Показать сокращенную информацию

dc.contributor.authorKerimkhulle, Seyit
dc.contributor.authorDildebayeva, Zhulduz
dc.contributor.authorTokhmetov, Akylbek
dc.contributor.authorAmirova, Akzhibek
dc.contributor.authorTussupov, Jamalbek
dc.contributor.authorMakhazhanova, Ulzhan
dc.contributor.authorAdalbek, Alibek
dc.contributor.authorTaberkhan, Roman
dc.contributor.authorZakirova, Alma
dc.contributor.authorSalykbayeva, Alua
dc.date.accessioned2024-12-18T05:00:54Z
dc.date.available2024-12-18T05:00:54Z
dc.date.issued2023
dc.identifier.citationKerimkhulle, S.; Dildebayeva, Z.; Tokhmetov, A.; Amirova, A.; Tussupov, J.; Makhazhanova, U.; Adalbek, A.; Taberkhan, R.; Zakirova, A.; Salykbayeva, A. Fuzzy Logic and Its Application in the Assessment of Information Security Risk of Industrial Internet of Things. Symmetry 2023, 15, 1958. https:// doi.org/10.3390/sym15101958ru
dc.identifier.issn2548-2297
dc.identifier.otherdoi.org/10.3390/sym15101958
dc.identifier.urihttp://rep.enu.kz/handle/enu/20275
dc.description.abstractThis article addresses the issue of information security in the Industrial Internet of Things (IIoT) environment. Information security risk assessment in the IIoT is complicated by several factors: the complexity and heterogeneity of the system, the dynamic nature of the system, the distributed network infrastructure, the lack of standards and guidelines, and the increased consequences of security breaches. Given these factors, information security risk assessment in the IIoT requires a comprehensive approach adapted to the peculiarities and requirements of a particular system and industry. It is necessary to use specialized risk assessment methods and to take into account the context and peculiarities of the system. The method of information security risk assessment in the IIoT, based on the mathematical apparatus of fuzzy set theory, is proposed. This paper analyzes information security threats for IIoT systems, from which the most significant criteria are selected. The rules, based on which decisions are made, are formulated in the form of logical formulas containing input parameters. Three fuzzy inference systems are used: one to estimate the probability of threat realization, another to estimate the probable damage, and a final one to estimate the information security risk for the IIoT system. Based on the proposed method, examples of calculating the information security risk assessment in the IIoT environment are provided. The proposed scientific approach can serve as a foundation for creating expert decision support systems for designing IIoT systems.ru
dc.language.isoenru
dc.publisherSymmetryru
dc.relation.ispartofseries15, 1958;
dc.subjectIIoTru
dc.subjectsecurityru
dc.subjectthreatru
dc.subjectriskru
dc.subjectfuzzy logic applicationru
dc.subjectlinguistic variablesru
dc.subjectfuzzy decision makingru
dc.titleFuzzy Logic and Its Application in the Assessment of Information Security Risk of Industrial Internet of Thingsru
dc.typeArticleru


Файлы в этом документе

Thumbnail

Данный элемент включен в следующие коллекции

Показать сокращенную информацию