EVALUATION OF ALTERNATIVE SOLUTIONS FOR THE EFFECTIVE STRUCTURE OF THE CYBER SECURITY SYSTEM IN CRITICAL INFORMATION INFRASTRUCTURES BY THE HIERARCHICAL ANALYSIS METHOD

Main Article Content

Vagif Gasimov
Jabir Mammadov
Islam Islamov
Elshan Hashimov

Abstract

The subject matter of this article is the evaluation of alternative solutions for ensuring cyber security of critical information infrastructures and the selection of a more effective solution. The goal of the study is to create a cybersecurity system with an effective structure for critical information infrastructures. The tasks to be solved include determining the methods, tools, and measures to be included in the system. For this purpose, the hierarchical analysis method was used, and first of all, the decomposition of the problem was given and the corresponding hierarchical structure was compiled.  On the basis of expert evaluations for each level of the hierarchical structure, pairwise comparison matrices of alternatives and priorities were constructed and their priority vectors were calculated sequentially. Taking into account the main priorities vector (Confidentiality, Integrity, Availability, Manageability), the degrees of importance of information protection measures (methods and means) were calculated and sorted according to the pairwise preference relations of alternative solutions obtained from the synthesis of the intermediate priorities vector (Physical Security, Network Security, Data Security, Application Security, Access Security). As a result of such a ranking, it is possible to determine which security measures should be given more importance to ensure the cyber security of critical information infrastructures. Conclusion. Thus, based on the hierarchical analysis method, it is possible to quantitatively evaluate alternative solutions for ensuring cyber security of critical information infrastructures, which allows for easy ranking of these solutions by degree of importance. As a result, an effective decision can be made about which methods are more important to include in the cyber security system, and which are relatively less important. The corresponding calculations and analyses were performed on the example of special purpose organizations based on a generalized hierarchical scheme of the cyber security system of critical infrastructures. Thus, the information infrastructure of one of the organizations producing special equipment was taken as the object of the study. According to the obtained results, it was determined that among the methods, means and measures of security, cryptographic and steganographic methods of data protection for this type of organization have higher degrees of importance than others.

Article Details

How to Cite
Gasimov , V. ., Mammadov , J. ., Islamov , I. ., & Hashimov , E. . (2026). EVALUATION OF ALTERNATIVE SOLUTIONS FOR THE EFFECTIVE STRUCTURE OF THE CYBER SECURITY SYSTEM IN CRITICAL INFORMATION INFRASTRUCTURES BY THE HIERARCHICAL ANALYSIS METHOD. Advanced Information Systems, 10(2), 87–99. https://doi.org/10.20998/2522-9052.2026.2.10
Section
Methods of information systems protection
Author Biographies

Vagif Gasimov , Baku Engineering University, Baku, Azerbaijan

Doctor of Technical Sciences, Professor, Dean of Information and Computer Technologies Faculty

Jabir Mammadov , Baku Engineering University, Baku, Azerbaijan

Doctor of Philosophy in Engineering, Associate Professor, Head of the Department of Cybersecurity and Computer Engineering

Islam Islamov , Baku Engineering University, Baku, Azerbaijan

Doctor of Technical Sciences, Professor of the Department of Automation, Telecommunications and Energy

Elshan Hashimov , Azerbaijan Technical University, Baku, Azerbaijan

Doctor in National Security and Military Sciences, Professor of Azerbaijan Technical University, Baku, Azerbaijan;
Professor of National Defense University, Baku, Azerbaijan

References

Gasimov V.A. and Mammadov J.I. (2023), “Model and method for determining the optimal structure of a security system for critical information infrastructure”, Reports of BSUIR, vol. 21, no. 2, pp. 95–103, doi: https://doi.org/10.35596/1729-7648-2023-21-2-95-103

Saaty, T.(2008), “Decision making with the analytic hierarchy process”, International Journal of Services Sciences, vol. 1, no. 1, pp. 83–98, doi: https://doi.org/10.1504/IJSSCI.2008.017590

Arslan, M. (2020), “Application of AHP method for the selection of pharmaceutical warehouse location”, J. Fac. Pharm., vol. 44, no. 2, pp. 253–264, doi: https://doi.org/10.33483/jfpau.709528

Abdelouhed, F., Ahmed, A., Abdellah, A., Yassine, B., and Mohammed, I. (2022), “GIS and remote sensing coupled with analytical hierarchy process (AHP) for the selection of appropriate sites for landfills: a case study in the province of Ouarzazate”, Journal of Engineering and Applied Science, vol. 69, no. 19, pp. 1–23, doi: https://doi.org/10.1186/s44147-021-00063-3

Helingo, M., Purwandari, B., Satria, R., and Solichah, I. (2017), “The Use of Analytic Hierarchy Process for Software Development Method Selection: A Perspective of e-Government in Indonesia”, Procedia Computer Science, vol. 124, pp. 405–414, doi: https://doi.org/10.1016/j.procs.2017.12.171

Aydın, Z. (2025), “Detecting Cybersecurity Threats in Digital Energy Systems Using Deep Learning for Imbalanced Datasets”, International Journal of Energy Economics and Policy, vol. 15, no. 3, pp. 614–628, doi: https://doi.org/10.32479/ijeep.19649

Kouskoura, A., Kalliontzi, E., Skalkos, D. and Bakouros, I. (2025), “Analysis of Results of Experts’ Perspectives of Sustainable Regional Competitiveness Using the Analytic Hierarchy Process Multi-Criteria Method”, Sustainability, vol. 17, 2681, doi: https://doi.org/10.3390/su17062681

Zaburko, J. and Szulżyk-Cieplak, J. (2019), “Information security risk assessment using the AHP method”, IOP Conference Series Mater. Sci. Eng., vol. 710, no. 1, art. numb. 12036, doi: https://doi.org/10.1088/1757-899X/710/1/012036.2019

