and risk situations under the influence of active
threats and attacks has shown the importance of building models for detecting attacks by the
way they affect system objects. The textbook of domestic scientists [1] substantiates the use of
risk assessment methods in determining the reliability of technical systems and humans,
reveals the basic concepts, essence, goals and methods of information protection; multi-
criteria methods for assessing the correctness of decisions in crisis situations are considered in
the scientific work [2], which proposes a solution to this problem, which allows us to assert
that the decision was made correctly in this particular case when ensuring the information
security of a particular object; article [3] provides an overview of the concept of industry 4.0
concept with equivalent terms, basic technologies and reference structures for its
implementation, it is substantiated that this paradigm is a promising result of the merger and
integration of both existing and revolutionary technologies; categorized models for
representing the structure and dynamic state of hierarchical systems to identify attack factors
and risks are given in the collective work [4]; the theory of digital control systems that
describes the functionality of the system, explains the modeling process, presents a solution to
the problem, and discusses the results of hierarchical system management processes is
proposed in [5]; paper [6] presents research on assessing the occurrence of risk situations for
automated control systems of metallurgical enterprises under active threats and attacks. With
the help of the above-mentioned works, structural representations of hierarchical dynamic
systems with complex connections and under the influence of external attacks have been
developed, using also international standards in the field of information security [7], methods
of software and hardware protection of network technologies. based on big data [8] and
preventive security measures [9].
   The concept of smart manufacturing and its impact on the future automation of labor with
decision-making technology is proposed in [10]. The author identifies three possible future
scenarios of production automation: digital production flows, self-organized production
network, and cloud-based production equipment as a service.
   The scientific article [11] describes methods for building risk models in a threat system using
semantic analysis of the text of documents for the presence of anomalies in their semantic
parameters. Paper [12] analyzes the concepts of risk and safety of subway passengers in cases of
malicious man-made incidents. As a result, using the example of the Athens subway system, the
importance of passenger protection to improve safety and avoid threatening conditions is
proved. These studies reveal the essence of hierarchical systems and their vulnerability to man-
made disasters under the influence of external attacks and internal threats.
   Modern developed methods for analyzing general industrial control systems for
hierarchical technogenic structures are presented in [13, 14]. Work [15] consider applied
decision support systems based on risk analysis of complex systems.
   Paper [16] presents the use of an object-oriented Bayesian network for scenario risk
assessment. A model of probabilistic coverage of key factors affecting accidents in
fragmented structures is developed. The study in [17] proposes a model-based methodology
for hybrid management of risk assessment of reliability, availability, maintainability, and
safety for critical systems. The result is a method for analyzing cybersecurity risks for
industrial control systems. Agrawal et al. [18] defined an ontology to represent ISO/IEC
27,005, 2018 standards to provide a step-by-step understanding of the meaning of security
concepts and their interrelationships. Researchers such as Blanco et al. [19] reviewed 31
security ontologies. Both studies group security ontologies into three categories: general,
specific, and theoretical.
   Two popular risk assessment methods tested for the nuclear industry use probabilistic risk
assessment [20, 21], while others use dynamic Bayesian networks [22, 23]. The human factor
and reliability in risk assessment and management in the context of threats and attacks are
considered in the scientific paper [24]. Paper [25] presents a model of a dynamic and iterative
process in which experts discuss a multi-criteria decision-making problem in complex
management structures. The considered methods of modeling fuzzy preferences are aimed at
evaluating, comparing, selecting, prioritizing and/or organizing alternatives.

3. Materials and Methods
    Let one construct the structure of the hierarchical system in a categorical form. To do this,
its main elements and parameters should be defined: [4] Т is the set of moments of time on the
ordered set Z of cyclic numbers; 𝑈𝑈 ⊂ 𝐾𝐾 𝑚𝑚 is the set of values of control actions on the m-
dimensional vector space; Y is the set of values of input parameters on 𝐾𝐾 0 ; X is the space of
states on 𝐾𝐾 0 ; Ω is the space of input actions for which 𝜔𝜔𝑖𝑖 : 𝑇𝑇 → 𝑈𝑈, 𝜔𝜔𝑖𝑖 ∈ Ω; Г is the space of
output parameters Г: 𝑇𝑇 → 𝑌𝑌; α is the display of the transition when the system status changes
α: (𝑇𝑇 × 𝑇𝑇 × 𝑋𝑋 × Ω) → 𝑋𝑋.
    For the moment of each transition one has:

