Electronic modeling

Vol 46, No 4 (2024)

CONTENTS

Mathematical modeling and Computation Methods

 
3-18
 

KRASILNIKOV A.I.
Modeling of Two-component Mixtures of Shifted Distributions with Zero Cumulant Coefficients


19-38
  SEMENIUK A.M.
Metaheuristic Model of Solar Panel Control Cellular Sensor

39-49

Informational Technologics

 
50-59
 

DEMURA R., KHARCHENKO V.
Methods of Vulnerability Analysis and Cybersecurity when Choosing Vpn Products


60-79
 

ZAIKA N., RAKOVYCH V., KOMAROV M., LAUREYSSENS E.
Improvement  of  Protective Effects on Dangerous High-Frequency Impression Signals


80-86
 

UMANSKIY O.G.
Review of Steganographic Methods and their Application in Securing Banking Information Systems


87-111

Application of Modeling Methods and Facilities

 
112-127

RISK-ORIENTED MODEL OF THE OBJECT OF CRITICAL INFORMATION INFRASTRUCTURE BASED ON THE TOPOLOGY OF EXTERNAL CONNECTIONS

L.V. Kovalchuk, H.V. Nelasa

Èlektron. model. 2024, 46(4):03-18

https://doi.org/10.15407/emodel.46.04.003

ABSTRACT

The article considers the problem of reducing the losses caused by the implementation of threats to the topology of connections. Threats considered may relate to the integrity, confidentiality and availability of the information transmitted by the corresponding connection. At the same time, it is assumed that the amount of total funding allocated to protect against these threats is limited to a certain amount. This amount should be divided into parts, each of which will correspond to the financing of protection against a certain threat. A corresponding mathematical model was created to solve this problem. In this model, we make the reasonable assumption that the more funding is provided to protect against a threat, the less is the probability of its occuring. With this assumption, the problem is reduced to an optimization problem, which, generally speaking, cannot be solved by analytical methods. But for a small number of variables (up to 100 variables), this problem can be solved numerically using the tools of the Mathematica package. The article also provides the program code that implements the solution of this problem, and numerical examples of its solution using this code.

KEYWORDS

connection topology, risk management, optimization problem.

REFERENCES

  1. Drahuntsov, R., & Zubok, V. (2023). Modeling of cyber threats related to massive power outages and summary of potential countermeasures. Electronic Modeling, 45(3), 116-
    https://doi.org/10.15407/emodel.45.03.116
  2. Zubok, V., Davydiuk, A., & Klymenko, T. (2023). Electronic Cybersecurity of critical infrastructure in Ukrainian legislation and in directive (EU) 2022/2555. Electronic Modeling, 45(5), 54-
    https://doi.org/10.15407/emodel.45.05.054
  3. Zubok, V., & Mokhor, V. (2022) Cybersecurity of Internet topology: monograph / IPME named after H.E. Pukhov. https://zenodo.org/records/6795229
  4. Alsafwani, N., Fazea, Y., & Alnajjar, F. (2024). Strategic Approaches in Network Communication and Information Security Risk Assessment. Information, 15(6:353). 
    https://doi.org/10.3390/info15060353
  5. Roukny, T., Bersini, H., Pirotte, H., Caldarelli, G., & Battiston, S. (2013). Default Cascades in Complex Networks: Topology and Systemic Risk. Scientific reports, 3, 2759.
    https://doi.org/10.1038/srep02759
  6. Kitsak, M., Ganin, A., Elmokashfi, A., Cui, H., Eisenberg, D.A., Alderson, D.L., Korkin, D., & Linkov, I. (2023). Finding shortest and nearly shortest path nodes in large substantially incomplete networks by hyperbolic mapping. Nature Communications, 14, 186. 
    https://doi.org/10.1038/s41467-022-35181-w
  7. Barraza de la Paz, J.V., Rodríguez-Picón, L.A., Morales-Rocha, V., & Torres-Argüelle, S.V. (2023). A Systematic Review of Risk Management Methodologies for Complex Organizations in Industry 4.0 and 5.0. Systems, 11(5), 218. 
    https://doi.org/10.3390/systems11050218
  8. Cheimonidis, P., & Rantos, K. (2023). Dynamic Risk Assessment in Cybersecurity: A Systematic Literature Review. Future Internet, 15(10), 324. 
    https://doi.org/10.3390/fi15100324
  9. Jeong, G., Kim, K., Yoon, S., Shin, D., & Kang, J. (2023). Exploring Effective Approaches to the Risk Management Framework (RMF) in the Republic of Korea: A Study. Information, 14 (10), 561. 
    https://doi.org/10.3390/info14100561
  10. Kryvyi, S., Pogorely, S., Glibovets, N., Boyko, Yu., & Sidorova, N. (2018).  IT infrastructure design. Cybernetics and system analysis, 54(6), 141-158. 
    https://doi.org/10.1007/s10559-018-0101-5

