=Paper= {{Paper |id=Vol-3736/paper22 |storemode=property |title=Architecture of the system with a subsystem of providing fault tolerance, survivability and information protection of specialized information technology |pdfUrl=https://ceur-ws.org/Vol-3736/paper22.pdf |volume=Vol-3736 |authors=Vasyl Stetsyuk,Mykola Stetsyuk,Yuriy Stetsyuk,Оleksandr Kozelskiy,Piotr Gaj |dblpUrl=https://dblp.org/rec/conf/icyberphys/StetsyukSSKG24 }} ==Architecture of the system with a subsystem of providing fault tolerance, survivability and information protection of specialized information technology== https://ceur-ws.org/Vol-3736/paper22.pdf
                                Architecture of the system with a subsystem of
                                providing fault tolerance, survivability and
                                information protection of specialized information
                                technology
                                Vasyl Stetsyuk 1*, †, Mykola Stetsyuk 1, †, Yuriy Stetsyuk 1, †, Оleksandr Kozelskiy 1,
                                †, and Piotr Gaj 2, †.


                                1   Khmelnitsky National University, Khmelnitsky, Instytutska street 11, 29016, Ukraine
                                2 Silesian University of Technology, ul. Akademicka 2A, 44-100 Gliwice, Poland
                                1


                                                  Abstract
                                                  The construction of a model of a typical architecture of information technology for the construction
                                                  of specialized information systems intended for the automation of information processing processes,
                                                  management processes and decision-making processes based on a spatially distributed multi-machine
                                                  system that provides a high level of fault tolerance, survivability and information protection is
                                                  considered. The classification and structure of the information system, which has a multi-level
                                                  organization of interacting hardware and software tools, as well as the features of such an
                                                  organization when building a subsystem to ensure fault tolerance, survivability and protection of
                                                  information in a distributed information system of specialized application, are given. Methods of
                                                  implementation of mechanisms for ensuring fault resistance, survivability and protection of
                                                  information are considered and classified, with their presentation in a general model of a specialized
                                                  information system. It is shown that the most urgent problem of the construction of the considered
                                                  systems is the creation of a method that is a general approach to the construction of highly adaptive
                                                  systems with increased fault tolerance, survivability and protection of the information processed in
                                                  them. A key aspect, according to the generalized method, is the creation of a system architecture that
                                                  can adapt to the requirements of a specific specialized IS. The IS architecture development process
                                                  itself will include the implementation of two stages. This approach to the development of IS made it
                                                  possible to ensure the implementation of such general requirements for the construction of systems
                                                  as systematicity, openness, compatibility, unification and efficiency. As a result, an IS architecture
                                                  was obtained in which a rational ratio between costs and target effects was achieved.


                                                  Keywords
                                                  IS architecture, information technology, fault-tolerant system, survivability of systems, information
                                                  protection, information system.




                                ICyberPhyS-2024: 1st International Workshop on Intelligent & CyberPhysical Systems, June 28, 2024, Khmelnytskyi,
                                Ukraine
                                ∗ Corresponding author.
                                † These authors contributed equally.

                                    swmua@khmnu.edu.ua (V. Stetsyuk); mykola.stetsiuk@khmnu.edu.ua (M. Stetsyuk);
                                yuriy.stetsuk@khmnu.edu.ua (Y. Stetsyuk); oleksandr.kozelskiy@khmnu.edu.ua (О. Kozelskiy); piotr.gaj@polsl.pl
                                (P. Gaj)
                                    0000-0001-9880-2666 (V. Stetsyuk ); 0000-0003-3875-0416 (M. Stetsyuk); 0000-0003-0312-2276 (Y. Stetsyuk);
                                0009-0002-7157-6499 (О. Kozelskiy); 0000-0001-5647-9979 (P. Gaj )
                                             © 2023 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0).




CEUR
                  ceur-ws.org
Workshop      ISSN 1613-0073
Proceedings
1. Introduction
The modern level of development of computing facilities and their wide implementation in all
areas of human activity increasingly require the creation of computing facilities with a high
level of fault tolerance, survivability and information protection. A high level of resistance to
destabilizing factors is, in principle, desirable for all types of computing devices, but this
requires significant additional technical, software, and financial costs. In this regard, computing
devices with high levels of fault tolerance and survivability are used mainly in critical areas
where the failure of computing devices leads to severe consequences. Basically, these areas are
limited by the following factors:

   •    creating a threat to people's lives;
   •    entails severe economic consequences;
   •    violation of the functioning of complex autonomous technical objects.