                        (𝑡𝑡 + 1, 𝑡𝑡, 𝑥𝑥, 𝜔𝜔) ⟼ 𝜑𝜑(𝑡𝑡 + 1, 𝑡𝑡, 𝑥𝑥, 𝜔𝜔) = 𝐹𝐹𝐹𝐹(𝑡𝑡) + 𝑔𝑔𝑔𝑔(𝑡𝑡),                 (1)
where 𝐹𝐹, 𝑔𝑔 are matrices (𝑛𝑛 × 𝑛𝑛), (𝑛𝑛 × 𝑚𝑚) over K; 𝜑𝜑 is the output representation 𝑇𝑇 × 𝑋𝑋 → 𝑌𝑌for
which (𝑡𝑡, 𝑥𝑥) ⟼ 𝜑𝜑(𝑡𝑡, 𝑥𝑥) = 𝐻𝐻(𝑥𝑥) is true.
     To study the dynamics of the system for each component, it is necessary to identify the
model (input-output function) as a transfer function that connects the initial state of the
system 𝑦𝑦(𝑡𝑡) with the input control signal 𝑢𝑢�𝑥𝑥(𝑡𝑡, 𝜏𝜏)� through the parametric-time operator
𝐴𝐴(𝑡𝑡, 𝜏𝜏): 𝑥𝑥(𝑡𝑡, 𝜏𝜏) → 𝑦𝑦(𝑡𝑡, 𝜏𝜏 + ∆𝜏𝜏).
     For linear systems in the classical theory, the "input-output" representation function 𝑓𝑓 is
associated with the concept of the transfer function [5].
     If there is some homomorphism for the transfer function 𝑓𝑓 in the structure of dynamic
systems 𝑆𝑆𝑑𝑑 then it can be represented in the form: 𝑓𝑓(𝜔𝜔) = ∑𝑚𝑚  𝑖𝑖=1 𝜔𝜔𝑖𝑖 𝑓𝑓(𝑙𝑙𝑖𝑖 ), where 𝑓𝑓(𝑙𝑙𝑖𝑖 ) describes
the power series. [4]
     If there is a factorization for 𝑓𝑓 which is described by a commutative diagram 𝐾𝐾[2] is a
homomorphism, then the system 𝑆𝑆𝑑𝑑 (𝑓𝑓, Ω, Г) will have a realized structure in the space 𝑋𝑋𝑓𝑓 ⊂
𝑋𝑋, i.e.𝑓𝑓�Ψ𝑓𝑓 ∙ 𝑙𝑙𝐾𝐾 � = �𝐻𝐻𝑓𝑓 ∙ 𝑔𝑔𝑓𝑓 ��Ψ𝑓𝑓 ∙ 𝑙𝑙𝐾𝐾 � (Fig. 1).




Figure 1: Realized dynamic structure in the space of states

   The implementation of the matrix transfer function for an object with interconnected
technological aggregates, with a common space of states 〈𝐶𝐶𝑆𝑆 = 𝛼𝛼𝐶𝐶11 , 𝐶𝐶12 , … , 𝐶𝐶𝑝𝑝𝑝𝑝 〉 in a
dynamic system has the form: 𝑌𝑌 = 𝐴𝐴𝑆𝑆 × {𝑈𝑈𝑖𝑖 }, 𝑦𝑦(𝑡𝑡) = 𝜙𝜙: (𝑇𝑇 × 𝑇𝑇 × 𝑋𝑋 × Ω), Ω: {𝜔𝜔: 𝑇𝑇 → 𝑈𝑈}/
   Let one construct a diagram for an energy-active object of a dynamic system, taking into
account the channels of action of active threats (Fig. 2).
Figure 2: Diagram of transformations in the energy-active system under threats

     Fig. 2 shows the following designations: {𝑥𝑥𝑖𝑖 } are input flows and their parameters; {𝐴𝐴 𝑇𝑇𝑇𝑇 }
are operators of technological transformations under the influence of input parameters;
(𝐴𝐴 𝑇𝑇𝑇𝑇 , 𝑃𝑃 → 𝑉𝑉𝐾𝐾 ) are functions of energy transformations; (𝐸𝐸𝐾𝐾 → 𝐸𝐸𝐸𝐸 ) are kinetic and,
accordingly, electromagnetic operators of energy transformations; IMS are information and
measurement systems.
     The channels of resource and information attacks (𝐴𝐴𝑅𝑅 , 𝐴𝐴𝐼𝐼 ) have a complex structure and
their representations, methods of influencing the system and the identification require a
systematic and categorical approach.
     The decomposition procedure will be carried out for a complex dynamic system IIS with a
hierarchical structure into subsystems, blocks and aggregates:

