<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Global Controllability of Linear Models⋆</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Mariia Astafieva</string-name>
          <email>m.astafieva@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nataliya Stepanenko</string-name>
          <email>nataliya.stepanenko@lll.kpi.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv Metropolitan University</institution>
          ,
          <addr-line>18/2 Bulvarno-Kudriavska str., 04053 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>National Technical University of Ukraine “Igor Sikorsky Kyiv Polytechnic Institute</institution>
          ,”
          <addr-line>37 Peremohy ave., 03056 Kyiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>14</fpage>
      <lpage>25</lpage>
      <abstract>
        <p>In the age of digitalization, cybersecurity is critical for modern technological systems. The tasks of protecting information nodes, preventing the spread of cyberattacks, and restoring system functionality after successful attacks require studying the possibility of controlling dynamic processes. Mathematical models based on ordinary differential equations make it possible to describe and analyze these processes in terms of controllability. An extremely important property of cybersecurity models is their global controllability, which means that the system can be moved from any initial state to a desired end state using appropriately selected control. In the context of cybersecurity, this allows for an effective response to threats, recovery from attacks, and prevention of undesirable scenarios. This paper presents the conditions for global controllability of stationary and non-stationary linear systems of differential equations that model dynamic processes in the information space. The results obtained by different researchers are systematized, and the author presents his proof of some of them. Examples confirming the theory are constructed.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;cybersecurity</kwd>
        <kwd>mathematical model</kwd>
        <kwd>system of linear differential equations</kwd>
        <kwd>mathematical control theory</kwd>
        <kwd>global controllability of the model</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>The mathematical theory of control is very important and relevant today. We always strive to have
control over a process or physical system to make it behave optimally, minimize risks, eliminate
threats, etc. The theory of optimal control is precisely concerned with analyzing and finding
solutions for optimal control of a system or process [1].</p>
      <p>One of the biggest threats to information and cyber security is malware. Dynamic processes of
information dissemination are often described by systems of differential equations. A separate class
of such models that are interesting in the context of our study are compartmental models based on
ordinary differential equations. They typically describe the dynamics of malware propagation and
have been studied in many papers, for example [2–4]. Studies of various cybersecurity models
based on the Lotka-Volterra model can be found, for example, in [5–9], and differential models of
information dissemination and information confrontation are considered in [10]. Thus, ordinary
differential equations are important tools for analyzing and controlling dynamic systems, such as
cyberattacks and defense mechanisms. A defense system
must be controllable. It is always
necessary to have information about what is happening in the information system, or even better,
to get a forecast of the situation, predict the behavior and evolution of malware, and understand
the effectiveness of various countermeasures. This is where the mathematical theory of control,
described in many books, such as [11–14], comes in. Based on this theory, various optimal control
problems are studied, including those in cybersecurity, as exemplified in [4, 15–17]. The proposed
paper is devoted to the problem of global manageability, which means the ability to fully control
the security system to: (a) eliminate threats; (b) ensure system stability; and (c) prevent the spread
of attacks. The key reasons why global manageability is important are:




</p>
      <p>Managing the spread of threats (it is important to be able to bring a system infected with,
for example, a virus or other malware to a secure state; global manageability ensures that
this is possible for any initial threat configuration).</p>
      <p>Adaptation to new attacks (cyber threats are constantly changing, so security systems must
be able to adapt; global controllability allows you to adjust the protection parameters, in
particular, the control input u(t), to take into account new types of attacks).</p>
      <p>Recovery after an attack (after a successful attack, it is necessary to have mechanisms that
allow the system to return to the desired state; global manageability allows this to be done
even in complex multi-component systems).</p>
      <p>Optimization of resources (in systems with limited resources, such as computing, financial,
or human resources, global controllability allows to determine the minimum required set of
control actions to achieve security goals).</p>
      <p>Building resilient systems (global controllability contributes to the development of resilient
systems that can remain under control even in the event of significant disturbances or
changes in the system, such as large-scale cyber-attacks).</p>
      <p>Thus, global controllability in cybersecurity systems is a fundamental property that allows not
only responding to attacks but also actively maintaining the system’s stability in the face of
evergrowing threats [18, 19].</p>
      <p>The purpose of the paper is to consider the conditions of global controllability of a dynamic
model of cybersecurity described by a linear system of ordinary differential equations.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Scalar equation with a vector control function</title>
      <p>
        Let the control object be described by a linear differential equation
x˙=a (t ) x +b1(t )u1(t )+...+bm(t )um(t )
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
where x˙= dx , u (t )=(u1 (t ) , . . . , um (t )) is the control vector function, defined and continuous on a
dt
segment [0,1], i.e., u (t ) ∈ C [ 0 , 1] . This function stabilizes the system’s functioning and
counteracts cyber attacks.
      </p>
      <p>
        Definition 1. Equation (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) is said to be globally controllable on the interval [0,1], if for any fixed
values x0 , x1 ∈ R there exists a vector function u=u (t ) ∈ C [ 0 , 1] , such that equation (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) has a
solution x= x (t ) , that satisfies the boundary conditions x ( 0)= x0 , x (
        <xref ref-type="bibr" rid="ref1">1</xref>
        )= x1 .
choose a function
      </p>
      <p>
        Let us find out the conditions of the global controllability of equation (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ). It is necessary to
m
∑ b j (t ) u j (t )=f (t ) so that the conditions x (0)= x0 , x (
        <xref ref-type="bibr" rid="ref1">1</xref>
        )= x1 for any
j=1
predetermined ones are fulfilled x0 , x1 ∈ R .
functions a (t ) , f (t ) ∈ C [ 0 , 1] with an initial condition x (0)= x0 this equation has a unique
solution
      </p>
      <p>t τ
x= x (t )=e 0 ( x0 +∫ e 0 f ( τ ) dτ ).</p>
      <p>∫ a(σ ) dσ t −∫ a(σ )dσ</p>
      <p>0</p>
      <p>
        Taking into account this, as well as the requirement that the solution of equation (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) should, in
addition to the condition x (0)= x0 , satisfy the condition x (
        <xref ref-type="bibr" rid="ref1">1</xref>
        )= x1 for any predetermined point
x1 ∈ R , we write:
1 
a d  1 a d
x1  x1  e 0  x0   e 0
 0