    The revolution in the field of information technologies has led to the fact that many aspects
of the activities of human society have become critically dependent on various means, such as
electronic devices in general and computer systems, in particular, data storage (including cloud),
various hardware and mathematical support for the functioning of artificial intelligence etc.
Their successful work requires such qualities as fault tolerance, reliability, availability and
information security. The survivability of mission-critical information systems involves the
ability to maintain uninterrupted operation in the face of severe failures, to fail smoothly when
critical conditions are reached, and to maintain the ability to restore normal service after failures
are resolved.
    Not only information technologies, but also malicious software are in constant development.
This, in turn, leads to increased demands from users for fault-tolerant functioning, survivability
of systems and ensuring information protection. In a society where information gradually
acquires the quality of the main value, its loss or distortions are unacceptable.
    The analysis of the situation that has developed directs the course of events to the creation
of countermeasures, namely the development of a comprehensive system that was able to
simultaneously address the problems of fault tolerance, survivability and protection of
information at all levels of the information system, but in such a way that the information
systems themselves would remain financially affordable. The task of building a functionally
stable architecture, which is a complex system that actively interacts with the external
environment and functions under the influence of random factors, the presence of adverse
effects of various nature and the high cost of the consequences of malfunctions, cannot be
solved by simply improving the indicators of reliability, fault tolerance or security.

2. Analysis of known solutions
Durability is an important, albeit non-functional property of the life cycle of specialized
information systems [1]. Their survivability elements include the ability of systems to recognize
attacks on them and other situations critical to their functioning with the ability to resist them,
adapt to avoid them, and change their behavior to reduce the consequences of similar events in
the future.
    Thus, the vulnerability of using a combination of username and password to access network
resources is noted due to a possible coincidence of circumstances, when the repeated use of the
password when accessing the services of a dubious provider is combined, which can lead to the
theft of corporate and personal data. Therefore, given the fact that more and more public
services carry out their activities using the Internet [2, 3], more and more developers, given the
importance of the issue, offer a number of their alternative approaches, such as two-factor
authentication with detailed biometric verification, individual certificates users, a single sign-
on system (known as SSO) and the application of credentials based on privacy-enhancing
attributes (P-ABC technology) [4, 5].
    Solutions based on P-ABC are reliably protected, provide privacy, but are cumbersome to
use; while SSO provides a more convenient solution, but in turn requires a guaranteed trusted
identity provider, as it examines all online user activities. To some extent, this can be facilitated
by the use of a distributed identity management system within the OLYMPUS system, which
will avoid the need for a single trusted party.
    Symmetric searchable encryption (SSE), which is widely used in encrypted databases for
keyword queries, has been reported to suffer from information leakage. Most existing forward
and reverse SSE schemes only consider a single data source model, which is not practical in
scenarios where data is distributed across multiple devices. An efficient forward and reverse
private SSE scheme for multiple data sources (FBSSE-MDS) is proposed in [6]. It is the first
efficient SSE scheme that supports both forward privacy and BP-II reverse privacy (the second
level of reverse privacy) in the case of multiple data sources.
    In [7, 8] it is proposed to use matrix numerical methods for symmetric cryptography, known
as Gauss-Jacques and Gauss-Jordan methods with explicit modularization. Both of them can be
used to process private keys, which is vital from the point of view of information security and
protection, which provide lower computational cost and complexity.
    The use of deliberate error attacks on electronic devices while they are executing a
cryptographic algorithm, resulting in a crash, is becoming widespread. The attacker repeatedly
repeats them in order to obtain valuable information. A new countermeasure is presented in [9]
that applies to cryptographic primitives that use permutation with nearly shift-invariant
circular functions during multiple executions of the same algorithm.
    Firewalls are designed to identify and block potentially malicious incoming traffic based on
a predefined set of rules. But with the development of attack tactics, it becomes more difficult
to distinguish between anomalous traffic and normal traffic. The application of the hybrid
metaheuristic method [10] for intrusion detection systems (IDS), implemented as a
metaheuristic Bat algorithm, which ensures the selection of sixteen features, did not give the
desired result due to high time consumption.
    Cybersecurity issues have also been on the rise over the years, the most prominent of which
is phishing attacks, where malicious websites impersonate legitimate websites in order to obtain
the data of gullible users needed for unauthorized access. Current countermeasures, such as
anti-phishing software and machine learning (ML) techniques, have proven ineffective in
detecting phishing activities on one hand. On the other hand, hackers are developing new ways
to bypass these countermeasures. Given the dynamism of phishing attempts, it is necessary to
look for innovative and effective solutions to detect website phishing. New research [11]
proposes a tree-based logistic model based on rotated forest (RF-LMT) to detect sophisticated
website phishing. LMT is a technology that combines logistic regression and a generalized
model tree. LMT is a technique that combines logistic regression and single model tree
inference. Three datasets with different instance distributions, both balanced and unbalanced,
are used to investigate the RF-LMT model. From the results, it is found that LMT performs better
than the selected base classifiers.
    In [12], the technique of dynamic detection of malicious software based on signatures when
tracing API calls is given.
    An ever-increasing problem is the use of DDoS attacks by attackers [13, 14]. Using a huge
number of distributed, but coordinated in their actions, botnets have become one of the most
complex cyber threats. Existing botnet detection approaches cannot detect unknown botnet
threats and are time-consuming [15].
    New blocking approaches are proposed that are used to detect and effectively prevent the
propagation of botnets in software-defined networks. Its content is determined by connections
in the botnet network and its intellectual blocking. A cheat system is also proposed, based on
two goals: to reduce the botnet's infection rate and to waste the attacker's time.
    There are more and more questions about security against internal threats [16]. Traditional
approaches to detecting anomalies in systems based on sets of rules generate a large number of
messages that are difficult to adapt to specific situations. The introduction of MUEBA's multi-
model system for spatio-temporal analysis, which combines individual historical user analysis
and group analysis to detect insider threats, improved the situation, but did not eliminate it.
    In [17], a system architecture is proposed, which uses virtual machines, which can be used
in the implementation of software fault-tolerant systems. The top level in its hierarchy details
the recovery actions implemented by the various policies such as N-modularity, transparent
coordination of developer efforts, robust procedures, and optimistic recovery that such a
framework enables.
    In [18], neural architectures are proposed for increasing fault tolerance. First, according to
real deployment scenarios, the computation errors and weight errors are formalized, which are
modeled by Multiply-Accumulate (MAC)-independent and identically distributed Bit-Bias
(MiBB) model and Stuck-at-Fault (SAF) model in accordance. In the following, a multi-objective
NAS framework is established based on failure models to identify high-performance and fault-
tolerant replicable architectures. In addition, fault-tolerant training (FTT) is incorporated into
the search process to further improve the fault-tolerance of iterative architectures.
    The field of the Internet of Things (IoT), as noted in [19, 20, 21], has grown exponentially,
and today it is a new field of application of specialized information systems. The IoT
architecture includes a variety of sensors, actuators, radio frequency and wired network
channels [23]. A failure in IoT can occur at any level of its architecture. The application of fault-
tolerant data distribution plays an important role for IoT-enabled systems in ensuring quality
of service (QoS). This will reduce latency, reduce power consumption, and maximize
throughput. For this purpose, a systematic review of data aggregations, data dissemination and
independent mechanisms is used. Data distribution becomes efficient when data aggregation,
error detection, and fault tolerance are performed at the same communication layer. Many
developers have theoretical framework discussions aiming to find efficient and fault-tolerant
data distribution using group formation framework for IoT-enabled system and various fault-
tolerant methods including benchmarking approach.
    The analysis of the state of ensuring fault tolerance, survivability and protection of
information in the currently existing information technologies covered almost all levels of the
systems built on their basis - from their hardware platform to the application software of
automated client workplaces and computer networks on which they are based. As a conclusion,
we have to agree with the conclusion that today a large number of quite effective methods of
ensuring fault resistance, survivability and protection of information in distributed specialized
information systems have been developed. But their weaknesses, which restrain their
application, are low availability, due to large financial costs, increasing complexity and
limitations of the integrated application of all means at all levels of the information systems
architecture.