                                                                              𝑑𝑑=1,𝑐𝑐
               〈𝐼𝐼𝐼𝐼𝐼𝐼〉 → �𝐴𝐴𝑖𝑖𝑖𝑖 |𝑛𝑛𝑖𝑖=1,𝑗𝑗=1
                                          𝑚𝑚
                                               � → �𝐵𝐵𝑘𝑘𝑘𝑘 |𝑙𝑙=𝑚𝑚1
                                                            𝑘𝑘=1,𝑛𝑛 ��𝐷𝐷𝑟𝑟𝑟𝑟 |𝑟𝑟=1,𝑧𝑧 � → {𝐴𝐴𝐴𝐴𝐴𝐴𝐴𝐴𝐴𝐴𝐴𝐴𝐴𝐴𝐴𝐴𝐴𝐴𝐴𝐴𝐴𝐴}.   (2)
   Accordingly, a scheme of internal and external connections of aggregate and hierarchical
subsystems is obtained when resource and information flows are transformed (Fig. 3).




Figure 3: Categorical structure of a time-dynamic complex system

   Procedures for forming the structure of the object are constructed using data and
knowledge processing processes in accordance with the problem based on the concept of
systemology and categories. From the structure of the man-made system, the basic structures
are singled out that describe and show the functions, targets and dynamics of the object
according to the specific target task it performs {𝐶𝐶𝑖𝑖 }.
    To achieve the target task in the system, the basic functional structure of the control object
is selected, which at its level ensures the achievement of the target:

                                             𝑃𝑃𝑑𝑑
                                    {𝑆𝑆𝑖𝑖+3 } �� �𝑆𝑆𝑖𝑖+2 |𝐶𝐶𝑖𝑖+2 |�𝐴𝐴𝑖𝑖𝑖𝑖 |𝑖𝑖 = 1, 𝑛𝑛��,                          (4)
                                                                                           𝑃𝑃𝑑𝑑
due to the decomposition procedure of the system into aggregates {𝑆𝑆𝑖𝑖+2 } �� �𝐴𝐴𝑖𝑖𝑖𝑖 �.
   To get further information about the functional structure of the technological object and
the control process, the aggregates are decomposed into components with selected and
predefined spaces of states, targets, modes and parameters in Fig. 4.




Figure 4: System structure of the dynamics of the hierarchy functioning

     Designations in Fig. 3, 4: (𝑆𝑆, 𝜑𝜑, 𝑓𝑓𝛼𝛼 ) are dynamic characteristics of the function; (𝐾𝐾𝑡𝑡 , 𝐾𝐾𝑢𝑢 , 𝐾𝐾𝜏𝜏 ) are
class models of process trajectories at the input and output of the system; (𝑆𝑆, 𝜏𝜏, 𝑋𝑋) is the division
of the space of states into alternatives; (𝑉𝑉𝐶𝐶𝐶𝐶 , 𝑉𝑉𝑟𝑟 , 𝑉𝑉𝑧𝑧 ) are areas in the space of targets, mode, state of
the object and system; (П𝐶𝐶𝐶𝐶 , П𝑍𝑍 , П𝑌𝑌 ) are spaces of states, targets, the initial parameter Y;
(𝑆𝑆𝑆𝑆𝑆𝑆П𝐶𝐶𝐶𝐶 , 𝑆𝑆𝑆𝑆𝑆𝑆П𝑆𝑆𝑆𝑆 ) are situations in the space of targets and states according to (𝑍𝑍).




Figure 5: Categorical representation of the model of threat action on the system
    On the basis of the given description of the categorical structure of the system in the
terminal time base and the system structure of dynamics, a categorical representation of the
action model of active threats to the system (informational and resource) is developed (Fig. 5).
    Designations in Fig. 5: 𝐺𝐺𝐺𝐺𝐺𝐺𝑡𝑡𝑟𝑟 is a generator of the trend of changes in the constant
component of the reliability of aggregates; 𝐺𝐺𝐺𝐺𝐺𝐺𝐺𝐺(𝑡𝑡) is a generator of impulse discrete active
influence on the object of the structure of the document management system, 𝐶𝐶𝐹𝐹 is a targets.

4. Experimental research
To assess the parameters of the system dynamics, under the control action and the influence
of threats, a parametric-temporal representation of the behavior of structure objects in the
spaces of input parameters, control, the mode of the object according to the load and changing
its trajectory is used based on the analysis of the interaction balance  (Fig.
6), that is, the system information-resource game.