b , u  d 


m
where marked ⟨ b ( τ ) , u ( τ )⟩=∑ b j (t ) u j (t ) . Let’s write (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ) in the following form:
j=1

1  a d
 e 0
0
      </p>
      <p>b , u  d  y
1
−∫ a(σ ) dσ
where y = x1 e 0</p>
      <p>
        Since the values of x0 and x1 change R arbitrarily and independently of each other, and takes
on arbitrary values with R . Thus, the global controllability of equation (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ) on the interval [0,1] is
equivalent to the fact that the integral equation (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) has a solution u=u (t ) ∈ C [ 0 , 1] for any value
y ∈ R .
      </p>
      <sec id="sec-2-1">
        <title>It is easy to verify the validity of the following statement.</title>
        <p>
          Theorem 1. For the integral equation (
          <xref ref-type="bibr" rid="ref3">3</xref>
          ) to have a solution u=u (t ) ∈ C [ 0 , 1] it is necessary
and sufficient that the condition is fulfilled
        </p>
        <p>
1 2 a d m
G   e 0  b2  d  0
0 j1 j
.</p>
        <sec id="sec-2-1-1">
          <title>Proof.</title>
          <p>
            Indeed, if the condition (
            <xref ref-type="bibr" rid="ref4">4</xref>
            ) is fulfilled, then, obviously, the integral equation (
            <xref ref-type="bibr" rid="ref3">3</xref>
            ) also has
solutions for each fixed y ∈ R . One such solution looks like this
τ
−∫ a(σ ) dσ y
u=u0 ( τ )=b ( τ )⋅e 0 ⋅ .
          </p>
          <p>G
a continuous vector function that is a solution of the integral equation</p>
          <p>τ
1 −∫ a(σ ) dσ
∫ e 0 ⟨ b ( τ ) , v ( τ )⟩ dτ =0 .</p>
          <p>
            0
If condition (
            <xref ref-type="bibr" rid="ref4">4</xref>
            ) is not fulfilled, then this means that b j ( τ )=0 , j=1 , m , for all τ ∈ [ 0 , 1] . At
1
∫ a(σ ) dσ
the same time, (
            <xref ref-type="bibr" rid="ref2">2</xref>
            ) takes the form x1= x0 e 0
x0 , x1 ∈ R .
          </p>
        </sec>
      </sec>
      <sec id="sec-2-2">
        <title>The theorem is proved. and, obviously, cannot be fulfilled for any</title>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. A system of linear equations with a vector control function</title>
      <sec id="sec-3-1">
        <title>Let the control object be described by a system of differential equations</title>
        <p>
          x  At x  Bt ut 
where x ∈ Rn , u=u (t ) ∈ Rm is the control function, A(t) is a square matrix of dimension n×n ,
which indicates the degree of threat of information impact and whose elements are real scalar
functions aij (t ) defined and continuous on the interval ( a , b ) (a and b maybe infinite); the matrix
B (t ) , that sets the degree of system security is rectangular, consists of n rows and m columns, its
elements are continuous on ( a , b ) scalar functions. The elements of matrices are formed by
cybersecurity experts.
(
          <xref ref-type="bibr" rid="ref5">5</xref>
          )
(
          <xref ref-type="bibr" rid="ref6">6</xref>
          )
        </p>
        <p>
          Definition 2. System (
          <xref ref-type="bibr" rid="ref5">5</xref>
          ) will be called globally controllable on a segment [ t 0 , t1]
([ t 0 , t1] ⊂ ( a , b )) if for any fixed values x0 , x1 ∈ R exists a vector function u=u (t ) ∈ C [ t 0 , t1] ,
in which the system has a solution x= x (t ) , that satisfies the boundary conditions
x (t 0)= x0 , x (t1)= x1 .
        </p>
        <p>
          Let’s write down what the solution of system (
          <xref ref-type="bibr" rid="ref5">5</xref>
          ) looks like. It is a heterogeneous system. A
homogeneous system corresponds to it
        </p>
        <p>x˙= A (t ) x .</p>
        <p>
          Let us denote Ωtt the fundamental matrix of solutions of this system, normalized at the point
0
t =t 0 , Ωtt0|t=t0 = I n , I n is an n-dimensional unitary matrix. Knowing that the solutions of a
heterogeneous system x˙= A (t ) x + f (t ) , where f (t ) is some vector function, defined and
continuous on the interval ( a , b ) , are given by equality
x  xt  tt0  x0  tt t0 f  d  (
          <xref ref-type="bibr" rid="ref7">7</xref>
          )
        </p>
        <p>
           0 
where x0 ∈ Rn is an arbitrarily fixed constant vector and x (t 0)= x0 , we write down the solution of
system (
          <xref ref-type="bibr" rid="ref5">5</xref>
          ) under the condition that u (t ) it is continuous:
        </p>
      </sec>
      <sec id="sec-3-2">
        <title>The following statement is true.</title>
        <p>
          Theorem 2. For system (
          <xref ref-type="bibr" rid="ref5">5</xref>
          ) to be globally controllable on the interval [ t 0 , t1] it is necessary and
xt  tt0  x0  tt t0 B u d 