3. Formulation of the problem
The continuous development of computer information technologies has led to the need to use
similar technologies in an increasingly wide range of applications in the construction of
specialized information systems. This, in turn, requires a new approach in their construction.
They must provide their functionality with simultaneously high levels of fault tolerance,
survivability and protection of the information processed in them. And since we are talking
about specialized information systems of wide application, they should also be financially
affordable.
    At present, the issues of fault tolerance and survivability of computer equipment due to the
use of their reliability, redundancy, methods and means of technical and diagnostic
maintenance, their reconfiguration, maintenance and repair are quite well studied. However,
providing these tools separately from each other does not lead to a significant increase in the
reliability and fault tolerance of complex systems, which are modern computer systems.
    The task is to find such a model of the architecture of information technology, which would
integrate both the means of ensuring fault tolerance and the means of survivability and
protection of information, so that it could become the basis for the construction of specialized
information systems. In this way, the scientific problem solved can be described as relevant and
as one that has wide practical application.

4. Main part
4.1. Using the convergence of methods to increase the survivability of the
        system
Ensuring fault tolerance, survivability and protection of information in specialized information
technologies, which function under the constant threat of the effects of destructive software
and computer attacks using developed methods, makes it possible to improve their resistance
to the negative manifestations of various destructions in each individual case. But part of the
steps of three different developed methods [25, 26] are convergent, so it is advisable to combine
them into one method according to common steps and states of the system in which it will be
implemented.
    Then a subsystem will be presented in the information system, which will implement the
provision of fault tolerance, survivability and information protection of specialized information
technologies, which will combine all three developed methods [23].
    At the heart of solving the task of building a specialized information system with increased
means of ensuring fault tolerance, survivability and protection of information, an architectural
approach based on the use of the presented abstract model is obviously quite important. The
application of the generalized method [23] of providing fault tolerance, survivability and
information protection allows to simplify the technology of implementation of protection
subsystems, allowed the joint use of the same resources, which contributed to increasing the
efficiency of subsystems ensuring fault tolerance, survivability and information protection. His
idea is shown in the form of a graph model in figure 1.




Figure 1: The integrated model of the combination of methods of ensuring survivability and
protection of information in the information system is presented in the form of a graph.