Figure 6: Structural diagram of balance of game between threats and control in the system

     Accordingly, such an approach requires additional experimental research into the structure
of threat factors, information attacks, and transfer channels of actions from their influence.
     The function of the state, mode, and their trajectory in the state space and the target is
determined based on the balance between the action of threats and control on the system,
which, accordingly, leads it to deviate from the target movement in the state space (Fig. 6).
     Designations in Fig. 6: ACS-TP is an automated control system of the technological process;
{𝑉𝑉𝐶𝐶𝐶𝐶 , 𝑉𝑉𝑟𝑟 , 𝑉𝑉𝑍𝑍 } is an area of interaction between control and threats; {𝐹𝐹𝑖𝑖 } are factors of threats
and influence on the system objects.
     According to the structural diagram (Fig. 6) of the balance between threats and the control
process in the system, in the mode of the information-system game, a functional diagram of
the information-resource hierarchy of control of the aggregated system is constructed in the
mode of countering threats (Fig. 7).
   The following main systems in the structure of the game are highlighted:

   •    a man-made aggregated system with control hierarchy;
   •    a system of external influence 𝑆𝑆𝑟𝑟 with a subsystem of active attacks 𝑆𝑆𝑍𝑍𝑍𝑍 which forms a
        complex of interrelated factors of influence on the aggregate sub-structure, as well as
        information and management, strategic one.

   Based on the game concept, a functional scheme of active countermeasures against threats
and attacks is developed (Fig. 7).




Figure 7: Functional scheme of information-resource countermeasures against threats in the
hierarchy of a man-made system

   The designations in Fig 7: {𝐹𝐹𝑛𝑛𝑛𝑛 } are factors of external influence; 𝐼𝐼𝐴𝐴𝑖𝑖 is an information
attack; SAC is a system of automated control of aggregated sub-structure {𝐴𝐴𝐺𝐺𝑖𝑖 |𝑛𝑛𝑖𝑖=1 }IMS is an
information measuring system; П𝑅𝑅(𝑅𝑅𝑚𝑚 , 𝑅𝑅𝑇𝑇 , 𝑅𝑅𝐸𝐸 ) is a flow of technological and energy
resources; �П(𝑍𝑍), П(𝐶𝐶)� re spaces of states and the system targets; 𝐶𝐶𝐶𝐶𝐶𝐶𝐶𝐶𝐶𝐶(𝑍𝑍𝐶𝐶𝐶𝐶 ) is a
coordination of targets in the mode of threats; (𝐵𝐵𝐵𝐵𝐵𝐵, 𝐷𝐷𝐷𝐷𝐷𝐷) are data and knowledge bases of
automated document management system, 𝐺𝐺𝐺𝐺(𝑡𝑡𝑖𝑖 ) is an activator of attacks.
   According to the functional scheme of the information-resource hierarchy, the
substructure (𝑆𝑆𝑍𝑍𝑍𝑍 ) of the attack initiation system is considered, which includes: (𝑅𝑅𝐴𝐴𝑖𝑖 ) attack
resources; 𝐼𝐼𝐴𝐴𝑖𝑖 an initiator of attacks; 𝐶𝐶𝑍𝑍𝑍𝑍 the target task of the attack; 𝑆𝑆𝐹𝐹 a complex formation
of threat factors, which reflect the activation process and the action of influencing factors on
the system control.
    In accordance with the strategy of the information-resource game, a categorical diagram of
the attack on the ACS is constructed (Fig. 8).




Figure 8: Categorical diagram of an information attack

    Designations in Fig 8: 𝐴𝐴𝑟𝑟𝑟𝑟 is an attack activator; 𝐺𝐺𝑉𝑉𝑉𝑉 is a generator of a random process
𝐺𝐺(𝑡𝑡, 𝜏𝜏); 𝑅𝑅𝑅𝑅𝑒𝑒 is an energy attack resource; 𝑅𝑅𝑅𝑅𝑖𝑖 is an information attack resource; 𝐾𝐾𝑚𝑚 is a
component modulator; 𝐺𝐺𝐺𝐺(𝐷𝐷𝑖𝑖 ) is a generator of active action; 𝐺𝐺𝐺𝐺(𝑍𝑍𝑎𝑎 ) is a generator of target
task of an active threat, attack; ⊗ 𝐾𝐾𝐾𝐾(𝐹𝐹𝑖𝑖 ) is a component shaper of the factor (of the
information-resource class); 𝐴𝐴(𝐷𝐷𝑖𝑖 ⁄𝐹𝐹𝑖𝑖 ) is an activator of the factor action on the system; 𝐾𝐾𝑉𝑉𝑉𝑉 is
a channel of influence on the ACS system.
    To obtain the control situational information about the object state, it is necessary to
decompose the object into the following components, which ensure the achievement of the
local target:

                                         𝑃𝑃𝑑𝑑                 𝑃𝑃𝑑𝑑
                                {𝑆𝑆𝑖𝑖+1 } �� �𝑆𝑆𝑖𝑖+1 |𝐶𝐶𝑖𝑖+1 | �� �𝐴𝐴𝑖𝑖𝑖𝑖 → �𝐵𝐵𝑖𝑖𝑖𝑖 ���.

