Method of object identification of critical information infrastructure in aviation industry

Authors

  • Serhii Hnatiuk National Aviation University, Kyiv,, Ukraine
  • Viktoriia Sydorenko National Aviation University, Kyiv,, Ukraine
  • Vasyl Kinzeriavyi National Aviation University, Kyiv,, Ukraine

DOI:

https://doi.org/10.20535/2411-1031.2017.5.2.136978

Keywords:

Critical infrastructure, critical information infrastructure, critical aviation information systems, object identification of critical information infrastructure, civil aviation.

Abstract

In recent times all over the world the number of different emergency situations was increased. Every day mass media informs about natural and man-caused disasters, weapon conflicts, acts of terrorism, global crimes, acts of piracy that were committed by both crime organizations and single offenders. Increasingly frequently as a result of these events many people fall a victim and also state critical importance systems and resources can be damaged. According that, civil aviation industry requires special attention, just as there is need for continuous communication and interconnection between ground-based and aircrafts systems. Most of the world's leading states began to devote considerable attention to the methods and means of identifying, systematizing and securing critical infrastructure objects. Loss or operational breakdown of these objects can cause significant or irreparably damage for national security of the state. However, according to the analysis, the existing approaches to identifying and identifying infrastructure objects are not systemic and clearly formalized, are oriented only to certain sectors of the infrastructure and do not take into account the full range of parameters and features of the critical infrastructure, especially its information component. In view of this, in this work a method of object identification of critical information infrastructure is developed, which gives ability to determine the critical infrastructure elements, their mutual influence and influence on functional operations of the critical aviation information system. This method, as well as a software application developed on its basis, can be used for identification the objects of critical information infrastructure in different industries.

Author Biographies

Serhii Hnatiuk, National Aviation University, Kyiv,

candidate of technical sciences,
associate professor, associate
professor of IT-security
academic department

Viktoriia Sydorenko, National Aviation University, Kyiv,

assistant of IT-security
academic department

Vasyl Kinzeriavyi, National Aviation University, Kyiv,

candidate of technical sciences,
associate professor, associate
professor of IT-security
academic department

References

S. Gnatyuk, M. Ryabiy, and V. Lyadovskaya, “Definition of critical information infrastructure and its protection: analysis of approachesє”, Communication, no. 4, pp. 3-7, 2014.

A. Wenger, V. Mauer, and M. Cavelty, ”International critical information infrastructure protection handbook 2008-2009”, Center for Security Studies, ETH Zurich, 2009.

S. Gnatyuk, and V. Lyadovskaya, “Criteria for determining the elements of the critical infrastructure of the state”, in Proc. ХХIII Ukr. sci. and prac. conf. Innovative potential of world science – XXI century”, Zaporizhzhia, pp. 55-57, 2013.

Green paper on a European programme for critical infrastructure protection (COM/2005/576 final). [Online]. Available: http://eur-lex.europa.eu/LexUriServ/site/en/ com/2005/com2005_ 0576en01.pdf. Accessed on: Sept. 03, 2017.

R. Mattioli, and C. Levy-Bencheton, “Methodologies for the identification of Critical Information Infrastructure assets and services”, ENISA Report, 2014.

A. Kondratiev, “Modern trends in the study of critical infrastructure in foreign countries”, Foreign Military Review, no. 1, pp. 19-30, 2012.

V. Sydorenko, M. Alexander, and A. Naji, “Modern approaches to the definition and identification of critical information infrastructure”, in Proc. Sci. and prac. conf. Current issues of cyber security and information security, Kyiv, 2016, pp.134-137.

O. Dovgan, “Critical infrastructure as an object of protection against cyber attacks”, Proc. Sci. and prac. conf. Information security: the challenges and threats of our time, Kyiv, 2013, pp. 17-20.

Cabinet of Ministers of Ukraine. (2016, Aug. 23). Resolution № 563 on approval of the procedure for the formation of the list of information and telecommunication systems of critical infrastructure objects of the state. [Online]. Available: http: // zak on3.rada.gov.ua/laws/show/ 563-2016-%D0%BF. Accessed on: July 12, 2017.

S. Gnatyuk, V. Sydorenko, and O. Duksenko, “Modern approaches to critical infrastructure objects detection and identification”, Information security, vol. 21, no. 3, pp. 269-275, 2015.

doi: 10.18372/2225-5036.21.9690.

International Civil Aviation Organization. Doc 8973 ІСАО. Aviation Security Manual, 2014.

S. Gnatyuk, V. Sydorenko, and N. Seilova, “Universal data model for the formation of the critical information infrastructure of the state objects list”, Information security, vol. 23, no. 2, pp. 80-91, 2017.

doi: 10.18372/2225-5036.23.11823.

V. Shershakov, E. Trahtengerts, and D. Kamaev, Network-centric methods of computer support for the management of emergency response. Moskow, Russia: URSS, 2015.

A. Andreev, D. Kamaev, and E. Trahtengerts, “Expert forecasting of the consequences of damage to life support systems”, Management of large systems, iss. 25, pp. 243-293, 2009.

Y. Soloviev, Satellite navigation systems, Moskow, Russia: Eco-Trendz, 2000.

O. Golub, and S. Sheremet, “Satellite navigation systems in transport”. [Online]. Available: http://www.shevchenkove.org.ua/person_syte. Accessed on: Sept. 03, 2017.

I. Snovidov, “Factors affecting measurement accuracy”, Bulletin of the state hydrography, no. 1 (48), pp. 4-6, 2015.

Y. Maksimenko, “Investigation of the parameters of ground and on board receivers using the GPS system”. [Online]. Available: http://kivra.kpi.ua/wp-content/uploads/file/work/2015/Maksimenko/ Maksimenko_PZ.pdf. Accessed on: Sept. 03, 2017.

M. Tavallaee, E. Bagheri, W. Lu, and A. Ghorbani, ”A Detailed Analysis of the KDD CUP 99 Data Set”, in IEEE Symposium on Computational Intelligence for Security and Defense Applications, Ottawa, 2009, pp. 1-6.

doi: 10.1109/CISDA.2009.5356528.

Published

2017-12-31

How to Cite

Hnatiuk, S., Sydorenko, V., & Kinzeriavyi, V. (2017). Method of object identification of critical information infrastructure in aviation industry. Collection "Information Technology and Security", 5(2), 119–134. https://doi.org/10.20535/2411-1031.2017.5.2.136978

Issue

Section

CYBERSECURITY AND CRITICAL INFRASTRUCTURE PROTECTION