ANALYSIS OF THE RESULTS OF SIMULATIVE MODELLING OF THE INFORMATION SECURITY SYSTEM IN THE CORPORATE NETWORKS OF HIGHER EDUCATION INSTITUTIONS

The analysis shows that the insufficient level of information security in service networks is the main cause of huge losses for enterprises. Despite the appearance of a number of works to solve this problem, there is currently no unified system for assessing information security. This shows that th...

Full description

Saved in:
Bibliographic Details
Main Authors: Vagif Gasimov, Balami Ismailov
Format: Article
Language:English
Published: Institute for Digitalisation of Education of the NAES of Ukraine 2024-09-01
Series:Інформаційні технології і засоби навчання
Subjects:
Online Access:https://journal.iitta.gov.ua/index.php/itlt/article/view/5757
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1823864053872721920
author Vagif Gasimov
Balami Ismailov
author_facet Vagif Gasimov
Balami Ismailov
author_sort Vagif Gasimov
collection DOAJ
description The analysis shows that the insufficient level of information security in service networks is the main cause of huge losses for enterprises. Despite the appearance of a number of works to solve this problem, there is currently no unified system for assessing information security. This shows that this problem has not yet been sufficiently studied and relevant. This work is one of the steps towards creating a system for assessing information security in service networks. The purpose of the work is to develop an algorithm and simulation model, analyze the results of the simulation model to determine the main characteristics of the information security system (ISS), providing the ability to completely close all possible channels of threats by controlling all unauthorized access (UA) requests through the protection mechanism (PM). To solve the problem, a simulation method was applied using the principles of queuing systems (QS). This method makes it possible to obtain the main characteristics of the ISS from the UA with an unlimited amount of buffer memory (BM). Models, an algorithm and a methodology for the development of ISS from UA are proposed, which is considered as a single-phase multi-channel QS with an unlimited volume of BM. The process of obtaining simulation results was implemented in the GPSS World modeling system and comparative analyzes of the main characteristics of the ISS were carried out for various laws of distribution of output parameters. At the same time, UA requests were the simplest flows, and the service time was subject to exponential, constant and Erlang distribution laws. Conducted experiments based on the proposed models and algorithm for analyzing the characteristics of the ISS from the UA as a single-phase multi-channel QS with unlimited waiting time for requests in the queue confirmed the expected results. The results obtained can be used to build new or modify existing ISS in corporate networks for servicing objects for various purposes. This work is one of the approaches to generalizing the problems under consideration for systems with an unlimited volume of BM. Prospects for further research include research and development of the principles of hardware and software implementation of ISS in service networks.
format Article
id doaj-art-0695f635d9c948ca8b97685edc4c458e
institution Kabale University
issn 2076-8184
language English
publishDate 2024-09-01
publisher Institute for Digitalisation of Education of the NAES of Ukraine
record_format Article
series Інформаційні технології і засоби навчання
spelling doaj-art-0695f635d9c948ca8b97685edc4c458e2025-02-09T08:37:09ZengInstitute for Digitalisation of Education of the NAES of UkraineІнформаційні технології і засоби навчання2076-81842024-09-01102410.33407/itlt.v102i4.5757ANALYSIS OF THE RESULTS OF SIMULATIVE MODELLING OF THE INFORMATION SECURITY SYSTEM IN THE CORPORATE NETWORKS OF HIGHER EDUCATION INSTITUTIONSVagif Gasimov0https://orcid.org/0000-0003-3192-4225Balami Ismailov1https://orcid.org/0009-0002-3013-9161Azerbaijan Technical University, Baku, AzerbaijanNational Aviation Academy, Baku, Azerbaijan The analysis shows that the insufficient level of information security in service networks is the main cause of huge losses for enterprises. Despite the appearance of a number of works to solve this problem, there is currently no unified system for assessing information security. This shows that this problem has not yet been sufficiently studied and relevant. This work is one of the steps towards creating a system for assessing information security in service networks. The purpose of the work is to develop an algorithm and simulation model, analyze the results of the simulation model to determine the main characteristics of the information security system (ISS), providing the ability to completely close all possible channels of threats by controlling all unauthorized access (UA) requests through the protection mechanism (PM). To solve the problem, a simulation method was applied using the principles of queuing systems (QS). This method makes it possible to obtain the main characteristics of the ISS from the UA with an unlimited amount of buffer memory (BM). Models, an algorithm and a methodology for the development of ISS from UA are proposed, which is considered as a single-phase multi-channel QS with an unlimited volume of BM. The process of obtaining simulation results was implemented in the GPSS World modeling system and comparative analyzes of the main characteristics of the ISS were carried out for various laws of distribution of output parameters. At the same time, UA requests were the simplest flows, and the service time was subject to exponential, constant and Erlang distribution laws. Conducted experiments based on the proposed models and algorithm for analyzing the characteristics of the ISS from the UA as a single-phase multi-channel QS with unlimited waiting time for requests in the queue confirmed the expected results. The results obtained can be used to build new or modify existing ISS in corporate networks for servicing objects for various purposes. This work is one of the approaches to generalizing the problems under consideration for systems with an unlimited volume of BM. Prospects for further research include research and development of the principles of hardware and software implementation of ISS in service networks. https://journal.iitta.gov.ua/index.php/itlt/article/view/5757unauthorized access (UA)information security systems (ISS)information securityqueuing systems (QS)protection mechanism (PM)simulation modeling
spellingShingle Vagif Gasimov
Balami Ismailov
ANALYSIS OF THE RESULTS OF SIMULATIVE MODELLING OF THE INFORMATION SECURITY SYSTEM IN THE CORPORATE NETWORKS OF HIGHER EDUCATION INSTITUTIONS
Інформаційні технології і засоби навчання
unauthorized access (UA)
information security systems (ISS)
information security
queuing systems (QS)
protection mechanism (PM)
simulation modeling
title ANALYSIS OF THE RESULTS OF SIMULATIVE MODELLING OF THE INFORMATION SECURITY SYSTEM IN THE CORPORATE NETWORKS OF HIGHER EDUCATION INSTITUTIONS
title_full ANALYSIS OF THE RESULTS OF SIMULATIVE MODELLING OF THE INFORMATION SECURITY SYSTEM IN THE CORPORATE NETWORKS OF HIGHER EDUCATION INSTITUTIONS
title_fullStr ANALYSIS OF THE RESULTS OF SIMULATIVE MODELLING OF THE INFORMATION SECURITY SYSTEM IN THE CORPORATE NETWORKS OF HIGHER EDUCATION INSTITUTIONS
title_full_unstemmed ANALYSIS OF THE RESULTS OF SIMULATIVE MODELLING OF THE INFORMATION SECURITY SYSTEM IN THE CORPORATE NETWORKS OF HIGHER EDUCATION INSTITUTIONS
title_short ANALYSIS OF THE RESULTS OF SIMULATIVE MODELLING OF THE INFORMATION SECURITY SYSTEM IN THE CORPORATE NETWORKS OF HIGHER EDUCATION INSTITUTIONS
title_sort analysis of the results of simulative modelling of the information security system in the corporate networks of higher education institutions
topic unauthorized access (UA)
information security systems (ISS)
information security
queuing systems (QS)
protection mechanism (PM)
simulation modeling
url https://journal.iitta.gov.ua/index.php/itlt/article/view/5757
work_keys_str_mv AT vagifgasimov analysisoftheresultsofsimulativemodellingoftheinformationsecuritysysteminthecorporatenetworksofhighereducationinstitutions
AT balamiismailov analysisoftheresultsofsimulativemodellingoftheinformationsecuritysysteminthecorporatenetworksofhighereducationinstitutions