Nurhayati, A., Gautama, A. and Naseer, M.(2018), “Decision making model design for antivirus software selection using Factor Analysis and Analytical Hierarchy Process”, MATEC Web of Conferences, vol. 154, pp. 1–6, doi: https://doi.org/10.1051/matecconf/201815403006

Meng, M. and Enping, L. (2015), “The Application Research of Information Security Risk Assessment Model Based on AHP Method”, Journal of Advances in Information Technology, vol. 6, no. 4, pp. 201–206, doi:

https://doi.org/10.12720/jait.6.4.201-206

Ming-Chang, L. (2014), “Information Security Risk Analysis Methods and Research Trends: AHP and Fuzzy Comprehensive Method”, International Journal of Computer Science & Information Technology, vol 6, no. 1, pp. 29–45, doi: https://doi.org/10.5121/ijcsit.2014.6103

Haque, G.M.M., Akula, D.K., Mohammed, Y.S., Syed, A. and Arafat, Y. (2025), “Cybersecurity Risk Management in the Age of Digital Transformation: A Systematic Literature Review”, The American Journal of Engineering and Technology, vol. 7, no. 8, pp. 126–150, doi: https://doi.org/10.37547/tajet/Volume07Issue08-14

Rodney, A. (2017), “Using the Analytical Hierarchy Process Model in the Prioritization of Information Assurance Defense In-Depth Measures? - A Quantitative Study”, Journal of Information Security, vol. 8, no. 3, pp. 166–173, doi: https://doi.org/10.4236/jis.2017.83011

Semenov, S., Mozhaiev, O., Kuchuk, N., Mozhaiev, M., Tiulieniev, S., Gnusov, Yu., Yevstrat, D.,Chyrva, Y., Kuchuk, H. (2022), “Devising a procedure for defining the general criteria of abnormal behavior of a computer system based on the improved criterion of uniformity of input data samples”, Eastern-European Journal of Enterprise Technologies, vol. 6(4-120), pp. 40–49, doi: https://doi.org/10.15587/1729-4061.2022.269128

Hasanov, A.H., Hashimov, E.G. and Zulfugarov, B.S. (2023), “Comparative analysis of the efficiency of various energy storages”, Advanced Information Systems, vol. 7, no. 3, pp.74–80, doi: https://doi.org/10.20998/2522-9052.2023.3.11

Bayramov, A.A. and Hashimov, E.G. (2018), “Assessment of invisible areas and military objects in mountainous terrain”, Defence Science Journal, vol. 68(4), pp. 343–346, doi: https://doi.org/10.14429/dsj.68.11623

Kuchuk, H., Kalinin, Y., Dotsenko, N., Chumachenko, I. and Pakhomov, Y. (2024), “Decomposition of integrated high-density IoT data flow”, Advanced Information Systems, vol. 8, no. 3, pp. 77–84, doi: https://doi.org/10.20998/2522-9052.2024.3.09

Kharchenko, V., Kovalenko, A., Andrashov, A. and Siora, A. (2012), “Cyber security of FPGA-based NPP I&C systems:challenges and solutions”, 8th International Conference Topical Meeting on Nuclear Plant Instrumentation, Control and Human Machine Interface Technologies, San Diego, California, Westin San Diego, available at: https://www.researchgate.net/publication/319292444_CYBER_SECURITY_OF_FPGA-BASED_NPP_IC_SYSTEMS_CHALLENGES_AND_SOLUTIONS

Hashimov E.G. and Khaligov G. (2024), “The issue of training of the neural network for drone detection”, Advanced İnformation Systems, vol. 8, no. 3, pp. 53–58, doi: https://doi.org/10.20998/2522-9052.2024.3.06

Dergachov, K., Hurtovyi, O. and Hashimov, E. (20250, “Adaptive algorithm for visual positioning of UAVs in the local environment”, CEUR Workshop Proceedings, vol. 3981, pp. 103–114, available at: https://ceur-ws.org/Vol-3981/paper09.pdf

Song, C. and Qiao, Y. (2015), “A Novel Image Encryption Algorithm :Based on DNA Encoding and Spatiotemporal Chaos”, Entropy, vol. 17, pp. 6954–6968, doi: https://doi.org/10.3390/e17106954

Hashimov, E., Pashayev, A. and Khaligov, G. (2025), “Camera control algorithm and image quality assessment method to obtain a quality image”, Advanced Information Systems, vol. 9, no. 3, pp. 50–56, doi: https://doi.org/10.20998/2522-9052.2025.3.06

Li, P. and Zhang, X.(2024), “Image encryption algorithm based on a novel cascade chaotic system and DNA mutation”, Physica Scripta, vol. 99, no.10, doi: https://doi.org/10.1088/1402-4896/ad6f48

Gasimov V.A., Mammadov J.I. and Mammadzada N.F. (2022), “Stream encryption method based on the chaotic Brownian motion model of molecules”, International Conference on Innovative Data Communication Technologies and Application, Procedia Computer Science, vol. 215, pp. 577–588, doi: https://doi.org/10.1016/j.procs.2022.12.060

Gasimov V.A., Mammadzada N.F., Mammadov J.I., and Mustafayeva E.A. (2024), “Maze based image encryption method constructed by random number generation”, Eurasian Journal of Mathematical and Computer Applications, vol. 12, no. 3, pp. 35–50, doi: https://doi.org/10.32523/2306-6172-2024-12-3-35-50

Alia, M. and Suwais, K. (2020), “Improved Steganography Scheme based on Fractal Set”, The International Arab Journal of Information Technology (IAJIT), vol. 17(1), pp. 128–136, doi: https://doi.org/10.34028/iajit/17/1/15