 0  .
        </p>
        <p>det Gt0 , t1   0
sufficient that the condition</p>
        <p>t1 t
where G [ t 0 , t1]=∫ Ωτ0 B ( τ ) BT ( τ )(Ωtτ0)T dτ is the Gram matrix.</p>
        <p>t0
The vector η can be chosen to be a unit. Then</p>
        <p>
          Gt0 , t1   0 .
 
 ,  1 .
(
          <xref ref-type="bibr" rid="ref8">8</xref>
          )
(
          <xref ref-type="bibr" rid="ref9">9</xref>
          )
(
          <xref ref-type="bibr" rid="ref10">10</xref>
          )
(
          <xref ref-type="bibr" rid="ref11">11</xref>
          )
(
          <xref ref-type="bibr" rid="ref12">12</xref>
          )
(
          <xref ref-type="bibr" rid="ref13">13</xref>
          )
        </p>
        <sec id="sec-3-2-1">
          <title>Proof.</title>
          <p>
            Sufficiency. Suppose that the system (
            <xref ref-type="bibr" rid="ref5">5</xref>
            ) u (t ) is a continuous vector function. Then the solution
of system (
            <xref ref-type="bibr" rid="ref5">5</xref>
            ) is of the form (
            <xref ref-type="bibr" rid="ref8">8</xref>
            ). We need the condition to be satisfied x (t1)= x1 , which means that
for any fixed constant vectors x0 , x1 ∈ Rn , the system of integral equations must-have solutions
t
tt10 x1  x0  1 t0 B u d
          </p>
          <p>t0 .</p>
        </sec>
      </sec>
      <sec id="sec-3-3">
        <title>When the condition (9) is fulfilled, one of these solutions is</title>
        <p>u   BT  t0 T Gt0 , t1 1tt10 x1  x0 .</p>
      </sec>
      <sec id="sec-3-4">
        <title>Indeed, by substituting (11) into the right-hand side of equation (10), we will have:</title>
        <p>∫t1 Ωtτ0 B ( τ ) BT ( τ )(Ωtτ0)T (G [ t 0 , t1])−1(Ωtt10 x1− x0) dτ =(G [ t 0 , t1])×(G [ t 0 , t1])−1× (Ωtt10 x1− x0)
t0</p>
        <p>t
=Ωt01 x1− x0 .</p>
        <p>
          Necessity. Let the system (
          <xref ref-type="bibr" rid="ref5">5</xref>
          ) be globally controllable, but, at the same time, the condition (
          <xref ref-type="bibr" rid="ref9">9</xref>
          ) is
not fulfilled, i.e., det G [ t 0 , t1]=0 . This means that there exists a nonzero constant vector such that
        </p>
        <p>
          Since we assumed that the system (
          <xref ref-type="bibr" rid="ref5">5</xref>
          ) is globally controlled on the interval [ t 0 , t1] , then the
system of integral equations (
          <xref ref-type="bibr" rid="ref10">10</xref>
          ) Ωtt01 x1− x0 =η has a solution u= ~u( τ ) , i.e., the equality holds
        </p>
      </sec>
      <sec id="sec-3-5">
        <title>Therefore, the identity must hold</title>
        <p>M    0  t0 , t1 .</p>
      </sec>
      <sec id="sec-3-6">
        <title>It follows from (14) and the identity (16)</title>
        <p>t1 t T t1
‖η‖2=ηT⋅η=[∫ Ωτ0 B ( τ ) ~u( τ ) dτ ] ×η=∫ ( ~u( τ ))T M ( τ ) dτ⋅η=0 ,</p>
        <p>
          t0 t0
and this contradicts (
          <xref ref-type="bibr" rid="ref13">13</xref>
          ). Therefore, condition (
          <xref ref-type="bibr" rid="ref9">9</xref>
          ) follows from the global controllability of system
(
          <xref ref-type="bibr" rid="ref5">5</xref>
          ). The necessity, and therefore the entire theorem, is proved.
        </p>
      </sec>
      <sec id="sec-3-7">
        <title>The theorem and the process of its proof lead us to several conclusions.</title>
        <p>
          1. From (
          <xref ref-type="bibr" rid="ref15">15</xref>
          ), we see that the Gram matrix is symmetric and non-negative, i.e., the inequality
holds for all ⟨G [ t 0 , t1] x , x ⟩≥0 . Moreover, condition (
          <xref ref-type="bibr" rid="ref9">9</xref>
          ) is equivalent to the following condition:
        </p>
        <p>Gt0 , t1x, x   x 2 x  Rn ,   const  0 .</p>
        <p>
          Indeed, for the symmetric Gram matrix G [ t 0 , t1] the condition is fulfilled ⟨G [ t 0 , t1] x , x ⟩≥0 .
This means that all eigenvalues of the Gram matrix are real and nonnegative. If, in addition,
condition (
          <xref ref-type="bibr" rid="ref9">9</xref>
          ) is fulfilled, then all eigenvalues are positive, and this means that condition (