   At the lower level of the object states 〈𝑆𝑆𝑖𝑖+3 , 𝑆𝑆𝑖𝑖+2 , 𝑆𝑆𝑖𝑖+1 , 𝑆𝑆𝑖𝑖 〉the process of identification of
elementary structures and knowledge is carried out, which reflect the peculiarities of the
                              𝑗𝑗+1,𝑘𝑘
complex functioning �𝐷𝐷𝑖𝑖𝑖𝑖 |𝑖𝑖=1,𝑛𝑛 �.
   To analyze the general state of the system, taking into account the above, it is not possible
to present the information essence of the situation that has developed in the system (Fig. 9).
   In Fig. 9, the following information-resource components and procedures are denoted:

   •    the procedure for identifying a critical situation in the object under external influences
        and attacks on the control structure [4];
   •    the procedure for forming a target task to resolve a critical situation;
   •    the procedure for selecting the method of identifying the situation and state for
        comparison, research and formation of information about the critical state in the data
        and knowledge base;
   •    the implementation of a system model of the process of solving critical situation
        identification problems using an intelligent logical system processor (ILSP) according
        to [5];
   •    the procedure for assessing the dynamics of changes in the state of the object using an
        intelligent research agent to identify risk factors. affiliation mark: a superscript
        number following the author's last name.
Figure 9: General diagram of a dynamic hierarchical subsystem with internal aggregate
connections

4.1. Results
The evaluation of the results of the objects and aggregates state can be carried out using
systemology, information technology and intelligent decision-making procedures and rules in the
control process, which ensure the achievement of the target in the mode of the current situation
assessment. The use of systemology methods is used to create a theoretical representation of the
formation of the object structure, to determine the space of its possible states and changes in the
object under the influence of threat factors in the target control process. With the help of the
concepts developed in works [3-5], let us consider the component structure of a man-made
system and the interaction of information, resource and energy flows that determine the
general state of a dynamic system.
   Common components of a dynamic system with a hierarchical structure include (Fig. 10):

   •   aggregates, blocks, energy-active objects that ensure the process of resource
       transformation into energy and are characterized by the operating mode and
       dynamics;
   •   dynamic characteristics of technological processes at all stages of functioning (power,
       mode: limit - standard);
   •   information control procedures and algorithms for describing situations, data flows in
       the control process.

   Resource, information, control, dynamic processes, channels of flows transfer and
exchange cannot be isolated using classical technologies of synthesis and analysis of systems,
which in turn complicates the process of identifying crisis nodes and channels through which
the redistribution of resources, energy, data flows and control teams occurs. That is, with the
help of classical methods and technologies, in the structure of a man-made system it is
impossible to single out agents of influence on the way the system functions, the most
vulnerable places of attacks on the control process and system goals, therefore it is impossible to
describe the control process using game models. To solve the problem, the concepts of target-
oriented systemology of constructing the structure of the object and assessing the dynamic state
are developed as a basis for forming a strategy of active game against threats (Fig. 10).




Figure 10: Systemology of object structure formation and the dynamic state assessment
under resource threats and information attacks