Full text: PDF

 

MODELING OF TWO-COMPONENT MIXTURES OF SHIFTED DISTRIBUTIONS WITH ZERO CUMULANT COEFFICIENTS

A.I. Krasilnikov

Èlektron. model. 2024, 46(4):19-38

https://doi.org/10.15407/emodel.46.04.019

ABSTRACT

For two-component mixtures of shifted distributions a general formula for finding the value of the shift parameter , at which the cumulant coefficients  of any order are equal to zero, is obtained. An algorithm for mathematical and computer modeling of two-component mixtures of shifted distributions with zero cumulant coefficients is formulated. General formulas for two-component mixtures of shifted gamma-distributions with zero cumulant coefficients of any order are obtained and examples of mixtures with zero skewness and kurtosis coefficients are given. General formulas of two-component mixtures of shifted Student’s distributions with zero cumulant coefficients of any order are obtained and examples of mixtures with zero kurtosis coefficient and coefficient  are given. The research results provide the practical possibility of using two-component mixtures of shifted distributions for mathematical and computer modeling of non-Gaussian random variables with zero cumulant coefficients of any order.

KEYWORDS

non-Gaussian distributions, two-component mixtures of distributions, cumulant analysis, cumulant coefficients, skewness coefficient, kurtosis coefficient.