          <xref ref-type="bibr" rid="ref17">17</xref>
          ) is
fulfilled.
        </p>
        <p>
          2. The global controllability of the system (
          <xref ref-type="bibr" rid="ref5">5</xref>
          ) on the interval [ t 0 , t1] is equivalent to the
existence on this segment of a solution u=u ( τ ) of the system of integral equations
y = ∫t1 Ωtτ0 B ( τ ) u ( τ ) dτ for each fixed y ∈ Rn .
        </p>
        <p>
          t0
3. If the system (
          <xref ref-type="bibr" rid="ref5">5</xref>
          ) is globally controllable on the interval [ t 0 , t1] , then it is globally controllable
on any interval [ ~t0 , ~t1] such that [ t 0 , t1] ⊂ [ ~t0 , ~t1] ⊂ ( a , b ) .
(
          <xref ref-type="bibr" rid="ref15">15</xref>
          )
(
          <xref ref-type="bibr" rid="ref16">16</xref>
          )
(
          <xref ref-type="bibr" rid="ref17">17</xref>
          )
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Controllability conditions of linear systems with smooth coefficients</title>
      <p>
        t1 t t T
It should be noted that finding the Gram matrix G [ t 0 , t1]=∫ Ωτ0 B ( τ ) BT ( τ )(Ωτ0) dτ of system
t0
(
        <xref ref-type="bibr" rid="ref5">5</xref>
        ) is associated with certain difficulties, since it is difficult to write down the fundamental matrix
Ωtt of the solutions of the corresponding homogeneous system is not always possible. It turns out
0
that in the case of smooth matrices A (t ) and B (t ) (whose elements are continuously differentiable
functions up to a certain order) there is a sufficient condition for the global controllability of the
system (
        <xref ref-type="bibr" rid="ref5">5</xref>
        ), which does not require knowledge of the fundamental matrix of the system (
        <xref ref-type="bibr" rid="ref6">6</xref>
        ).
      </p>
      <p>We assume that A (t ) ∈ C n−2 [ t 0 , t1] , B (t ) ∈ C n−1 [ t 0 , t1] , i.e., matrix elements A (t ) are
continuously differentiable functions up to and including order n−2 , and matrix elements are
the form</p>
      <p>t1
Gt0 , t1    B BT  d
t0</p>
      <p>.
Theorem 3. Let there exist ~t∈ [ t 0 , t1] such that the rank of the matrix W (t ) is equal to the</p>
      <sec id="sec-4-1">
        <title>Then system (5) is globally controllable.</title>
        <p>
          Proof. First, consider the case when A (t )≡0 . In this case, the operator (
          <xref ref-type="bibr" rid="ref18">18</xref>
          ) is only a
differentiation operator and the matrix (
          <xref ref-type="bibr" rid="ref19">19</xref>
          ) takes the form
        </p>
        <p>2
W t    Bt , d Bt , d
 dt dt 2</p>
        <p>d n1
Bt ,..., dt n1 Bt 
 .</p>
        <p>Since under the condition A (t )≡0 fundamental solution matrix Ωtt ¿ I n , the Gram matrix has
0
B (t ) —up to n−1 and including order.</p>
      </sec>
      <sec id="sec-4-2">
        <title>Let’s enter the operator</title>
        <p>Let denote the matrix byW (t )</p>
        <p>W t   Bt , Bt , 2Bt ,..., n1Bt 
which consists of n rows and nm columns.
number of its rows, i.e.,
   At  d </p>
        <p>
          dt .
rangW ~t  n .
(
          <xref ref-type="bibr" rid="ref18">18</xref>
          )
(
          <xref ref-type="bibr" rid="ref19">19</xref>
          )
(
          <xref ref-type="bibr" rid="ref20">20</xref>
          )
(
          <xref ref-type="bibr" rid="ref21">21</xref>
          )
(22)
Assume that the matrix (22) is degenerate. Then there exists a nonzero vector z ∈ Rn such that
G [ t 0 , t1] z=0 . It follows from this:
        </p>
        <p>t1 t1
0=⟨G [ t 0 , t1] z , z ⟩=∫ ⟨ B ( τ ) BT ( τ ) z , z ⟩ dτ =∫‖BT ( τ ) z‖2 dτ ,</p>
        <p>t0 t0
and this is possible only in the case when BT ( τ ) z≡0 ∀ τ ∈ [ t 0 , t1] . Thus, we have the identity
zT B ( τ )≡0 , by differentiating which we obtain the following identities:
zT ddt B (t )≡0 , zT ddt 2 B (t )≡0 , . . . , zT ddtnn−−11 B (t )≡0 ∀ t ∈ [ t 0 , t1] .</p>
        <p>2</p>
        <p>
          This implies a linear dependence of the rows of the matrix (
          <xref ref-type="bibr" rid="ref21">21</xref>
          ), which contradicts condition (
          <xref ref-type="bibr" rid="ref20">20</xref>