      The designations in Fig. 10: IA an intelligent agent; Fci a target activation factor; DKMS a
database and knowledge management system; ILSSP an intelligent logic synthesis system
processor; 𝑈𝑈𝑈𝑈𝑈𝑈(𝑆𝑆𝑆𝑆𝑆𝑆(𝐶𝐶𝐶𝐶⁄𝑡𝑡)𝜏𝜏) a unit for processing the system situation in the control object
(𝐶𝐶𝐶𝐶) at the moment of time t in the interval 𝜏𝜏; 𝐼𝐼𝑘𝑘 a criterion of quality requirements; 𝐼𝐼̂𝑘𝑘
current quality; 𝐼𝐼𝑒𝑒 reference quality; 𝐻𝐻𝑖𝑖 : �𝐼𝐼̂𝑘𝑘 ≥ 𝐼𝐼𝑘𝑘 � ⇒ [𝑆𝑆𝑆𝑆𝑆𝑆𝑆𝑆𝑆𝑆𝑆𝑆(𝐶𝐶𝐶𝐶) ↔ 𝑅𝑅(𝐹𝐹𝐶𝐶𝐶𝐶 )] compliance of
the synthesis product to the target task; 𝐼𝐼𝑑𝑑 a quality criterion in the system dynamics process;
𝐹𝐹𝐴𝐴∗ a factor of influence activation on the system.
    Based on the systemology of the formation of the structure of the man-made system, a
model of the hierarchy of the control process and the channels of transfer of threats and
attacks is developed, which includes the following levels (Fig. 10): 𝑅𝑅1 - models of the man-
made process (active, thermodynamic, physical); 𝑅𝑅2 - the level of automatic control; 𝑅𝑅3 - the
level of operational control; 𝑅𝑅4 - the level of threats to the control; 𝑅𝑅5 - the level of threats to
the target orientation of the control system; 𝑅𝑅6 - the level of information assessment of the
dynamic situation in the system; 𝑅𝑅7 - a mathematical apparatus for analyzing the structure
and the system dynamics under threats in the target control process; 𝑅𝑅8 - the level of
formation of the target control task in the conditions of threats; 𝑅𝑅9 - the level of processing of
situational information under threats (USP - a unit of signals processing); 𝑅𝑅10 - the level of the
model of the process of solving a problematic situational problem; 𝑅𝑅11 - the level of project
formation of the defense system against attacks and threats.
    Based on the system method of forming the security system structure, a hierarchical
structure of the man-made complex control system under threats is constructed (Fig. 11).




Figure 11: Hierarchical structure of the technological complex control system at risk
    In the man-made hierarchy (production, transport, organizational-administrative control
units, printing industry, media), the formation of the structure of the security system is based
on systemology and methods of target-oriented decision-making to solve the problems of
crisis situations.
    Let me emphasize the security features of document circulation when formulating control
decisions at the techno-aggregate, operational, administrative, and strategic levels (Fig. 11):

   𝑅𝑅1 - a technological structure, which is provided by normative and regulatory documents;
   𝑅𝑅2 - documents of current control and data storage from information and measurement
systems;
   𝑅𝑅3 - operational control documents and mode maps and reports for ACS-TP;
   𝑅𝑅4 - documents and reports in the operational-administrative control system;
   𝑅𝑅5 - documents that determine the strategic control of the man-made complex;
   𝑅𝑅6 -documents of the strategic level for forecasting the situation and target orientation of
the man-made complex;
   𝑆𝑆𝑑𝑑𝑑𝑑 ⁄𝐼𝐼𝑑𝑑𝑑𝑑 - the core of controlling data exchange processes; DS - diagnostic system for ACS-
TP; MT - management team; DM - decision-making; 𝐼𝐼𝑇𝑇𝑖𝑖 - information threats.

   To develop systems for the protection of the strategic structure and the design process, it is
necessary to take into account the peculiarities of data accounting between all levels, which
are the basis for the formation of documents (correction, management, coordination, target
orientation, assessment of situations in the system), which determines the appropriate
protection measures.

4.2. Discussion
A methodology for constructing categorical representations of models, structures,
components, and systems, which is necessary for detecting the coordinates of intrusion
attacks, is proposed, and a generalized representation of structures in a hierarchical system in
the category algebra is substantiated. This makes it possible to detect vulnerabilities and
threats that lead to information and resource attacks, and as a result - emergency situations in
the process of functioning and control of complex hierarchical systems.
   When assessing the parameters of the system dynamics, in the process of controlling
hierarchical structures and the influence of active threats, a parametric-temporal
representation of the behavior of the structure objects in the spaces of input parameters,
control, mode of the object according to the load and change of its trajectory is used. Based on
the analysis of the interaction balance  in the form of a system
information-resource game and the study of the functioning of the hierarchical system on a
certain terminal cycle, it is found that the game model coincides with the real processes of
man-made system control under threats. Based on this, a structural diagram of the balance
between threats and control in the system is developed and substantiated, an aggregate
diagram of a hierarchical system with internal connections is constructed to identify the cores
of attacks on it, which can be used in the context of decision-making support.
   A method of structuring man-made systems is developed based on the assessment of the
dynamics of changes in the state of objects to identify critical situations in the form of attacks
and negative disturbances on the control process and structural organization of man-made
systems. It is shown that the risks of accidents are determined on the basis of the assessment
of changes in the state of objects relative to standards, specified limits and normative modes
of the system functioning in the conditions of transition of the trajectory of the state through
the limit line of the functioning mode of the energy-active object.
    The general concept of this approach can be applied to any company and man-made
structure with a hierarchical control structure. Quantitative estimates of losses obtained
according to the analysis of possible threats and vulnerabilities are submitted to the input of
the model, for example, organizational assets, cognitive characteristics of factors affecting the
man-made structure, taking into account risk coefficients, characteristics of various control
risk components and linguistic considerations of experts in the field of security and system
control and decision-making. Risks of production losses are formed in the terminal production
cycle and can also be changed under the influence of active threats in the production and
control process. It is necessary to take into account all the threats and vulnerabilities of such
man-made hierarchical systems, and only then it is possible to determine a comprehensive
indicator of the risk of system failure under the influence of active threats.