REFERENCES

  1. Malakhov, A.N. (1978). Kumuliantnyi analiz sluchainykh negaussovykh protsessov i ikh preobrazovanii [Cumulant analysis of random non-Gaussian processes and their transformations]. Moscow: Sovetskoie radio. (in Russian).
  2. Kunchenko, Yu.P. (2001). Polinomialnyie otsenki parametrov blizkikh k gaussovskim sluchainykh velichin. Ch. 1. Stokhasticheskiie polinomy, ikh svoistva i primeneniia dlia nakho­zhdeniia otsenok parametrov [Polynomial Parameter Estimations of Close to Gaussian Random variables. Part 1. Stochastic Polynomials, Their Properties and Applications for Finding Parameter Estimations]. Cherkassy: ChITI. (in Russian).
  3. Krasilnikov, A.I., Beregun, V.S. & Polobyuk, T.A. (2019). Kumuliantnyie metody v zada­chakh shumovoi diagnostiki teploenergeticheskogo oborudovaniia [Cumulant methods in the problems of noise diagnostics of heat-and-power equipment]. A.I. Krasilnikov [Ed.]. Kyiv: Osvita Ukrainy. (in Russian)
  4. De Carlo, L.T. (1997). On the meaning and use of kurtosis. Psychological Methods, 2(3). 292-307.
    https://doi.org/10.1037/1082-989X.2.3.292
  5. Blanca, M.J., Arnau, J., Lopez-Montiel, D., Bono, R. & Bendayan, R. (2013). Skewness and kurtosis in real data samples. Methodology, (9). 78-84.
    https://doi.org/10.1027/1614-2241/a000057
  6. Bezuglov, D.A., Andriushchenko, I.V. & Shvidchenko, S.A. (2011). Cumulant method for identifying the type of distribution law of measurement results. Servis v Rossii i za rubezhom, (5). 30-39. (in Russian).
  7. Kuznetsov, B.F., Borodkin, D.K. & Lebedeva, L.V. (2013). Cumulant Models of Additional Errors. Sovremennyie tekhnologii. Sistemnyi analiz. Modelirovaniie, 1(37). 134-138. (in Russian).
  8. Malkin, A.L., Sorin, A.Ya. & Finikov, D.B. (1986). Application of Cumulant Analysis in Statistical Processing of Seismic Records. Geologiia i geofizika, (5). 75-85. (in Russian).
  9. Alexandrou, D., De Moustier, C. & Haralabus, G. (1992). Evaluation and verification of bottom acoustic reverberation statistics predicted by the point scattering model. Acoust. Soc. Am., 91(3). 1403-1413.
    https://doi.org/10.1121/1.402471
  10. Müller, R.A.J., von Benda-Beckmann, A.M., Halvorsen, M.B. & Ainslie, M.A. (2020). Application of kurtosis to underwater sound. Acoust. Soc. Am., 148(2). 780-792. 
    https://doi.org/10.1121/10.0001631
  11. Zapevalov, A.S. & Garmashov, A.V. (2021). Skewness and Kurtosis of the Surface Wave in the Coastal Zone of the Black Sea. Morskoi gidrofizicheskii zhurnal, 37(4). 447-459. 
    https://doi.org/10.22449/0233-7584-2021-4-447-459
  12. Wang, H. & Chen, P. (2009). Fault Diagnosis Method Based on Kurtosis Wave and Information Divergence for Rolling Element Bearings. WSEAS Transactions on Systems, 8(10). 1155-1165.
  13. Mohammed, T.S., Rasheed, M., Al-Ani, M., Al-Shayea, Q. & Alnaimi, F. (2020). Fault Diagnosis of Rotating Machine Based on Audio Signal Recognition System: An Efficient Approach. International Journal of Simulation: Systems, Science & Technology, 21(1). 8.1-8.8. 
    https://doi.org/10.5013/IJSSST.a.21.01.08
  14. Hildebrand, D.K. (1971). Kurtosis measures bimodality? statist., 25(1). 42-43.
    https://doi.org/10.1080/00031305.1971.10477241
  15. Joiner, B.L. & Rosenblatt, J.R. (1971). Some properties of the range in samples from Tukey’s symmetric lambda distributions. Amer. Statist. Assoc., 66(334). 394-399.
    https://doi.org/10.1080/01621459.1971.10482275
  16. Kale, B.K. & Sebastian, G. (1996). On a Class of Symmetric Nonnormal Distributions with a Kurtosis of Three. In H.N. Nagaraja et al. (eds.) Statistical Theory and Applications (P. 55-63). Springer-Verlag New York, Inc.
    https://doi.org/10.1007/978-1-4612-3990-1_6
  17. Krasilnikov, A.I. (2016). Models of asymmetrical distributions of random variables with zero asymmetry coefficient. Elektronnoie modelirovaniie, 38(1). 19–33. (in Russian).
    https://doi.org/10.15407/emodel.38.01.019
  18. Johnson, M.E., Tietjen, G.L. & Beckman, R.J. (1980). A New Family of Probability Distributions With Applications to Monte Carlo Studies. Amer. Statist. Assoc., 75(370). 276-279.
    https://doi.org/10.1080/01621459.1980.10477464
  19. Krasil’nikov, A.I. (2013). Class non-Gaussian distributions with zero skewness and kurtosis. Radioelectronics and Communications Systems, 56(6), 312-320.
    https://doi.org/10.3103/S0735272713060071
  20. Krasilnikov, A.I. (2017). Class of Non-Gaussian Symmetric Distributions with Zero Coefficient of Elektronnoie modelirovaniie, 39(1), 3-17. 
    https://doi.org/10.15407/emodel.39.01.003
  21. Krasylnikov, O.I. (2023). Classification of models of two-component mixtures of symmetrical distributions with zero kurtosis coefficient. Elektronne modeliuvannia, 45(5). 20- 
    https://doi.org/10.15407/emodel.45.05.020
  22. Barakat, H.M. (2015). A new method for adding two parameters to a family of distributions with application to the normal and exponential families. Statistical Methods & Applications, 24(3), 359-372. 
    https://doi.org/10.1007/s10260-014-0265-8
  23. Krasilnikov, A.I. (2020). Analysis of Cumulant Coefficients of Two-component Mixtures of Shifted Gaussian Distributions with Equal Variances. Elektronnoie modelirovanie, 42(3), 71-88. 
    https://doi.org/10.15407/emodel.42.03.071
  24. Barakat, H.M., Aboutahoun, A.W. & El-kadar, N.N. (2019). A New Extended Mixture Skew Normal Distribution, With Revista Colombiana de Estadstica, 42(2), 167-183.
    https://doi.org/10.15446/rce.v42n2.70087
  25. Krasilnikov, A.I. (2018). The Application of Two-Component Mixtures of Shifted Distributions for Modeling Perforated Random Variables. Elektronnoie modelirovaniie, 40(6), 83-98. 
    https://doi.org/10.15407/emodel.40.06.083
  26. Krasilnikov, A.I. (2018). The Application of Two-Component Mixtures of Shifted Distributions for Modeling Perforated Random Variables. Elektronnoie modelirovaniie, 40(6), 83-98. 
    https://doi.org/10.15407/emodel.40.06.083
  27. Krasylnikov, O.I. (2021). Analysis of Cumulant Coefficients of Two-Component Mixtures of Shifted Non-Gaussian Distributions. Elektronne modeliuvannia, 43(5), 73-92. 
    https://doi.org/10.15407/emodel.43.05.073
  28. Vadzinskii, R.N. (2001). Spravochnik po veroiatnostnym raspredeleniiam [Directory on Probabilistic Distributions]. St. Petersburg: Nauka. (in Russian).

