Репозиторий Евразийского национального университета имени Л.Н. Гумилева
Репозиторий Евразийского национального университета имени Л.Н. Гумилева
Репозиторий Евразийского национального университета имени Л.Н. Гумилева
Просмотр элемента 
  •   Главная
  • Научные статьи
  • 01. Публикации в изданиях зарубежных стран
  • Physics and Astronomy
  • Просмотр элемента
  •   Главная
  • Научные статьи
  • 01. Публикации в изданиях зарубежных стран
  • Physics and Astronomy
  • Просмотр элемента
JavaScript is disabled for your browser. Some features of this site may not work without it.

Fuzzy Logic and Its Application in the Assessment of Information Security Risk of Industrial Internet of Things

Thumbnail
Автор
Kerimkhulle, Seyit
Dildebaayeva, Zhulduz
Tokhmetov, Akylbek
Amirova, Akzhibek
Tussupov, Jamalbek
Makhazhanova, Ulzhan
Adalbek, Alibek
Taberkhan, Roman
Zakirova, Alma
Salykbayeva, Alua
Дата
2023
Редактор
Symmetry
ISSN
2548-2297
Аннотации
This article addresses the issue of information security in the Industrial Internet of Things (IIoT) environment. Information security risk assessment in the IIoT is complicated by several factors: the complexity and heterogeneity of the system, the dynamic nature of the system, the distributed network infrastructure, the lack of standards and guidelines, and the increased consequences of security breaches. Given these factors, information security risk assessment in the IIoT requires a comprehensive approach adapted to the peculiarities and requirements of a particular system and industry. It is necessary to use specialized risk assessment methods and to take into account the context and peculiarities of the system. The method of information security risk assessment in the IIoT, based on the mathematical apparatus of fuzzy set theory, is proposed. This paper analyzes information security threats for IIoT systems, from which the most significant criteria are selected. The rules, based on which decisions are made, are formulated in the form of logical formulas containing input parameters. Three fuzzy inference systems are used: one to estimate the probability of threat realization, another to estimate the probable damage, and a final one to estimate the information security risk for the IIoT system. Based on the proposed method, examples of calculating the information security risk assessment in the IIoT environment are provided. The proposed scientific approach can serve as a foundation for creating expert decision support systems for designing IIoT systems.
URI
http://rep.enu.kz/handle/enu/21186
Открыть
symmetry-15-01958-v2.pdf (2.402Mb)
Collections
  • Physics and Astronomy[794]
Показать полную информацию
CORE Recommender

Евразийский национальный университет имени Л.Н. Гумилева | Научная библиотека | Контакты
Яндекс.Метрика
Научная библиотека | Контакты
 

Просмотр

Весь DSpaceСообщества и коллекцииДата публикацииАвторыНазванияТематикаЭта коллекцияДата публикацииАвторыНазванияТематика

Моя учетная запись

ВойтиРегистрация

Евразийский национальный университет имени Л.Н. Гумилева | Научная библиотека | Контакты
Яндекс.Метрика
Научная библиотека | Контакты