5. Conclusions
The paper solves the scientific and applied task of developing a methodology for constructing
a model of the structure of hierarchical control systems of complex man-made objects under
threats and attacks based on the use of the category algebra. The possibility of constructing
procedures for the structuring of man-made systems (current and at the design stage) is
substantiated based on the use of system analysis and the theory of categories.
   The scientific novelty of the study is as follows:

   1. for the first time, categorical structural diagrams of transformations in an energy-
   active system under threats, in the space of states and dynamics in time of a complex
   system are developed;
   2. the categorical representation of the model of the effect of threats on the system is
   improved and a structural diagram of the game between threats and the control process in
   the hierarchical system is developed;
   3. for the first time, a functional scheme of information-resource countermeasures
   against threats in the hierarchy of man-made systems is developed;
   4. for the first time, the hierarchical structure of a technological complex control system
   is developed under risk conditions;
   5. the proposed categorical representations for assessing the risk of failure of the control
   system and document flow are tested and verified as part of a hierarchical production
   system for the example of risk assessment of printing productions, and also a system-
   category diagram of interaction is proposed as a training in the information-resource game
   .

   The practical significance of the obtained results is that the proposed method of
determining the coordinates of attacks based on changes in the state of objects in a dynamic
hierarchical system allows determining the risk of emergency situations, which has been
tested in the control and document management system as part of the hierarchical system of
printing production and can be used in various man-made hierarchical systems when solving
control decision-making tasks, designing and improving protection systems.
   Further research of the problem can be seen in the development of software for assessing
the risk of system functioning under the influence of active threats to man-made hierarchical
structures.

