EVALUATION OF ALTERNATIVE SOLUTIONS FOR THE EFFECTIVE STRUCTURE OF THE CYBER SECURITY SYSTEM IN CRITICAL INFORMATION INFRASTRUCTURES BY THE HIERARCHICAL ANALYSIS METHOD
Main Article Content
Abstract
The subject matter of this article is the evaluation of alternative solutions for ensuring cyber security of critical information infrastructures and the selection of a more effective solution. The goal of the study is to create a cybersecurity system with an effective structure for critical information infrastructures. The tasks to be solved include determining the methods, tools, and measures to be included in the system. For this purpose, the hierarchical analysis method was used, and first of all, the decomposition of the problem was given and the corresponding hierarchical structure was compiled. On the basis of expert evaluations for each level of the hierarchical structure, pairwise comparison matrices of alternatives and priorities were constructed and their priority vectors were calculated sequentially. Taking into account the main priorities vector (Confidentiality, Integrity, Availability, Manageability), the degrees of importance of information protection measures (methods and means) were calculated and sorted according to the pairwise preference relations of alternative solutions obtained from the synthesis of the intermediate priorities vector (Physical Security, Network Security, Data Security, Application Security, Access Security). As a result of such a ranking, it is possible to determine which security measures should be given more importance to ensure the cyber security of critical information infrastructures. Conclusion. Thus, based on the hierarchical analysis method, it is possible to quantitatively evaluate alternative solutions for ensuring cyber security of critical information infrastructures, which allows for easy ranking of these solutions by degree of importance. As a result, an effective decision can be made about which methods are more important to include in the cyber security system, and which are relatively less important. The corresponding calculations and analyses were performed on the example of special purpose organizations based on a generalized hierarchical scheme of the cyber security system of critical infrastructures. Thus, the information infrastructure of one of the organizations producing special equipment was taken as the object of the study. According to the obtained results, it was determined that among the methods, means and measures of security, cryptographic and steganographic methods of data protection for this type of organization have higher degrees of importance than others.
Article Details
References
Gasimov V.A. and Mammadov J.I. (2023), “Model and method for determining the optimal structure of a security system for critical information infrastructure”, Reports of BSUIR, vol. 21, no. 2, pp. 95–103, doi: https://doi.org/10.35596/1729-7648-2023-21-2-95-103
Saaty, T.(2008), “Decision making with the analytic hierarchy process”, International Journal of Services Sciences, vol. 1, no. 1, pp. 83–98, doi: https://doi.org/10.1504/IJSSCI.2008.017590
Arslan, M. (2020), “Application of AHP method for the selection of pharmaceutical warehouse location”, J. Fac. Pharm., vol. 44, no. 2, pp. 253–264, doi: https://doi.org/10.33483/jfpau.709528
Abdelouhed, F., Ahmed, A., Abdellah, A., Yassine, B., and Mohammed, I. (2022), “GIS and remote sensing coupled with analytical hierarchy process (AHP) for the selection of appropriate sites for landfills: a case study in the province of Ouarzazate”, Journal of Engineering and Applied Science, vol. 69, no. 19, pp. 1–23, doi: https://doi.org/10.1186/s44147-021-00063-3
Helingo, M., Purwandari, B., Satria, R., and Solichah, I. (2017), “The Use of Analytic Hierarchy Process for Software Development Method Selection: A Perspective of e-Government in Indonesia”, Procedia Computer Science, vol. 124, pp. 405–414, doi: https://doi.org/10.1016/j.procs.2017.12.171
Aydın, Z. (2025), “Detecting Cybersecurity Threats in Digital Energy Systems Using Deep Learning for Imbalanced Datasets”, International Journal of Energy Economics and Policy, vol. 15, no. 3, pp. 614–628, doi: https://doi.org/10.32479/ijeep.19649
Kouskoura, A., Kalliontzi, E., Skalkos, D. and Bakouros, I. (2025), “Analysis of Results of Experts’ Perspectives of Sustainable Regional Competitiveness Using the Analytic Hierarchy Process Multi-Criteria Method”, Sustainability, vol. 17, 2681, doi: https://doi.org/10.3390/su17062681
Zaburko, J. and Szulżyk-Cieplak, J. (2019), “Information security risk assessment using the AHP method”, IOP Conference Series Mater. Sci. Eng., vol. 710, no. 1, art. numb. 12036, doi: https://doi.org/10.1088/1757-899X/710/1/012036.2019
