Method of object identification of critical information infrastructure in aviation industry
Keywords:Critical infrastructure, critical information infrastructure, critical aviation information systems, object identification of critical information infrastructure, civil aviation.
In recent times all over the world the number of different emergency situations was increased. Every day mass media informs about natural and man-caused disasters, weapon conflicts, acts of terrorism, global crimes, acts of piracy that were committed by both crime organizations and single offenders. Increasingly frequently as a result of these events many people fall a victim and also state critical importance systems and resources can be damaged. According that, civil aviation industry requires special attention, just as there is need for continuous communication and interconnection between ground-based and aircrafts systems. Most of the world's leading states began to devote considerable attention to the methods and means of identifying, systematizing and securing critical infrastructure objects. Loss or operational breakdown of these objects can cause significant or irreparably damage for national security of the state. However, according to the analysis, the existing approaches to identifying and identifying infrastructure objects are not systemic and clearly formalized, are oriented only to certain sectors of the infrastructure and do not take into account the full range of parameters and features of the critical infrastructure, especially its information component. In view of this, in this work a method of object identification of critical information infrastructure is developed, which gives ability to determine the critical infrastructure elements, their mutual influence and influence on functional operations of the critical aviation information system. This method, as well as a software application developed on its basis, can be used for identification the objects of critical information infrastructure in different industries.
S. Gnatyuk, M. Ryabiy, and V. Lyadovskaya, “Definition of critical information infrastructure and its protection: analysis of approachesє”, Communication, no. 4, pp. 3-7, 2014.
A. Wenger, V. Mauer, and M. Cavelty, ”International critical information infrastructure protection handbook 2008-2009”, Center for Security Studies, ETH Zurich, 2009.
S. Gnatyuk, and V. Lyadovskaya, “Criteria for determining the elements of the critical infrastructure of the state”, in Proc. ХХIII Ukr. sci. and prac. conf. Innovative potential of world science – XXI century”, Zaporizhzhia, pp. 55-57, 2013.
Green paper on a European programme for critical infrastructure protection (COM/2005/576 final). [Online]. Available: http://eur-lex.europa.eu/LexUriServ/site/en/ com/2005/com2005_ 0576en01.pdf. Accessed on: Sept. 03, 2017.
R. Mattioli, and C. Levy-Bencheton, “Methodologies for the identification of Critical Information Infrastructure assets and services”, ENISA Report, 2014.
A. Kondratiev, “Modern trends in the study of critical infrastructure in foreign countries”, Foreign Military Review, no. 1, pp. 19-30, 2012.
V. Sydorenko, M. Alexander, and A. Naji, “Modern approaches to the definition and identification of critical information infrastructure”, in Proc. Sci. and prac. conf. Current issues of cyber security and information security, Kyiv, 2016, pp.134-137.
O. Dovgan, “Critical infrastructure as an object of protection against cyber attacks”, Proc. Sci. and prac. conf. Information security: the challenges and threats of our time, Kyiv, 2013, pp. 17-20.
Cabinet of Ministers of Ukraine. (2016, Aug. 23). Resolution № 563 on approval of the procedure for the formation of the list of information and telecommunication systems of critical infrastructure objects of the state. [Online]. Available: http: // zak on3.rada.gov.ua/laws/show/ 563-2016-%D0%BF. Accessed on: July 12, 2017.
S. Gnatyuk, V. Sydorenko, and O. Duksenko, “Modern approaches to critical infrastructure objects detection and identification”, Information security, vol. 21, no. 3, pp. 269-275, 2015.
International Civil Aviation Organization. Doc 8973 ІСАО. Aviation Security Manual, 2014.
S. Gnatyuk, V. Sydorenko, and N. Seilova, “Universal data model for the formation of the critical information infrastructure of the state objects list”, Information security, vol. 23, no. 2, pp. 80-91, 2017.
V. Shershakov, E. Trahtengerts, and D. Kamaev, Network-centric methods of computer support for the management of emergency response. Moskow, Russia: URSS, 2015.
A. Andreev, D. Kamaev, and E. Trahtengerts, “Expert forecasting of the consequences of damage to life support systems”, Management of large systems, iss. 25, pp. 243-293, 2009.
Y. Soloviev, Satellite navigation systems, Moskow, Russia: Eco-Trendz, 2000.
O. Golub, and S. Sheremet, “Satellite navigation systems in transport”. [Online]. Available: http://www.shevchenkove.org.ua/person_syte. Accessed on: Sept. 03, 2017.
I. Snovidov, “Factors affecting measurement accuracy”, Bulletin of the state hydrography, no. 1 (48), pp. 4-6, 2015.
Y. Maksimenko, “Investigation of the parameters of ground and on board receivers using the GPS system”. [Online]. Available: http://kivra.kpi.ua/wp-content/uploads/file/work/2015/Maksimenko/ Maksimenko_PZ.pdf. Accessed on: Sept. 03, 2017.
M. Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani, ”A Detailed Analysis of the KDD CUP 99 Data Set”, in IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, 2009, pp. 1-6.
How to Cite
Copyright (c) 2020 Collection "Information technology and security"
This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors that are published in this collection, agree to the following terms:
- The authors reserve the right to authorship of their work and pass the collection right of first publication this work is licensed under the Creative Commons Attribution License, which allows others to freely distribute the published work with the obligatory reference to the authors of the original work and the first publication of the work in this collection.
- The authors have the right to conclude an agreement on exclusive distribution of the work in the form in which it was published this anthology (for example, to place the work in a digital repository institution or to publish in the structure of the monograph), provided that references to the first publication of the work in this collection.
- Policy of the journal allows and encourages the placement of authors on the Internet (for example, in storage facilities or on personal web sites) the manuscript of the work, prior to the submission of the manuscript to the editor, and during its editorial processing, as it contributes to productive scientific discussion and positive effect on the efficiency and dynamics of citations of published work (see The Effect of Open Access).