          )
for this matrix.
        </p>
        <p>
          Now consider the general case when the matrix A (t ) is not identically equal to zero. Let’s
replace variables in the system (
          <xref ref-type="bibr" rid="ref5">5</xref>
          )
        </p>
        <p>
          x  tt0 y
where Ωtt0 is the fundamental solution matrix of the system (
          <xref ref-type="bibr" rid="ref6">6</xref>
          ). We will have
x˙=( ddt Ωtt0) y +Ωtt0 ˙ y = A (t ) Ωtt0 y +Ωtt0 ˙ y = A (t ) Ωtt0 y + B (t ) u .
        </p>
        <p>.</p>
        <p>Based on (26), we write down the derivative matrices (25):
d ~B (t )=( ddt Ωtt0)B (t )+Ωtt0( ddt B (t ))=−Ωtt0 A (t ) B (t )+Ωtt0 ddt B (t )=Ωtt0 ΔB (t ) ,
dt
d2 ~B (t )= d (Ωtt0 ΔB (t ))=Ωtt0 Δ2 B (t ) , . . . ,
dt 2 dt
dn−1
dt n−1</p>
        <p>~ B (t )=Ωtt0 Δn−1 B (t ) .</p>
      </sec>
      <sec id="sec-4-3">
        <title>From here</title>
        <p>where is indicated
where</p>
        <p>
          Thus, by replacing variables (23), system (
          <xref ref-type="bibr" rid="ref5">5</xref>
          ) is transformed into system (24), in which the first
term is missing ~A (t ) y . Let us now find the matrix (
          <xref ref-type="bibr" rid="ref21">21</xref>
          ), which is replaced from B (t ) to ~B (t ) . To
t
calculate the derivative of the inverse matrix, we differentiate the identity Ωt0⋅Ωtt ≡ I n . We get
0
y  B~t u
        </p>
        <p>B~t   tt0 Bt  .
( ddt Ωtt0)⋅Ωtt0 +Ωtt0× A (t ) Ωtt0×0 ,
ddt tt0  tt0 At 
(23)
(24)
(25)
(26)</p>
        <p>Since the fundamental solution matrix is a nondegenerate matrix, the rank of the matrix W¯ (t )
is the same as the rank of the matrix W (t ) . This completes the proof of the theorem.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. Controllability conditions for linear systems with constant coefficients</title>
      <p>
        Let’s consider a system of differential equations with constant coefficients (which is most often the
case in practice since the indicators of threat probabilities and system security are usually
numerical)
where A is a constant square matrix of dimension n×n , B is a constant rectangular matrix
consisting of n rows and m columns, u is a control vector function. The matrix (
        <xref ref-type="bibr" rid="ref19">19</xref>
        ) in this case is
constant: ( B ,− AB , A2 B , . . . , (−1)n−1 An−1 B ) . It is easy to see that changing the sign does not
affect the rank of this matrix. Thus, based on Theorem 3, we can state that for the global
controllability of the system (27) it is sufficient that
      </p>
      <p>x  Ax  Bu ,
rangB, AB, A2B,..., An1B  n .</p>
      <p>This fact was established in the second half of the twentieth century by Kalman [20]. It turns
out that equality (28) is not only sufficient but also a necessary condition for the global
controllability of the system (27). That is, the following theorem holds.</p>
      <p>Theorem 4. (Kalman) System (27) is globally controllable if and only if condition (28) is
satisfied.</p>
      <sec id="sec-5-1">
        <title>Let’s prove the necessity.</title>
        <p>The matrix Ωtt of a linear system x˙= Ax with constant coefficients, which corresponds to
0
system (27), can always be written in the form:
tt0  eAtt0   In  At  t0  21! A2 t  t0 2  31! A3 t  t0 3  ...
.</p>
        <p>Let’s assume that rang ( B , AB , A2 B , . . . , An−1 B )&lt;n . Then there exists a nonzero vector
η ∈ Rn such that ηT W =0 , where W =( B , AB , A2 B , . . . , An−1 B ) . This means that equalities are
fulfilled</p>
        <p> T B  0, T AB  0, T A2B  0, ... , T An1B  0 .</p>
        <p>We will show that then for any natural value j the equality holds
 T A j B  0, j  1, 2, ....
(27)
(28)
(29)
(30)
(31)</p>
        <p>We use the well-known Cayley-Hamilton theorem [21], which states that any square matrix
satisfies its characteristic equation. That is, if the characteristic equation of the matrix A
det ( A − λI n)=0 is written in the form λn+ α1 λn−1+ α2 λn−2+. . .+ α n−1 λ + α n=0 , then the
equality is correct</p>
        <p>An  1 An1  2 An2  ...  n1 A  n In  0
where 0 on the right-hand side means the zero matrix.</p>
      </sec>
      <sec id="sec-5-2">
