A METHOD FOR CALCULATING THE PROTECTION OF A CORPORATE NETWORK UNDER CONDITIONS OF UNCERTAINTY

Authors

DOI:

https://doi.org/10.28925/2663-4023.2025.29.894

Keywords:

fuzzy sets, corporate network, tuple, modeling, risks, protection system, aggregation, membership function.

Abstract

A relevant task in the analysis and management of a corporate network information system is to select such a configuration of system elements and their parameters that ensures the highest possible functional efficiency under conditions of uncertainty. One of the promising approaches to solving the problem of cybersecurity assessment for critical infrastructure objects is the use of fuzzy set theory, for example, for assessing information security risks. In practice, situations often arise in which the final calculation results are significantly influenced by inconsistencies in conclusions or errors made by experts.This paper investigates the protection system of a corporate network, taking into account its architectural and functional components under conditions of partial or complete uncertainty. To achieve this goal, a tuple of fuzzy sets was constructed to describe the most important aspects of the corporate network’s operation and security. The tuple includes both technical characteristics (e.g., information flow intensity, security level, data leakage parameters, firewall activity, operation of the backup system, etc.) and organizational components (access control, authentication policy, user identification, auditing, etc.). Each parameter was given an appropriate fuzzy interpretation in the form of linguistic variables: “low,” “medium,” and “high” levels.For parameter calculations, trapezoidal and triangular methods were applied. The calculations are illustrated with graphical material. The obtained data can also be used for automated monitoring of the network’s security state, evaluation of the effectiveness of implemented security measures, and formulation of recommendations for improving the level of protection.

Downloads

Download data is not yet available.

References

Korchenko, A., Breslavskyi, V., Yevseiev, S., Zhumangalieva, N., Zvarych, A., Kazmirchuk, S., Kurchenko, O., Laptiev, O., Sievierinov, O., & Tkachuk, S. (2021). Development of a method for constructing linguistic standards for multi-criteria assessment of honeypot efficiency. Eastern-European Journal of Enterprise Technologies, 111(3/9), 63–83.

Yevseiev, S. P., Shmatko, O. V., & Romashchenko, N. V. (2019). An algorithm for assessing the degree of information security risk based on a fuzzy set approach. Suchasni Informatsiini Systemy – Modern Information Systems, 3(2), 73–79.

Kochetkov, O. V., Gaur, T. O., & Mashin, V. M. (2019). Enterprise information security risk assessment system based on fuzzy logic. Scientific Works of O.S. Popov ONAZ, (1), 97–104.

Korchenko, A. O. (2019). Methods for identifying anomalous states for intrusion detection systems: Monograph. Kyiv: TsP “Komprint”.

Korchenko, O. H., Kazmirchuk, S. V., & Akhmetov, B. B. (2017). Applied systems for assessing information security risks: Monograph. Kyiv: TsP “Komprint”.

Korchenko, A. H. (2006). Construction of information protection systems on fuzzy sets: Theory and practical solutions. Kyiv: MK-Press.

Korchenko, O. H., Kazmirchuk, S. V., & Akhmetov, B. B. (2017). Applied systems for assessing information security risks: Monograph. Kyiv: TsP “Komprint”.

Korchenko, A., Arkhipov, A., & Kazmirchuk, S. (2013). Analysis and assessment of information security risks: Monograph. Kyiv: Lazurit-Polygraph LLC.

Akhramovych, V., & Akhramovych, V. (2025). A method for calculating the indicator of computer information protection under conditions of uncertainty. Information Technology and Security, 13(1(24)), 55–68. https://doi.org/10.20535/2411-1031.2025.13.1.328898

Akhramovych, V. (2025). A method for researching quantitative indicators of the corporate network protection system. Cybersecurity: Education, Science, Technology, 4(28), 176–197.

Kostiuk, Yu. V., Skladannyi, P. M., Bebeshko, B. T., Khorolska, K. V., Rzaieva, S. L., & Vorokhob, M. V. (2025). Information and communication systems security. [Textbook] Kyiv: Borys Grinchenko Kyiv Metropolitan University.

Kostiuk, Yu. V., Skladannyi, P. M., Hulak, H. M., Bebeshko, B. T., Khorolska, K. V., & Rzaieva, S. L. (2025). Information security systems. [Textbook] Kyiv: Borys Grinchenko Kyiv Metropolitan University.

Hulak, H. M., Zhyltsov, O. B., Kyrychok, R. V., Korshun, N. V., & Skladannyi, P. M. (2023). Enterprise information and cyber security. [Textbook] Kyiv: Borys Grinchenko Kyiv Metropolitan University.

Downloads


Abstract views: 12

Published

2025-09-26

How to Cite

Ilyenko, A., & Akhramovych , V. (2025). A METHOD FOR CALCULATING THE PROTECTION OF A CORPORATE NETWORK UNDER CONDITIONS OF UNCERTAINTY. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 1(29), 480–492. https://doi.org/10.28925/2663-4023.2025.29.894