    Each vertex of the given graph model corresponds to the steps of the integrated method,
which are conditionally divided into four groups of method steps: preparatory, ensuring fault
tolerance and survivability, ensuring information protection, and steps of documenting events
in IS. And each edge can transition between steps.
    To assess the level of fluidity of information technology, you can use the generalized
minimax criterion [24], which is presented in the following form:
                                     min max                                           (1)
                               K=               F ( x, y ) ,
                                    y ∈Y x ∈ X

where:
                           X = ( x , x , , ,.x ) , Y = ( y , y , , ,. y )
                                  1 2         n           1 2          n

   Here, x1, x2,...,.xn are the parameters of resistance:
   x1 – workplace productivity;
   x2 – reliability of information system elements;
   x3 - fault tolerance of subsystems;
   x4 - number and type of performed functions;
   x5 - calculation accuracy;
   x6 - bandwidth of network channels;
   x7 - RAM capacity;
   ...
   xn are other parameters affecting fault tolerance.
   y1, y2,...,.yn - parameters of survivability and information protection parameters:
   y1 - number and type of performed functions;
   y2 - control over information processing by the operator;
   y3 - operator activity control;
   y4 - control of the relevance of the software of automated workplaces;
   y5 - availability of a backup system;
   y6 - control over computer network channels;
   y7 - encryption of network traffic;
   y8 - division of the computer network into virtual segments-subnets;
   ...
   yn - and so on.

4.2 Solving the task of obtaining a specialized IT architecture
The key aspect, according to the generalized method, the graph model of which is shown in
figure 1, is the creation of a system architecture that can adapt to the requirements of a specific
specialized IS. The IS architecture development process itself will include the implementation
of two stages.
    The first is the development of the constructive part of the system, the second is its
adaptation to the specific functionality of the system due to the iterative nature of the process
itself. This approach to the development of IS made it possible to ensure the implementation of
such general requirements for the construction of systems as systematicity, openness,
compatibility, unification and efficiency.
    As a result, an IS architecture was obtained in which a rational ratio between costs and target
effects was achieved. For the convenience of presenting the architecture of a specialized IS, we
will present it with a generalized macro-level model (Figure 2).
Figure 2: Generalized macro-level model of the architecture of specialized IS.

   It includes client and server parts, each of which is implemented by several levels of its
components. Its feature is the inclusion in the components of all levels of the architecture of
means that are responsible for fault tolerance, survivability and information protection, taking
into account the overall efficiency of IS.
   Another, zero level of the IS macro-architecture shown in Figure 2, includes network
hardware that serves to combine the client and server parts into a single system.
   To solve the problem of obtaining an information system architecture with an increased
level of fault tolerance, survivability and information protection, it is proposed to implement a
method that includes three groups of steps:

   •   steps of the method for the server part of the IS;
   •   method steps for client workplaces;
   •   steps of the method for the network part of the IS.

4.3 A model for ensuring fault tolerance, survivability and information
       protection for the server part of the IS
The architecture of the hardware platform of the server part (Figure 2) has a much more
complex component structure compared to the architecture of the client ARM - it is not only
the center around which the entire specialized IS is built, but also the location of the information
processed in the system. Therefore, ensuring increased survivability, fault tolerance and
information protection of the server part of specialized IS is the main task that needs to be
solved when building any information system.

   We formulate the main requirements for the architecture of the server part, in the form of
steps of the method of ensuring fault tolerance, survivability and information protection:

   1.   Inclusion in the server part of two servers - the main server and the backup server,
        which must be territorially distributed;
   2.   Inclusion in the IS architecture of the crypto-protection server;
   3.   Introduction to the server part of the backup service;
   4.   Introduction of software update control service.
   5.   Each of the servers must:

   •    powered by intelligent power supply units, which guarantees the integrity and
        consistency of data, non-damage of database structures;
   •    include disk subsystems organized according to the scheme of the RAID-array type 1,
        which will increase the protection of information;
   •    provide background quality control of the surfaces of disk drives, which will allow early
        response to possible problems.

    The implementation of all steps of the method is shown in the form of a model of the
architecture of the server part of the IS in Figure 3, where its main component composition is
given. As can be seen from the model (Figure 3), the architecture of the server part of the IS
includes main and backup, territorially separated database servers (step 1). They are connected
by the backup service, which is based on its own information channel, which allows you to
maintain the relevance of backup copies at a high level (step 3).
    If the main IS server fails, the system will automatically switch, with a slight time delay, to
the backup server, where an up-to-date copy of the database is always present. This
organization of IS architecture ensures its high fault tolerance and survivability.
    The crypto-protection server serves to encrypt the network traffic of uncontrolled
information transmission channels (step 2), which makes network intelligence impossible to a
large extent.
    Another important aspect of the proposed architecture of the server part of the IS is the
inclusion in its composition of the component that is responsible for the relevance of the client
software of the ARM (step 4). It includes a repository of client software that allows you to update
and restore damaged software of client ARMs in automatic mode, which contributes to
increasing fault tolerance and survivability of client ARMs, constant availability of IS functions.
The same service provides the client software, upon its request, with parameters to run if the
request is found to be legitimate. Such an algorithm excludes access to database information of
illegal copies of software, which increases information security.
Figure 3: Microarchitecture of the hardware platform of a typical ARM client part of the IS.