Nurhayati, A., Gautama, A. and Naseer, M.(2018), “Decision making model design for antivirus software selection using Factor Analysis and Analytical Hierarchy Process”, MATEC Web of Conferences, vol. 154, pp. 1–6, doi: https://doi.org/10.1051/matecconf/201815403006
Meng, M. and Enping, L. (2015), “The Application Research of Information Security Risk Assessment Model Based on AHP Method”, Journal of Advances in Information Technology, vol. 6, no. 4, pp. 201–206, doi:
https://doi.org/10.12720/jait.6.4.201-206
Ming-Chang, L. (2014), “Information Security Risk Analysis Methods and Research Trends: AHP and Fuzzy Comprehensive Method”, International Journal of Computer Science & Information Technology, vol 6, no. 1, pp. 29–45, doi: https://doi.org/10.5121/ijcsit.2014.6103
Haque, G.M.M., Akula, D.K., Mohammed, Y.S., Syed, A. and Arafat, Y. (2025), “Cybersecurity Risk Management in the Age of Digital Transformation: A Systematic Literature Review”, The American Journal of Engineering and Technology, vol. 7, no. 8, pp. 126–150, doi: https://doi.org/10.37547/tajet/Volume07Issue08-14
Rodney, A. (2017), “Using the Analytical Hierarchy Process Model in the Prioritization of Information Assurance Defense In-Depth Measures? - A Quantitative Study”, Journal of Information Security, vol. 8, no. 3, pp. 166–173, doi: https://doi.org/10.4236/jis.2017.83011
Semenov, S., Mozhaiev, O., Kuchuk, N., Mozhaiev, M., Tiulieniev, S., Gnusov, Yu., Yevstrat, D.,Chyrva, Y., Kuchuk, H. (2022), “Devising a procedure for defining the general criteria of abnormal behavior of a computer system based on the improved criterion of uniformity of input data samples”, Eastern-European Journal of Enterprise Technologies, vol. 6(4-120), pp. 40–49, doi: https://doi.org/10.15587/1729-4061.2022.269128
Hasanov, A.H., Hashimov, E.G. and Zulfugarov, B.S. (2023), “Comparative analysis of the efficiency of various energy storages”, Advanced Information Systems, vol. 7, no. 3, pp.74–80, doi: https://doi.org/10.20998/2522-9052.2023.3.11
Bayramov, A.A. and Hashimov, E.G. (2018), “Assessment of invisible areas and military objects in mountainous terrain”, Defence Science Journal, vol. 68(4), pp. 343–346, doi: https://doi.org/10.14429/dsj.68.11623
Kuchuk, H., Kalinin, Y., Dotsenko, N., Chumachenko, I. and Pakhomov, Y. (2024), “Decomposition of integrated high-density IoT data flow”, Advanced Information Systems, vol. 8, no. 3, pp. 77–84, doi: https://doi.org/10.20998/2522-9052.2024.3.09
Kharchenko, V., Kovalenko, A., Andrashov, A. and Siora, A. (2012), “Cyber security of FPGA-based NPP I&C systems:challenges and solutions”, 8th International Conference Topical Meeting on Nuclear Plant Instrumentation, Control and Human Machine Interface Technologies, San Diego, California, Westin San Diego, available at: https://www.researchgate.net/publication/319292444_CYBER_SECURITY_OF_FPGA-BASED_NPP_IC_SYSTEMS_CHALLENGES_AND_SOLUTIONS
Hashimov E.G. and Khaligov G. (2024), “The issue of training of the neural network for drone detection”, Advanced İnformation Systems, vol. 8, no. 3, pp. 53–58, doi: https://doi.org/10.20998/2522-9052.2024.3.06
Dergachov, K., Hurtovyi, O. and Hashimov, E. (20250, “Adaptive algorithm for visual positioning of UAVs in the local environment”, CEUR Workshop Proceedings, vol. 3981, pp. 103–114, available at: https://ceur-ws.org/Vol-3981/paper09.pdf
Song, C. and Qiao, Y. (2015), “A Novel Image Encryption Algorithm :Based on DNA Encoding and Spatiotemporal Chaos”, Entropy, vol. 17, pp. 6954–6968, doi: https://doi.org/10.3390/e17106954
Hashimov, E., Pashayev, A. and Khaligov, G. (2025), “Camera control algorithm and image quality assessment method to obtain a quality image”, Advanced Information Systems, vol. 9, no. 3, pp. 50–56, doi: https://doi.org/10.20998/2522-9052.2025.3.06
Li, P. and Zhang, X.(2024), “Image encryption algorithm based on a novel cascade chaotic system and DNA mutation”, Physica Scripta, vol. 99, no.10, doi: https://doi.org/10.1088/1402-4896/ad6f48
Gasimov V.A., Mammadov J.I. and Mammadzada N.F. (2022), “Stream encryption method based on the chaotic Brownian motion model of molecules”, International Conference on Innovative Data Communication Technologies and Application, Procedia Computer Science, vol. 215, pp. 577–588, doi: https://doi.org/10.1016/j.procs.2022.12.060
Gasimov V.A., Mammadzada N.F., Mammadov J.I., and Mustafayeva E.A. (2024), “Maze based image encryption method constructed by random number generation”, Eurasian Journal of Mathematical and Computer Applications, vol. 12, no. 3, pp. 35–50, doi: https://doi.org/10.32523/2306-6172-2024-12-3-35-50
Alia, M. and Suwais, K. (2020), “Improved Steganography Scheme based on Fractal Set”, The International Arab Journal of Information Technology (IAJIT), vol. 17(1), pp. 128–136, doi: https://doi.org/10.34028/iajit/17/1/15