        <title>From equality (32) we have:</title>
        <p>An B   1 An1B  2 An2 B  ...  n1 AB  n B .</p>
        <p>Multiplying both parts of equality (33) by a non-zero string vector ηT , we have:
(32)
(33)
(35)
the same way, we obtain equalities (31) for all-natural ones j .</p>
        <p>Assume that the system (27) is globally controlled. Then the system of integral equations
t1
∫ e A (τ−t0) Bu ( τ ) dτ = y must have continuous solutions for any fixed vector. In particular, there is
t0
a solution u= ~u( τ ) also for y =η , that is, the equality holds
{x˙2= x1+ x3+b2 u ,
x˙1= x2+ x3+b1 u ,
x˙3= x1+ x2+b3 u
t0</p>
      </sec>
      <sec id="sec-5-3">
        <title>Given (29), let’s write equality (35) in the form</title>
        <p>∫t1 [ B + AB (t −t 0)+ 1 A2 B (t −t 0)2+ 1 A3 B (t −t 0)3+. . .] ~u( τ ) dτ =η .</p>
        <p>t0 2 ! 3 !</p>
        <p>We multiply both parts of the obtained equality from the left by the row vector ηT . At the same
time, the left part will turn into 0, because all terms of the expression under the sign of the integral
will turn into 0, and the right will be ‖η‖2≠0 . The resulting contradiction proves the necessity of
condition (28). The theorem is proved.</p>
        <p>Note. For the linear system (27) with constant coefficients, it does not matter on which segment
the global controllability is considered. If the system (27) is globally controllable on the interval
[ 0 , 1] , for example, then it will be globally controllable on any interval [ t 0 , t1] .
Example 1. Prove that the system
with a scalar control function u=u (t ) cannot be globally controlled, no matter what the constant
coefficients are bi , i=1 , 2 , 3 .</p>
        <p>Proof. Let’s write down the matrices</p>
        <p>0 1 1 b1
A =(1 0 1 ), B=(b2 )</p>
        <p>1 1 0 b3
and calculate the control matrix</p>
        <p>b1
W =( B , AB , A2 B )=(b2
b3
b2+b3
b1+b3
b1+b2
2 b1+b2+b3
b1+2 b2+b3 ).
b1+b2+2 b3</p>
        <p>The determinant of this matrix is equal to zero for any volume bi , i=1 , 2 , 3 , therefore,
rangW &lt;3 . That is, the necessary condition of global controllability is not fulfilled and therefore
the system is not globally controllable.</p>
        <p>Note that if the scalar control function is replaced by a vector control function in this system,
the system will become globally controllable. For example, the system
{x˙2= x1+ x3+u2 ,
x˙1= x2+ x3+u1 ,</p>
        <p>x˙3= x1+ x2
is globally managed.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>Conclusions</title>
      <p>Cyber security is one of the components of the state’s information security. Therefore, an
important task is the control of protection systems. The paper analyses the conditions of global
controllability of stationary and non-stationary linear systems of differential equations used to
model dynamic processes in the information space. In particular, the necessary and sufficient
conditions for the global controllability of linear models in cybersecurity problems are presented.
These conditions ensure effective control of dynamic processes even in the presence of a complex
system structure.</p>
      <p>The obtained results can be used to develop optimal strategies for managing information
security in the context of the dynamic development of cyber threats. They also contribute to
improving the efficiency of critical information systems protection. An important area for further
research is the adaptation of the developed approaches to nonlinear systems, as well as the
consideration of stochastic factors that can significantly affect the dynamics of processes in the
information space.</p>
    </sec>
    <sec id="sec-7">
      <title>Declaration on Generative AI</title>
      <p>While preparing this work, the authors used the AI programs Grammarly Pro to correct text
grammar and Strike Plagiarism to search for possible plagiarism. After using this tool, the authors
reviewed and edited the content as needed and took full responsibility for the publication’s content.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>S.</surname>
          </string-name>
           Shevchenko,
          <string-name>
            <given-names>Y.</given-names>
             
