The article discusses the possibilities of modifying the genetic algorithm (GA) to solve the problem of selecting and optimizing the configuration of information protection tools (IPT) for the security circuits of information and communication systems (ICS). The scientific novelty of the work lies in the fact that the GA proposes the use of the total amount of risks from information loss, as well as the integral indicator of IPT and cost indicators for each class of IPT, as criteria for optimizing the composition of IPT. The genetic algorithm in the problem of optimizing the choice of the composition of IPT for ICS is considered as a variation of the problem associated with multi-selection. In this regard, the optimization of the IPT placement along the ICS protection circuits is considered as a modification of the combinatorial knapsack problem. The GA used in the computing core of the decision support system (DSS) differs from the standard GA. As a part of the GA modification, the chromosomes are presented in the form of matrices, the elements of which are numbers that correspond to the IPT numbers in the ICS nodes. In the process of modifying the GA, a k-point crossing-over was applied. A fitness function is presented as the sum of efficiency factors. At the same time, in addition to the traditional absolute indicators of the IPT efficiency, the total value of risks from information loss, as well as cost indicators for each class of IPT are taken into account. The practical value of the research lies in the implementation of DSS based on the proposed modification of GA. Computational experiments on the selection of a rational software algorithm for implementing the model are performed. It is shown that the implementation of the GA in DSS allows to accelerate the search for optimal variants of cybersecurity (CS) tools placement for ICS by more than 25 times. This advantage allows not only to quickly search through the variety of hardware-software IPT and their combinations for ICS, but also to combine the proposed algorithm with the available models and algorithms for optimizing the composition of the ICS cybersecurity circuits. Potentially, such a combination of models and algorithms will make it possible to quickly rebuild the ICS protection, adjusting its profiles in accordance with new threats and classes of cyber attacks.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.