4.4 A model for ensuring fault tolerance, survivability and information
       protection for the client part of the IS using the convergence of
       methods
In order to ensure fault tolerance, survivability and protection of information, the second group
of steps of the generalized method is formulated as follows:

   1.    Connecting the client workstation to the server involves obtaining launch parameters
         if the launch request is recognized as legitimate.
   2.   Mandatory user authentication in the IS.
   3.   Control over the actions of the workplace operator from the IS side.
   4.   Monitoring the activity of the workplace operator.
   5.   All information editing is performed under transaction management.
   6.   The client computer does not store information, both that which is processed in the IS
        and that which serves to run the client software.
   7.   The set of available functions of the client workplace is determined by the parameters
        stored on the database server.

   The implementation of all the steps of the second group of the method made it possible to
build a model of the architecture of the client's workplace with the means of ensuring fault
tolerance, survivability and information protection implemented in it. As can be seen from
Figure 4, it is a three-level structure, where the first level is the hardware platform of the client
workplace, the second is the level of system software, and the third level is the level of
application software that implements a certain set of IS functions.




Figure 4: The architecture of the server part of the information system is depicted with micro-
level detail.

    The micro-architecture of the system software of the client's automated workplace (Figure
3, level 2) includes components of the operating system and other system software, which are
intended to provide fault tolerance, survivability and information protection. Almost all
operating systems include a subsystem with the conventional name "Security Center", which,
in turn, includes the following components:

   - update service – provides support for OS software in an up-to-date state;
   - account control service - provides controlled access to the computer according to authority.
        Contributes to the protection of information from its acquisition by outsiders;
   - the Windows firewall provides control over incoming and outgoing connections.
        Connections that do not meet security requirements are automatically blocked. With
        this, it protects Internet traffic, preventing the penetration of malicious software into
        the computer, which generally increases the survivability of the IS.

    Also, the architecture of this level includes means of general countermeasures against
system-level malicious software (antiviruses, protector and USB, etc.).
    The architecture of the client part ends with the third level (Figure 4), which is a layer of
application software that implements the functions of the user's ARM. A feature of its
implementation is the integrated use of means of fault tolerance, survivability and information
protection (steps 1 - 6). They are integral parts of almost all components of the APM, which,
together with the means of the two lower levels, made it possible to obtain a client APM with
increased parameters of resistance, survivability and security of the information processed by
it.
    Each ARM is a set of functions f1 - fn (Figure 4 level 3), each of which is built using a typical
skeletal part, realizing the principle of unification. The skeletal parts include means of fault
tolerance and survivability: procedures using two interacting processes, one of which is a non-
trivial error handler (f1 Figure 4), functional redundancy, with the possibility of managing the
workload of an automated workplace (f2 Figure 4). Maximum attention is paid to the protection
of information on the side of the automated workplace.
    A number of software components are used. These include non-trivial data editors with data
integrity control elements (fn Figure 4), execution of all data manipulations under transaction
management, as well as components of user authentication and its activity in IS.

4.5 A model for providing fault tolerance, survivability and information
       protection of specialized IT in its network architecture
The network part of the information system is built by following the following steps of the
generalized method of ensuring fault tolerance and survivability of information technology:

   1.     The IS network is segmented into virtual segments.
   2.   The main and backup server are geographically separated and placed in a local segment
        that is not accessible from the external network.
   3.   The crypto-protection server ensures the inaccessibility of specialized IS information
        from the external network and serves as a connecting link between clients and the
        server part.
   4.   All information channels of the IS network are divided into open and closed. Access
        control to open channels is carried out organizationally, and information is transmitted
        in encrypted form on closed channels.
   5.   All ARM clients connected to open channels work using the key generated by the crypto
        server when setting up access.

   The architecture of the network component includes a managed switch and data cable lines
(Figure 5). This architecture uses two types of information channels. The first type is channels
that are under constant control and therefore allow data transmission in an open form,
which allows you to achieve maximum work productivity.
   The second type is uncontrolled. Through them, data is transmitted in the mode of
cryptographic protection. This reduces the performance of the IS, but ensures data
security.
   As can be seen from Figure 5, the use of a managed switch makes it possible to create
virtual local networks with their own security policies.
   The use of switches with the possibility of implementing such an architecture in
combination with cryptographic protection of network traffic significantly increases the
parameters of the survivability of the IS and the protection of information in the IS, reliably
preventing the conduct of network intelligence, depriving attackers of the information
necessary to launch an attack.




Figure 5: Micro-architecture of the network part of the information system.

    As a result, the proposed architecture guarantees the invisibility of the main and backup
servers from the external network. All requests of client automated workplaces, in an encrypted
form, are sent to the crypto protection server. A simplified diagram of this implementation of
the server segment is shown in Figure 6.
    Each client of the crypto server is provided with a key generated during its configuration. In
this way, the crypto server will be able to decrypt and redirect the request of only the registered
client.
    Such network organization can be very useful for corporations implementing their own
specialized IS. This can be achieved by using managed switches that provide the creation of
virtual local networks.
    By combining all the steps of the three groups, we will get a generalized method of building
a model of a specialized information system with an increased degree of fault tolerance,
survivability and information protection.
Figure 6: Topology scheme of the IS computer network with provision of cryptographic
protection of information.

5. Experimental studies
Figure 7 shows the reaction of the system to the lack of activity of the operator of client ATM
No. 50. In order to prevent uncontrolled access to IS information through the use of an ATM
that may not be controlled by the operator.