            <surname>Zhdanova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
             
            <surname>Kryvytska</surname>
          </string-name>
          ,
          <string-name>
            <surname>H.</surname>
          </string-name>
           
          <article-title>Shevchenko, Fuzzy cognitive MAPPING as a scenario approach for information security risk analysis</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems II</source>
          , vol.
          <volume>3826</volume>
          ,
          <year>2024</year>
          ,
          <fpage>356</fpage>
          -
          <lpage>362</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2] Á. 
          <string-name>
            <surname>Martín del Rey</surname>
          </string-name>
          , G. 
          <article-title>Rodríguez Sánchez, Application to cybersecurity of the stability theory of the systems of ordinary differential equations, Geometry, Algebra</article-title>
          and Applications: From Mechanics to Cryptography,
          <volume>161</volume>
          (
          <year>2016</year>
          ). doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -32085-4_
          <fpage>14</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>W.</surname>
          </string-name>
           Liu,
          <string-name>
            <surname>S.</surname>
          </string-name>
           Zhong,
          <article-title>Web malware spread modelling and optimal control strategies</article-title>
          ,
          <source>Sci. Rep</source>
          .
          <volume>7</volume>
          (
          <year>2017</year>
          ). doi:
          <volume>10</volume>
          .1038/srep42308
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>J. Diamantino</given-names>
            <surname>Hernández</surname>
          </string-name>
          <string-name>
            <given-names>Guillén</given-names>
            , Á. 
            <surname>Martín del Rey</surname>
          </string-name>
          , R. Casado Vara,
          <article-title>On the optimal control of a malware propagation model</article-title>
          ,
          <source>Math. 8(9)</source>
          (
          <year>2020</year>
          ). doi:
          <volume>10</volume>
          .3390/math8091518
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>I. V.</surname>
          </string-name>
           
          <article-title>Kononovich, Dynamics of the number of information security incidents</article-title>
          ,
          <source>Inform. Math. Methods in Simulation</source>
          ,
          <volume>4</volume>
          (
          <issue>1</issue>
          ) (
          <year>2014</year>
          )
          <fpage>35</fpage>
          -
          <lpage>43</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6] І. 
          <string-name>
            <surname>Kononovich</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
           Mayevskiy,
          <string-name>
            <surname>R.</surname>
          </string-name>
           Podobniy,
          <article-title>Models of system of the cibersecurity providing with delay of reaction on incidents</article-title>
          ,
          <source>Inf. Math. Methods Simul</source>
          .
          <volume>5</volume>
          (
          <issue>4</issue>
          ) (
          <year>2015</year>
          )
          <fpage>339</fpage>
          -
          <lpage>346</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>S.</given-names>
             
            <surname>Yevseiev</surname>
          </string-name>
          , et al.,
          <article-title>Modeling the Protection of Personal Data from Trust and the Amount of Information on Social Networks</article-title>
          ,
          <source>EUREKA: Phys. Eng</source>
          .
          <volume>1</volume>
          (
          <year>2021</year>
          )
          <fpage>24</fpage>
          -
          <lpage>31</lpage>
          . doi:
          <volume>10</volume>
          .21303/
          <fpage>2461</fpage>
          -
          <lpage>4262</lpage>
          .
          <year>2021</year>
          .001615
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>S.</given-names>
             
            <surname>Yevseiev</surname>
          </string-name>
          , et. al.
          <article-title>Development of a method for assessing the security of cyber-physical systems based on the Lotka-Volterra model</article-title>
          ,
          <source>Eastern-European J. Enterp. Technol</source>
          .
          <volume>5</volume>
          (
          <issue>9</issue>
          ) (
          <year>2021</year>
          )
          <article-title>(113)</article-title>
          . doi:
          <volume>10</volume>
          .15587/
          <fpage>1729</fpage>
          -
          <lpage>4061</lpage>
          .
          <year>2021</year>
          .241638
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>S.</given-names>
             