References
[1] Y. Ya. Bobalo, I. V. Gorbaty, A. P. Bondarev. Information security. Lviv: Lviv Polytechnic
     University, 2019.
[2] V. Khoroshko, M. Brailovskyi, M. Kapustian. Multi-criteria assessment of the correctness of
     decision-making in information security tasks. International scientific journal «Computer
     systems and information technologies», 4 (2023): 81-86, doi:10.31891/csit-2023-4-11
[3] F. J. Folgado, D. Calderón, I. González, A. J. Calderón. Review of Industry 4.0 from the
     Perspective of Automation and Supervision Systems: Definitions, Architectures and Recent
     Trends. Electronics 13,782 (2024): 1-33, doi:10.3390/electronics13040782
[4] V. Sabat, L. Sikora, B. Durnyak, V. Matsiuk, P. Hibey. Methods for assessing the risk of an
     emergency in the security system for the information complex of printing enterprises.
     IntelITSIS’2024: 3rd International Workshop on Intelligent Information Technologies and
     Systems of Information Security. Khmelnytskyi, Ukraine, V. 3675 (2024): 305-317,
     https://ceur-ws.org/Vol-3675/paper22.pdf
[5] A. Veloni, N. Miridakis. Digital Control Systems Theoretical Problems and Simulation
     Tools. CRC Press, 2021.
[6] V. Sabat, B. Durnyak, L. Sikora, V. Polishchuk. Research on the assessment of the risk
     situations emergence for automated control systems of the metallurgical industry
     companies. Acta Montanistica Slovaca. 28(1) (2023): 201-213, doi:10.46544/AMS.v28i1.16.
[7] ISO/IEC           27001:2022(en).       Online         Browsing        Platform      (OBP),
     https://www.iso.org/obp/ui#iso:std:iso-iec:27001:ed-3:v1:en
[8] Min Jin. Computer Network Information Security and Protection Strategy Based on Big
     Data Environment. International Journal of Information Technologies and Systems
     Approach, 16(2) (2023): 1-14, doi:10.4018/IJITSA.319722
[9] Jiaqi Sun. Computer Network Security Technology and Prevention Strategy Analysis.
     Procedia Computer Science, 208 (2022): 570-576, doi:10.1016/j.procs.2022.10.079
[10] Yuqian L., Xun X., Lihui W. Smart manufacturing process and system automation - A
     critical review of the standards and envisioned scenarios. Journal of Manufacturing
     Systems, 56 (2020): 312-325, doi:10.1016/j.jmsy.2020.06.010
[11] V. Sabat, B. Durnyak, M. Kulynych, O. Havrylyshyn, P. Hibey. Using semantic analysis of
     document text in building risk models in the threats system. IntelITSIS’2024: 3rd
     International Workshop on Intelligent Information Technologies and Systems of
     Information Security. Khmelnytskyi, Ukraine, V. 3675 (2024): 330-342, https://ceur-
     ws.org/Vol-3675/paper24.pdf
[12] Ch. Milioti, K. Kepaptsoglou, A. Deloukas, E. Apostolopoulou, Valuation of man-made
     incident risk perception in public transport: The case of the Athens metro, International
     Journal of Transportation Science and Technology, 11(3) (2022): 578-588,
     doi:10.1016/j.ijtst.2021.07.003
[13] F. Sicard, É. Zamai, J. M. Flaus. An approach based on behavioral models and critical states
     distance notion for improving cybersecurity of industrial control systems. Reliab Eng Syst
     Saf, 188 (2019): 584-603, doi:10.1016/J.RESS.2019.03.020
[14] A. Cormier, C. Ng. Integrating cybersecurity in hazard and risk analyses. J Loss Prev
     Process Ind, 64 (2020), Article 104044, doi:10.1016/j.jlp.2020.104044
[15] D. H. Alahmadi, A. A. Jamjoom. Decision support system for handling control decisions
     and decision‑maker related to supply chain. Journal of Big Data, 9:114 (2022): 1-14,
     doi:10.1186/s40537-022-00653-9
[16] V. Domeh, F. Obeng, F. Khan, N. Bose, E. Sanli, Risk analysis of man overboard scenario in
     a     small      fishing     vessel.    Ocean      Engineering,      229      (2021)    108979,
     doi:10.1016/j.oceaneng.2021.108979
[17] J. Alanen, J. Linnosmaa, T. Malm, N. Papakonstantinou, T. Ahonen, E. Heikkilä, R.
     Tiusanen, Hybrid ontology for safety, security, and dependability risk assessments and
     Security Threat Analysis (STA) method for industrial control systems. Reliability
     Engineering & System Safety, 220 (2022) 108270, doi:10.1016/j.ress.2021.108270
[18] V. Agrawal, A comparative study on information security risk analysis methods. In:
     International Conference on Computer Science and Information Technology (ICCSIT 2015)
     At: Amsterdam 12 (2017): 57-67, doi:10.17706/jcp.12.1.57-67
[19] F. De Rosa, N. Maunero, L. Nicoletti, P. Prinetto, M. Trussoni, Ontology for Cybersecurity
     Governance of ICT System s. ITASEC'22: Italian Conference on Cybersecurity, June 20-23,
     2022, https://ceur-ws.org/Vol-3260/paper4.pdf
[20] T. Zhou, M. Modarres, E. L. Droguett, Multi-unit nuclear power plant probabilistic risk
     assessment: a comprehensive survey. Reliab Eng Syst Saf, 213 (2021), Article 107782,
     doi:10.1016/j.ress.2021.107782.
[21] M. Modarres, T. Zhou, M. Massoud, Advances in multi-unit nuclear power plant
     probabilistic risk assessment. Reliab Eng Syst Saf, 157 (2017): 87-100,
     doi:10.1016/j.ress.2016.08.005
[22] J. Kim, A.U.A. Shah, H.G. Kang, Dynamic risk assessment with bayesian network and
     clustering analysis. Reliab Eng Syst Saf, 201 (2020), 106959, doi:10.1016/j.ress.2020.106959
[23] J. DeJesus Segarra, M. Bensi, M. Modarres. A bayesian network approach for modeling
     dependent seismic failures in a nuclear power plant probabilistic risk assessment. Reliab
     Eng Syst Saf, 213 (2021), Article 107678, doi:10.1016/j.ress.2021.107678
[24] M. Cepin, R. Bris, Safety and Reliability. Theory and Applications. CRC Press. 2017,
     doi:10.1201/9781315210469
[25] M. A. Dorna, L. C. Ribeiro, H. S. Schuffner, M. P. Liborio & P. I. Ekel. Fuzzy-Set-Based
     Multi-Attribute Decision-Making, Its Computational Implementation, and Applications.
     Axioms 13(3) (2024): 142, doi:10.3390/axioms13030142