Figure 7: IC reaction to the time-out of ARM No. 50.




Figure 8: Reaction of the information system to an attempt to launch illegal software.

   IS reaction to an attempt to launch the software of a reference software not registered in the
bank of the service of monitoring the relevance of the client's software. In Figure 8 shows the
event 210551 recorded in the log file. It shows that at the specified time an attempt was made
to launch the ARM software No. 103 from the computer station with the IP address
192.168.168.201. Since it conflicts with the connection registry reference parameters, this ARM
is not allowed to run.In this way, the IS prevents the possibility of obtaining illegal
access to information through the use of illegal copies of software of client
workstations, stopping the attack from within the system. An external attack on the
server is practically impossible due to classified traffic and network segmentation with
clearly defined security policies, which makes it invisible from the external network
and does not show up during port scanning.
   In Figure 9 shows the sequence of events recorded in the IS log file, which illustrate
the process of losing access to the main server and switching client ARMs to the backup one.
A special procedure that monitors the availability of the main server with a period of one minute
switches client ARMs to the backup server after three confirmations of the unavailability of the
main server. This is necessary to prevent accidental switching of servers.




Figure 9: Reaction of the information system when the main server is unavailable.




Figure 10: Updating the software of the automated workplace due to its non-compliance with
the reference parameters.

    In the background, the control service checks the software of client workplaces for relevance.
In Figure 10 shows the event 210564 of the log file, which recorded the fact of non-compliance
of the parameters of the software modules of ARM No. 3 with the reference ones. The reason
for this can be a SWP attack or self-destruction, as a result of which the checksum of the
module has changed and it had to be updated from the system SW bank.
   According to the given examples of fragments of log files (Figure 7 - 10), it was
established that the means of ensuring fault tolerance, survivability and protection of
IS information have a sufficient level of selectivity to the causes of disturbances in the
system, providing its personnel with a wide range of information for further analysis.
   Graphs (Figure 11) obtained by calculations according to formula (2) for the survivability
results of formula (2) are shown:

                                                                                                                                    (2)




     Where       𝛼𝛼1,𝑗𝑗,𝑝𝑝,𝑞𝑞 – is the coefficient for the value that determines fault tolerance in
quantitative units;
    𝛼𝛼2,𝑗𝑗,𝑝𝑝,𝑞𝑞 – coefficient for the value that determines survivability in quantitative units;
𝛼𝛼1,𝑗𝑗,𝑝𝑝,𝑞𝑞 + 𝛼𝛼2,𝑗𝑗,𝑝𝑝,𝑞𝑞 = 1.

 µ
                                                                    1
 =                                                                                                                                           ,
           𝑛𝑛𝑝𝑝  𝑛𝑛𝑞𝑞                                  𝑇𝑇𝑓𝑓1 (𝑀𝑀𝑖𝑖 ),1                                      𝑇𝑇𝑓𝑓2 (𝑀𝑀𝑖𝑖),1 + 𝑇𝑇𝑓𝑓2 (𝑀𝑀𝑖𝑖),2
     ∑𝑚𝑚  ∑     ∑     �𝛼𝛼           ∙
                         1,𝑗𝑗,𝑝𝑝,𝑞𝑞 𝑇𝑇                                                     + 𝛼𝛼2,𝑗𝑗,𝑝𝑝,𝑞𝑞 ∙                                 �
      𝑗𝑗=1 𝑝𝑝=0 𝑞𝑞=0
                                      𝑓𝑓1 (𝑀𝑀𝑖𝑖 ),1 − (𝑇𝑇𝑓𝑓1 (𝑀𝑀𝑖𝑖 ),2 + 𝑇𝑇𝑓𝑓1 (𝑀𝑀𝑖𝑖 ),3 )                             𝑇𝑇𝑓𝑓2 (𝑀𝑀𝑖𝑖),1

   The estimated values of fault tolerance and survivability of the given information technology
are shown in Figure 12 when implementing the developed generalized method of ensuring its
fault tolerance and survivability into a typical information system, calculated according to
formula (3) and reflect the appropriate level of resistance to malicious software destruction and
various computer attacks in the process of activation of subsystems ensuring system
survivability, which is ensured at a level of at least 67% [25].




Figure 11: Schedule of manifestations of the vitality of the information system.
Figure 12: Evaluation of the values of levels of fault tolerance and survivability of IS.

6. Conclusions
Thus, the proposed architecture of the information system implemented in itself the developed
method of ensuring fault tolerance, survivability and information protection of information
technology, which consists in combining and integrating into information technology
mechanisms for ensuring fault tolerance, survivability and protection of information according
to their coincidences in states when responding to the destruction of malicious software
security and computer attacks, which made it possible to create specialized IS resistant to these
influences.
    According to the developed method of ensuring fault tolerance, survivability and protection
of IT information, the architecture of the means in which it is implemented is proposed, on the
basis of which an IS is created for conducting experimental studies on the proposed solution for
improving the fault tolerance, survivability and protection of information of specialized IT
under the effects of cyberattacks and computer attacks.
    As a result of the use of the listed measures, an information system architecture of highly
specialized use for various fields of application was obtained, where processes are monitored in
unreal or unreal time with improved parameters of fault tolerance, survivability and
information protection. The results of the research conducted with the developed IS and the
application of the IT performance evaluation methodology confirm the improved level of
stability and survivability in corporate computer networks, which is more than 67%, for IT in
which the method of ensuring fault tolerance, survivability and protection of IT information is
implemented.