            <surname>Shevchenko</surname>
          </string-name>
          , et. al.,
          <article-title>Conflict analysis in the “subject-to-subject” security system</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3421</volume>
          ,
          <year>2023</year>
          ,
          <fpage>56</fpage>
          -
          <lpage>66</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <source>[10] I. </source>
          <string-name>
            <surname>Karpovich</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
           
          <string-name>
            <surname>Hladka</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
           
          <article-title>Tymrakevych, Methodology for assessing the impact of information threats in the conditions of information confrontation</article-title>
          ,
          <source>Electron Prof. Sci. J. Cybersecur. Educ. Sci. Tech</source>
          .
          <volume>2</volume>
          (
          <issue>26</issue>
          ) (
          <year>2024</year>
          )
          <fpage>212</fpage>
          -
          <lpage>222</lpage>
          . doi:
          <volume>10</volume>
          .28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2024</year>
          .
          <volume>24</volume>
          .8189
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>J. B. Baillieul</surname>
          </string-name>
          , J. C. Willems, Mathematical controltheory,
          <source>NewYork</source>
          , Springer-Verlag,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>F.</given-names>
             
            <surname>Fairman</surname>
          </string-name>
          ,
          <article-title>Linear control theory: The state space approach</article-title>
          , John Wiley and Sons,
          <year>1998</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>D.</surname>
          </string-name>
           U. Kirk,
          <source>Optimal control theory. An Introduction</source>
          , Mineola, New York:,Dover,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>V. F.</given-names>
             
            <surname>Krotov</surname>
          </string-name>
          ,
          <article-title>Global methods in optimal control theory</article-title>
          . New York, Marcel Dekker,
          <year>1996</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>P.</given-names>
             
            <surname>Chen</surname>
          </string-name>
          , S. Cheng, K. 
          <string-name>
            <surname>Chen</surname>
          </string-name>
          ,
          <article-title>Optimal control of epidemic information dissemination over networks</article-title>
          ,
          <source>in: IEEE Trans. Cybern</source>
          .
          <volume>44</volume>
          (
          <issue>12</issue>
          ),
          <year>2014</year>
          ,
          <fpage>2316</fpage>
          -
          <lpage>2328</lpage>
          . doi:
          <volume>10</volume>
          .1109/TCYB.
          <year>2014</year>
          .2306781
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>P.</surname>
          </string-name>
           Sungu Ngoy,
          <string-name>
            <given-names>K.</given-names>
             
            <surname>Musumbu</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.</surname>
          </string-name>
           
          <article-title>Kioi Gathungu, A mathematical modeling approach in cybersecurity using deep neural learning</article-title>
          ,
          <source>Int. J. Adv. Res. Sci. Eng</source>
          . Technol.
          <volume>8</volume>
          (
          <issue>60</issue>
          ) (
          <year>2021</year>
          )
          <fpage>17570</fpage>
          -
          <lpage>17587</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>V.</surname>
          </string-name>
           
          <article-title>Negodenko, Application of the mathematical catastrophe theory to ensure the stability of the information security management system</article-title>
          ,
          <source>Electron Prof. Sci. J. Cybersecur. Educ. Sci. Tech</source>
          .
          <volume>2</volume>
          (
          <issue>26</issue>
          ), (
          <year>2024</year>
          ).
          <fpage>212</fpage>
          -
          <lpage>222</lpage>
          . doi:
          <volume>10</volume>
          .28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2024</year>
          .
          <volume>26</volume>
          .692
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>R. </given-names>
            <surname>Syrotynskyi</surname>
          </string-name>
          , et al.,
          <article-title>Methodology of network infrastructure analysis as part of migration to zero-trust architecture</article-title>
          ,
          <source>in: Cyber Security and Data Protection</source>
          , vol.
          <volume>3800</volume>
          (
          <year>2024</year>
          )
          <fpage>97</fpage>
          -
          <lpage>105</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>S.</given-names>
             
            <surname>Gnatyuk</surname>
          </string-name>
          , et al.,
          <article-title>Method for managing IT incidents in critical information infrastructure facilities</article-title>
          ,
          <source>in: Cybersecurity Providing in Information and Telecommunication Systems II</source>
          , vol.
          <volume>3826</volume>
          (
          <year>2024</year>
          )
          <fpage>326</fpage>
          -
          <lpage>333</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20] R. E. 
          <string-name>
            <surname>Kalman</surname>
          </string-name>
          , Y. C. 
          <string-name>
            <surname>Ho</surname>
          </string-name>
          , K. S. Narendra,
          <article-title>Controllability of linear dynamical systems</article-title>
          ,
          <source>Contr. Diff. Eqs</source>
          .
          <volume>1</volume>
          (
          <year>1963</year>
          )
          <fpage>189</fpage>
          -
          <lpage>213</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>M. F. Atiyah</surname>
          </string-name>
          , I. G. MacDonald, Introduction to commutative algebra, Westview Press,
          <year>1969</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>