Full text: PDF

 

METAHEURISTIC MODEL OF SOLAR PANEL CONTROL CELLULAR SENSOR

A.M. Semeniuk

Èlektron. model. 2024, 46(4):39-49

https://doi.org/10.15407/emodel.46.04.039

ABSTRACT

The purpose of the conducted research is to develop a mathematical model of the interaction of solar radiation and photoreceiving panels, as well as a mathematical apparatus for calculating the angle of the position of these panels to generate the maximum possible power of energy. These calculations should be used in the design of the system for controlling the position of the solar panel of the SPP. The considered problem is relevant for the field of renewable energy - solar energy, as well as for the design and construction of "small", home alternative energy photovoltaic systems.

The task that was solved in this work is the determination of the most effective method of orientation of the solar battery and a proposal for its implementation. The developed device allows you to calculate solar insolation on any day of the year and day, in accordance with the geographical location of the SES, the height of the placement relative to sea level, and the topography of the area. The hardware-mathematical functionality used allows to optimally place the photoreceptors under the condition of sunlight in order to maintain the direct and most effective angle of incidence of the sun's rays on their surface; as well as with scattered, diffuse or reflected lighting. To prevent damage to the device under adverse conditions, "alternate modes" of operation are provided.

KEYWORDS

tracking system model, solar panel position monitoring, decision-making algorithm, probabilistic estimates.

REFERENCES

  1. Frolova T. & Frolov A. (2018) Analysis of a Solar Simulator Based on the Electrodeless Sulfur Lamp for Photovoltaic Devices. Telecommunications and Radio Engineering, 77(i 6), 525-539.
    https://doi.org/10.1615/TelecomRadEng.v77.i6.50
  2. (dateless). How does the installation angle of solar batteries affect/ Taken 2024/04/10 from https://leader-nrg.com.ua/blog/kak-vliyaet-ugol-ustanovki-solnechnyh-batarej/
  3. Semeniuk, A.M. (2023). Calculation of the angle of rotation and inclination of the plane of solar panels, XII International scientific and practical conference of young scientists and students (pp. 299-301). V.N. Karazin KhNU, Kharkiv.
  4. Fred Glover, Gary A. Kochenberger. (2003). Iterated local search. In H.R. Lourenço, O.C. Martin, &T Stützle. Handbook of Metaheuristics (pp. 321-353). Springer New York, NY.
  5. (dateless). Iterated Local Search. Taken 2024/04/10 from https://www.metaheuristics.org/ index.php%3Fmain=3&sub=33.html/

Full text: PDF

 

ASSESSMENT OF CYBER RISKS OF A CRITICAL INFORMATION INFRASTRUCTURE FACILITY BASED ON THE TOPOLOGY OF ITS EXTERNAL CONNECTIONS

V. Zubok, G. Dubynskyi

Èlektron. model. 2024, 46(4):50-59

https://doi.org/10.15407/emodel.46.04.050

ABSTRACT

The concept of cyberspace as a critical information infrastructure object using mathematical topology is described. A method for categorizing the risk of an external connection based on the impact on the integrity, confidentiality, and availability of information exchanged over this connection is proposed. The method considers communication as an element of the cyberspace topology of a critical information infrastructure object, a "supply chain" from the cyber security risk management perspective. That makes it possible to fill the corresponding gap in the national regulatory documents on categorizing critical infrastructure objects and their cyber protection.

