Mathematical Model of Protection of Critical Infrastructure Object from Trojan Programs

DOI: 10.31673/2409-7292.2023.030002

  • Хавер А. В. (Khaver A. V.) State University of Information and Communication Technologies, Kyiv
  • Савченко В. А. (Savchenko V. A.) State University of Information and Communication Technologies, Kyiv

Abstract

The article proposes a conceptual mathematical model for protecting critical infrastructure objects from Trojan programs. The model is based on a game-theoretic approach where the defender and the attacker have conflicting goals. When applying the model, a vulnerability analysis of critical infrastructure objects is performed to identify potential weak points that can be exploited by Trojan programs. Then a game model is formulated to capture the strategic interaction between the defender and the attacker. An optimal security investment for the defender is introduced, which balances the cost of security against the expected loss from a successful attack. Also, the effectiveness of the proposed protection strategies is evaluated using testing and evaluation methods. The research results show that the model is effective in protecting critical infrastructure objects from Trojans and can help allocate security resources to maximize protection while minimizing costs.

Keywords: Trojan program, critical infrastructure objects, mathematical model, game theory, vulnerability analysis, risk assessment, protection strategies.

Section
Articles