Model of cybernetic attacks intensity calculation in the electronic trading system on the stock market

Main Article Content

German Shuklin
https://orcid.org/0000-0003-2507-384X
Oleg Barabash
https://orcid.org/0000-0003-1715-0761

Abstract

The purpose of the article is to adapt existing mathematical models of intensive cybernetic attacks for use in the information security system and physical protection of electronic trading platforms in the stock market in modern conditions, as well as conditions for possible forecasts. Results. It is established that the modeling of the dependence of the flow of external cybernetic attacks on the electronic trading platforms of the stock market can be regarded as a sequence of alternating jumps and falls, which indicates the vibrational nature of the process of attack flow. It is substantiated that the system of cybernetic security of electronic trading platforms of stock markets is characterized by delay time. This creates the prerequisites for disturbing the stability of oscillations. The results of the research are of an applied nature and can be used to conduct experiments and predict the values of the parameters that characterize cyber attacks that are aimed at the electronic trading platforms of stock markets in order to eliminate them and prevent the information security of modern electronic trading technologies and mutual settlements. The dependencies, which are revealed in the modeling process, are adapted to the conditions of electronic trading and mutual settlements in stock markets and take into account the factors of confrontation to cybernetic attacks that are associated with the delay time. It is shown for the first time that it is possible to construct the dependences of the intensity of cybernetic attacks using linear differential equations with delay directed at information and telecommunication means of information security of the cybernetic space of the stock market. The new approach makes it possible to influence the instability of the predator-prey oscillatory process by adjusting the delay time and at the same time to determine the parameters that affect the stability margin. The results obtained make it possible to construct a functional dependence of the intensity of cybernetic attacks on time. This makes it possible to timely implement the necessary actions aimed at information protection of the cybernetic space of the stock market.

Article Details

How to Cite
Shuklin, G., & Barabash, O. (2018). Model of cybernetic attacks intensity calculation in the electronic trading system on the stock market. Advanced Information Systems, 2(3), 111–114. https://doi.org/10.20998/2522-9052.2018.3.19
Section
Methods of information systems protection
Author Biographies

German Shuklin, State University of Telecommunications, Kyiv

Senior Lecturer at the Department of Higher Mathematics

Oleg Barabash, State University of Telecommunications, Kyiv

Doctor of Technical Sciences, Professor, Head of the Department of Higher Mathematics

References

Pogosov, O.Yu. and Derevianko, О.V. (2017), “Modeli prikladnoy informatiki uchota kinetiki kiberneticheskih ugroz v sistemi fizicheskoy zashity AES”, Radioelectronics, computer science, control, No. 2, pp. 53-60.

Grishuk, R. (2012), “Differential-game method for evaluating the effectiveness of information security systems”, Modern in-formation security, No. 1, pp. 40-44.

Grishuk, R., Horoshko, V. and Hohlachova, Yu. (2012), “Use of differential games to optimize control in information security systems”, Modern information security, No. 2, pp. 21-26.

Horoshko, V. and Chernishev, О. (2012), “An algorithm for detecting attacks for information monitoring tools”, Modern in-formation security, No. 1, pp. 49-56.

Grishuk, R.V. and Molodetska, К.V. (2018), “Resolving the problem of providing information security of state in social net-working services”, Modern information security, No. 1 (33), pp. 43-53.

Grishuk, R.V. and Danik, Yu.H. (2016), Fundamental cyber security, Zhytomyr Military Institute the name of S.P. Korolev, Zhytomyr, 636 p.

Borsukovskii, Y. and Borsukovska, V. (2018), “Applied aspects of protection of information in modern conditions”, Modern information security, No. 2, pp. 6-11.

The Open Group Releases Maturity Model for Information Security Management, San Francisco, April 11, 2011, available at: http://www.opengroup.org/ (last accessed on May 30, 2018).

Computer security resoursce center, available at: http://csrc.nist.gov/Publications (last accessed on May 30, 2018).

Gregory B. White (2007), The Community Cyber Security Maturity Model, available at:

http://pdfs.semanticscholar.org/c76f/bfde67b7afcbae58ee7f2323fa9746d32f80.pdf (last accessed on May 30, 2018).

Zybin, S. (2017), “The one method to decision making support for formation of complex security information programs”, Mod-ern information security, No. 1, pp. 73-78.

Khusainov, D.Ya., Ivanov, A.F. and Shuklin G.V. (2005), “On a Representation of Solutions of Linear Delay Systems”, Dif-ferential Equations, Vol. 41, No. 7, pp. 1054-1058.