References
[1] P. Stavroulakis, M. Kolisnyk, V. Kharchenko, N. Doukas, O. Markovskyi, N. Bardis,
    Reliability, Fault Tolerance and Other Critical Components for Survivability in Information
    Warfare. In: M. Obaidat, E. Cabello, (eds) E-Business and Telecommunications. ICETE 2019.
    Communications in Computer and Information Science, vol 990. Springer. doi: 10.1007/978-
    3-030-11039-0_17.
[2] T. Frederiksen, J. Hesse, A. Lehmann, R. Torres Moreno, Identity Management: State of the
    Art, Challenges and Perspectives. In: Friedewald, M. Önen, M. Lievens, E. Krenn, S. Fricker,
     (eds) Privacy and Identity Management. Data for Better Living: AI and Privacy. Privacy and
     Identity 2019. IFIP Advances in Information and Communication Technology, 576 (2019).
     Springer, Cham. doi: 10.1007/978-3-030-42504-3_4.
[3] S. Jarecki, A. Kiayias, H. Krawczyk, Round-optimal password-protected secret sharing and
     T-PAKE in the password-only model. In: P. Sarkar, T. Iwata, (eds.) ASIACRYPT 2014. LNCS,
     Springer, Heidelberg 2014 vol. 8874, pp. 233–253. doi: 10.1007/978-3-662-45608-8_13.
[4] T. Frederiksen, Y. Lindell, V. Osheter, B. Pinkas, Fast distributed RSA key generation for semi-
     honest and malicious adversaries. In: H. Shacham, A. Boldyreva, (eds.) CRYPTO 2018. LNCS,
     Springer, Cham, 10992 (2018) 331–361. doi: 10.1007/978-3-319-96881-0_12.
[5] F. Wu, S. Tung, J. Huang, A Robust Two Factor Authentication Scheme with Fine Grained
     Biometrics Verification. In: S. Hsieh, L. Hung, R. Klasing, (eds) New Trends in Computer
     Technologies and Applications. ICS 2022. Communications in Computer and Information
     Science, Springer, Singapore, 1723 (2022) 407-418. doi: 10.1007.
[6] L. Mei, C. Xu, L. Li, Efficient Forward and Backward Private Searchable Symmetric
     Encryption for Multiple Data Sources. In: X. Sun, X. Zhang, Z. Xia, E. Bertino (eds) Advances
     in Artificial Intelligence and Security. ICAIS 2021. Communications in Computer and
     Information Science, 1424 (2021). Springer, Cham. doi: 10.1007/978-3-030-78621-2_10.
[7] Martínez, F. García, A Comparative Study Between Two Numerical Methods for Symmetric
     Cryptography Uses and Applications. In: Latifi, S. (eds) ITNG 2021 18th International
     Conference on Information Technology-New Generations. Advances in Intelligent Systems
     and Computing, 1346 (2021). Springer, Cham. doi: 10.1007/978-3-030-70416-2_16.
[8] S. Vatshayan, R. Haidri, J. Verma, Design of hybrid cryptography system based on vigenère
     cipher and polybius cipher, in 2020 International Conference on Computational Performance
     Evaluation (ComP E(IEEE, New York, 2020), pp. 848–852.
[9] K. Miteloudi, L. Batina, J. Daemen, N. Mentens, ROCKY: Rotation Countermeasure for the
     Protection of Keys and Other Sensitive Data. In: A. Orailoglu, M. Jung, M. Reichenbach, (eds)
     Embedded Computer Systems: Architectures, Modeling, and Simulation. SAMOS 2021.
     Lecture Notes in Computer Science, vol 13227. Springer. doi: 10.1007/978-3-031-04580-6_19.
[10] K. Balogun, M. A. Gbolagade, A Hybrid Metaheuristic Algorithm for Features Dimensionality
     Reduction in Network Intrusion Detection System. In: Gervasi, O., et al. Computational
     Science and Its Applications – ICCSA 2021. ICCSA 2021. Lecture Notes in Computer
     Science(), vol 12957. Springer, Cham. doi: 10.1007/978-3-030-87013-3_8.
[11] A. Balogun, N. Akande, F. Usman-Hamza, V. Adeyemo, Rotation Forest-Based Logistic Model
     Tree for Website Phishing Detection. In: Gervasi, O., et al. Computational Science and Its
     Applications – ICCSA 2021, 21st International Conference, Cagliari, Italy, September 13–16,
     2021, Proceedings, Part IX, pp 154-169. doi: 10.1007/978-3-030-87013-3_12.
[12] O. Savenko, A. Nicheporuk, I. Hurman, S. Lysenko, Dynamic signature-based malware
     detection technique based on API call tracing, CEUR-WS 2393 (2019) 633-643.
[13] J. Li Zhang, C. Chen, K. Lee, L. Lee, A Practical Botnet Traffic Detection System Using GNN.
