INTEGRATIVE APPROACH TO THE ANALYSIS, MODELING, AND ENSURING CYBER SECURITY OF CRITICAL INFORMATION INFRASTRUCTURE UNDER MODERN THREATS
##plugins.themes.bootstrap3.article.main##
##plugins.themes.bootstrap3.article.sidebar##
Abstract
The present study explores contemporary approaches to the analysis, modelling and assurance of cyber security of critical information infrastructure in the face of modern threats. This text focuses on the utilisation of intelligent methods and advanced technologies for the protection of critical information infrastructure (CII). The objective of the present study is to employ an integrative approach to analysing, modelling, and ensuring the cyber security of CII in the face of contemporary threats. The methodological foundation of the study is a comprehensive analysis of scientific literature dedicated to the application of intelligent methods and technologies for the protection of CII. This includes both fundamental theoretical developments and practical aspects of implementing modern cyber security approaches, as well as experimental modelling of fraud detection processes in the CII of the financial sector. This modelling was conducted by the authors using artificial intelligence (AI) methods. A comparative analysis of concepts proposed by modern researchers is given particular emphasis, with the objective of identifying the main trends, development prospects, and potential areas for improving existing CII protection systems. In relation to the outcomes of the extension of scientific sources, it was determined that intelligent methodologies founded on machine learning and AI represent pivotal technologies for the effective safeguarding of critical infrastructure within the financial sector against contemporary cyberattacks and security threats. The results of the modelling of fraud detection processes in the CII of the financial sector of the economy allow an assessment of the effectiveness of the methods used, determination of their advantages and limitations, and formulation of recommendations for further improvement of cyber protection systems for the CII of the financial sector of the economy. The employment of an integrative approach, encompassing threat analysis, simulation modelling, artificial intelligence, and contemporary cyber defence technologies, facilitates the enhancement of the security of critical infrastructure and the effective response to emergent threats. The proposed solutions have the potential to facilitate the development of highly effective cyber defence systems in various critical infrastructure industries, including the financial, energy, and government sectors.
How to Cite
##plugins.themes.bootstrap3.article.details##
critical information infrastructure, cyber security, information security, intelligent learning methods, artificial intelligence, machine learning, neural networks
Sontan, A., & Segun, S. (2024). Merging trends in cyber security for criticalinfrastructure protection: a comprehensivereview. Computer Science & IT Research Journal, Volume 5, Issue 3.
Fotiadou, K., Velivassaki, T., Voulkidis, A., Skias, D., Tsekeridou, S., & Zahariadis, T. (2021). Network Traffic Anomaly Detection via Deep Learning. Information, 12(5). 215 p.
Gnatyuk, S., Sydorenko, V., Polozhentsev, A., & Sokolov, V. (2024). Method for managing IT incidents in critical information infrastructure facilities. CPITS-II 2024: Workshop on Cyber security Providing in Information and Telecommunication Systems II. Р. 323–336.
Vegesna, V. (2024). Machine Learning Approaches for Anomaly Detection in Cyber-Physical Systems: A Case Study in Critical Infrastructure Protection. International Journal of Machine Learning and Artificial Intelligence. Vol. 5. № 5. P. 1–13.
Selim, G., et al. (2021). Anomaly events classification and detection system in critical industrial internet of things infrastructure using machine learning algorithms. Multimedia Tools and Applications. Vol. 80. № 8. P. 12619–12640.
Kerimkhulle, S., Dildebayeva, Z., Tokhmetov, A., Amirova, A., Tussupov, J., Makhazhanova, U., & Salykbayeva, A. (2023). Fuzzy Logic and Its Application in the Assessment of Information Security Risk of Industrial Internet of Things. Symmetry, 15 (10). P. 1958.
Pinto, A. et al. (2023). Survey on intrusion detection systems based on machine learning techniques for the protection of critical infrastructure. Sensors. Vol. 23. № 5. P. 2415.
Aragonés Lozano, M., Pérez Llopis, I., & Esteve Domingo, M. (2023). Threat hunting system for protecting critical infrastructures using a machine learning approach. Mathematics. Vol. 11. № 16. P. 3448.
Raval, K. J., et al. (2023). A survey on safeguarding critical infrastructures: Attacks, AI security, and future directions. International Journal of Critical Infrastructure Protection. P. 147.
Alqudhaibi, A., et al. (2023). Predicting cyber security threats in critical infrastructure for industry 4.0: a proactive approach based on attacker motivations. Sensors. Vol. 23. № 9. P. 4539.
Balatska, V., & Opirskyy, I. (2024). Blockchain as a tool for transparency and protection of government registries. Ukrainian Scientific Journal of Information Security. Vol. 30, issue 2. P. 221–230.
Korniyenko, B. Y., Galata, L., & Ladieva, L. (2019). Mathematical Model of Threats Resistance in the Critical Information Resources Protection System. In: International Conference on Intelligent Tutoring Systems [online]. Kingston: ITS. Available at: https://ceur-ws.org/Vol-2577/paper23.pdf
Yevseiev, S., Hryshchuk, R., Molodetska, M., & Nazarkevych, M. (2022). Modeling of security systems for critical infrastructure facilities: monograph. Kharkiv: PC Technology Center. 196 p.
Shevchenko S., et al. (2023). Information Security Risk Management using Cognitive Modeling. Cyber security Providing in Information and Telecommunication Systems. Vol. 3550. P. 297–305.
Zhang, Y. et al. (2024). Edge propagation for link prediction in requirement-cyber threat intelligence knowledge graph. Information Sciences. Vol. 653. Pp. 119770.
Rabzelj, M., Bohak, C., Južnič, L., Kos, A., & Sedlar, U. (2023). Cyberattack Graph Modeling for Visual Analytics. IEEE Access. Vol. 11. Pp. 86910–86944.
Balatska, V., Poberezhnyk, V., Petriv P., & Opirskyy, I. (2024). Blockchain Application Concept in SSO Technology Context, CPITS-2024: Cyber security Providing in Information and Telecommunication Systems. P. 38–49.
Berardi, D., et al. (2023). Time sensitive networking security: issues of precision time protocol and its implementation. Cyber security. Vol. 6. № 1. P. 8.
Kim, T., & Pak, W. (2023). Deep Learning-Based Network Intrusion Detection Using Multiple Image Transformers. Applied Sciences. Vol. 13(5). P. 2754. DOI: https://doi.org/10.3390/app1305275
The number of fraud cases this year is already 1.6 times higher than for the entire year of 2021 (2024). Available at: https://opendatabot.ua/analytics/fraud-2024-5
Storchak, Y. (2024). Insider Threat Statistics for 2024: Reports, Facts, Actors, and Costs [online]. Available at: https://www.ekransystem.com/en/blog/insider-threat-statistics-facts-and-figures
Credit Card Fraud Detection. Available at: https://www.kaggle.com/datasets/mlg-ulb/creditcardfraud

This work is licensed under a Creative Commons Attribution 4.0 International License.