|
 |
|
|
|
Using the Object Perimeters in MGA Algorithms for the Best Choice of Cybernetic Security Means |
|
PP: 703-711 |
|
doi:10.18576/amis/190318
|
|
Author(s) |
|
Berik Akhmetov,
Lyazzat Atymtayeva,
Valery Lakhno,
Bakhytzhan Akhmetov,
Bagdat Yagaliyeva,
|
|
Abstract |
|
Often, we encounter with the difficulties when constructing multi-circuit integrated information security systems (IISS). The reason is necessity to formalize the procedure for selecting the optimal configuration of information security (IS) hardware and software devices (HSD) in the purposes for protection the informatization object (OBI). The list of problems to be solved also includes the procedure for generating an optimality criterion in the course of choosing a specific information security tool (IST) in the OBI security contours. The selected IST must be adequate in relation to the general design goals of the IISS for IOB. The task of choosing the optimal design alternative with the available set of acceptable options also has its own difficulties, for example, according to the technical and economic indicators of the IST. This paper introduces the author’s vision of the process for generating the optimality criterion when choosing specific IST for the OBI multi-circuit protection system. In contrast to the existing solutions, we propose the implementation of the information security options ranking by individual indicators. For making decision we use the generalized evaluation function. It is obtained as a result of the summation of the ranks for the considered IST. We propose a modified genetic algorithm (MGA), that allows flexible changes in the search procedure for suitable IST, depending on the history of search. This provides a compromise between the speed of the locally optimal solution and its quality. We describe a software product for the implementation of the proposed model and the MGA for the choice of IST.
|
|
|
 |
|
|