Formalization of the design process of decision-making support systems for increasing of the level of software protection
Abstract
The work presents research opportunities formalization of the design process of decision-making support systems for the restoration of damaged software due to the impact of cyber attacks. The problem of designing the specified systems is related to the fact that due to cyberattacks it is difficult to unambiguously determine their type, state and nature of damaged software of automated systems and complexes, inconsistency of information about defects, methods of their detection and elimination, as well as to assign an optimal list of technological operations with recovery of software components that are in use. The solution to the described problem requires the development and application of formalized methods for the design of components of decision-making support systems intended for the restoration of damaged software as a result of cyber-attacks, and the adaptation of a special mathematical apparatus for the classification of information and technologies for repairing defects in damaged software by making decisions regarding tasks that are difficult are formalized. Design processes should include analysis of design activities in the field of information protection; evaluation of information used during operation of various automated systems; characteristics and capabilities of information protection tools that detect threats and cyberattacks; analysis of software defects; development of algorithms and methodical materials that function and are used in decision support systems.
References
2. Kure, HI., Islam, S., Razzaque, MA. (2018). An integrated cyber security risk management approach for a cyber-physical system. Appl. Sci. Switzerland, 8(6), 1–29.
3. Fielder, A. (2016) Decision support approaches for cyber security investment. Decision Support Systems, 86, 13–23.
4. Atymtayeva, L. (2014) Building a Knowledge Base for Expert System in Information Security. Chapter Soft Computing in Artificial Intelligence of the series Advances in Intelligent Systems and Computing, 270, 57–76.
5. Gamal, M.M. (2011) Security Analysis Framework Powered by an Expert System. International Journal of Computer Science and Security (IJCSS), 4(6), 505–527.
Abstract views: 25 PDF Downloads: 38