KEYWORDS

critical infrastructure, cyber security, cyberspace, topology, risk assessment, risk categorizing.

REFERENCES

  1. Directive (EU) 2022/2555 of the European Parliament and of the Council of 14 December 2022 on measures for a high common level of cybersecurity across the Union, amending Regulation (EU) No 910/2014 and Directive (EU) 2018/1972, and repealing Directive (EU) 2016/1148 (NIS2 Directive). O.J. L 333, 27.12.2022, p. 80-
  2. Some issues regarding critical infrastructure objects: Resolution of the Cabinet of Ministers of Ukraine dated October 9, 2020, No. 1109: as of May 11, 2023. URL: https://zakon.rada.gov.ua/laws/show/1109-2020-п#Text (access date: July 12, 2023).
  3. On approval of the Procedure for maintaining the Register of critical infrastructure objects, including such objects in the Register, access and provision of information from it: Resolution of the Cabinet of Ministers of Ukraine dated April 28, 2023, No. 415. URL: https://zakon.rada.gov.ua/laws/show/415-2023-п#Text (access date: July 12, 2023).
  4. Some issues regarding critical information infrastructure objects: Resolution of the Cabinet of Ministers of Ukraine dated October 9, 2020, No. 943: as of September 7, 2022. URL: https://zakon.rada.gov.ua/laws/show/943-2020-п#Text (access date: July 12, 2023).
  5. On approval of the Criteria for determining enterprises, institutions, and organizations that are of critical importance for the national economy in the fields of special communication organization, information protection, cybersecurity, critical infrastructure protection, electronic communications, and radio frequency spectrum in a special period: Order of the Administration of the State Service of Special Communications and Information Protection of Ukraine dated May 31, 2023, No. 465. URL: https://zakon.rada.gov.ua/laws/show/z1057-23#Text (access date: July 12, 2023).
  6. Zubok V.Yu., Davydiuk A.V., Klymenko T.M. Cybersecurity Of Critical Infrastructure In Ukrainian Legislation And In Directive (EU) 2022/2555. Elektronne Modelyuvannya, 2023. 45(5):54-66. 
    https://doi.org/10.15407/emodel.45.05.054
  7. Some issues regarding the implementation of the provisions of the Law of Ukraine "On Mobilization Preparation and Mobilization" regarding the reservation of conscripts for the period of mobilization and wartime: Resolution of the Cabinet of Ministers of Ukraine dated January 27, 2023, No. 76. URL:  https://zakon.rada.gov.ua/laws/show/76-2023-%D0%BF#Text
  8. On the approval of the plan of measures for the implementation of the Concept of ensuring the national resilience system until 2025: Decree of the Cabinet of Ministers. of the Ministries of Ukraine dated November 10, 2023 No. 1025-r. URL: https://zakon.rada.ua/laws/show/1025-2023-%D1%80/print
  9. Kelley, J.L. (2017). General Topology. Dover Books on Mathematics (Reprint Edition).
  10. Srinivas, S., Rajendran, S., & Ziegler, H. (Eds.) (2021). Supply Chain Management in Manufacturing and Service Systems. Cham: Springer International Publishing. 
    https://doi.org/10.1007/978-3-030-69265-0
  11. Benjarattanapakee, C., & Ongkunaruk, P. (2023). Analyzing the supply chain sustainabi­lity of an internet service provider in Thailand. E3S Web of Conferences, 408, 01011. 
    https://doi.org/10.1051/e3sconf/202340801011
  12. The NIST Cybersecurity Framework (CSF) 2.0. (2024b). 
    https://doi.org/10.6028/NIST.SP.1309.ipd
  13. On amendments to the Methodological recommendations on the categorization of critical infrastructure objects: Order of the Administration of the State Service of Special Communications and Information Protection of Ukraine dated September 26, 2023, No. 857. URL: https://zakon.rada.gov.ua/rada/show/v0857519-23#Text (access date: May 12, 2024).
  14. Stouffer, K. (2023b). Guide to Operational Technology (OT) security. 
    https://doi.org/10.6028/NIST.SP.800-82r3
  15. DSTU EN IEC 31010:2022 Risk management — Risk assessment techniques (EN IEC 31010:2019, IDT; IEC 31010:2019, IDT). Official publication.

Full text: PDF