     In: Meng, W., Conti, M. (eds) Cyberspace Safety and Security. CSS 2021. Lecture Notes in
     Computer Science(), vol 13172. Springer, Cham. doi: 10.1007/978-3-030-94029-4_5.
[14] F. Ja’fari, S. Mostafavi, K. Mizanian, E. Jafari, An intelligent botnet blocking approach in
     software defined networks using honeypots. J. Ambient Intell. Humanized Comput., 2993–
     3016 (2020). doi: 10.1007/s12652-020-02461-6.
[15] S. Lysenko, K. Bobrovnikova, O. Savenko, A Botnet Detection Approach Based on The Clonal
     Selection Algorithm, in: Proceedings of 2018 IEEE 9th International Conference on
     Dpendable Systems, Services and Technologies, DeSSerT-2018, Ukraine, (2018), pp. 424-428.
[16] J. Liu, J. Zhang, C. Du, D. Wang, A Multi-model System for Insider Threat Detection. In: Y.
     Xu, H. Yan, H. Teng, (eds) Machine Learning for Cyber Security. ML4CS 2022. Lecture Notes
     in Computer Science, vol 13655. Springer, (2023). doi: 10.1007/978-3-031-20096-0_23.
[17] M. Ancona, A. Clematis, G. Dodero, E. Fernandez, V. Gianuzzi, System Architecture for
     Software Fault Tolerance. In: Belli, F., Görke, W. (eds) Fehlertolerierende Rechensysteme /
     Fault-Tolerant Computing Systems. Informatik-Fachberichte, 147 (2018). Springer, Berlin,
     Heidelberg. doi: 10.1007/978-3-642-45628-2_24.
[18] K. Hu, D. Ding, S. Tian, R. Gong, L. Luo, FTR-NAS: Fault-Tolerant Recurrent Neural
     Architecture Search. In: H. Yang, K. Pasupa, A. Leung, J. Kwok, (eds) Neural Information
     Processing. ICONIP 2020. Communications in Computer and Information Science, 1333
     (2020). Springer, Cham. doi: 10.1007/978-3-030-63823-8_67.
[19] V. Prajapati, T. Sharma, L. Awasthi, Theoretical Aspect on Fault-Tolerant Data Dissemination
     in IoT Enabled Systems. In: V. Balas, G. Sinha, B. Agarwal, (eds) Emerging Technologies in
     Computer Engineering: Cognitive Computing and Intelligent IoT. ICETCE 2022.
     Communications in Computer and Information Science, 1591 (2022). Springer, Cham. doi:
     10.1007/978-3-031-07012-9_15.
[20] M. Moghaddam, H. Muccini, Fault-Tolerant IoT. In: R. Calinescu, F. Giandomenico, (eds)
     Software Engineering for Resilient Systems. SERENE 2019. Lecture Notes in Computer
     Science, 11732 (2019), Springer, Cham. doi: 10.1007/978-3-030-30856-8_5.
[21] Y. Ishikawa, K. Sugiura, D. Takao, Fault Tolerant Data Stream Processing in Cooperation
     with OLTP Engine. In: A. Mondal, H. Gupta, J. Srivastava, P. Reddy, (eds) Big Data Analytics.
     BDA 2018. Lecture Notes in Computer Science, 11297 (2018). Springer, Cham. doi:
     10.1007/978-3-030-04780-1_1.
[22] M. Fischer, O. Riedel, A. Lechler, Comprehensive Analysis of Software-Based Fault Tolerance
     with Arithmetic Coding for Performant Encoding of Integer Calculations. In: M. Trapp, F.
     Saglietti, M. Spisländer, F. Bitsch, (eds) Computer Safety, Reliability, and Security.
     SAFECOMP 2022. Lecture Notes in Computer Science, 13414 (2022). Springer. doi:
     10.1007/978-3-031-14835-4_10.
[23] M. Stetsiuk, A. Kashtalian, The methods of ensuring fault tolerance, survivability and
     protection of information of specialized information technologies under the influence of
     malicious software. (Computer Systems And Information Technologies), 2022, №1, pp 36 - 44.
[24] J. Frank, Safety and Security of Cyber-Physical Systems Engineering dependable Software
     using Principle-based Development. Springer Vieweg Wiesbaden, (2022) 537. doi:
     10.1007/978-3-658-37182-1.
[25] M. Stetsyuk, L, Bedratyuk, B. Savenko, V. Stetsyuk, O. Savenko, Providing the Resilience and
     Survivability of Specialized Information Technology Across Corporate Computer Networks.
     1st International Workshop on Intelligent Information Technologies & Systems of
     Information Security.2020; CEUR-WS. 2623 (2020) 219-238.
[26] M. Patil, T. Abukhalil, S. Patel, T. Sobh, Ub swarm: hardware implementation of
     heterogeneous swarm robot with fault detection and power management. International
     Journal of Computing, 15(3), 2016, 162-176. doi:10.47839/ijc.15.3.849.