SlideShare a Scribd company logo
1 of 10
Download to read offline
http://www.iaeme.com/IJCIET/index.asp 95 editor@iaeme.com
International Journal of Civil Engineering and Technology (IJCIET)
Volume 9, Issue 11, November 2018, pp. 95–104, Article ID: IJCIET_09_11_010
Available online at http://www.iaeme.com/ijciet/issues.asp?JType=IJCIET&VType=9&IType=10
ISSN Print: 0976-6308 and ISSN Online: 0976-6316
©IAEME Publication Scopus Indexed
DEVELOPMENT OF A CONCEPTUAL MODEL
OF ADAPTIVE ACCESS RIGHTS
MANAGEMENT WITH USING THE
APPARATUS OF PETRI NETS
V. Lakhno
Department of Computer systems and networks,
National University of Life and Environmental Sciences of Ukraine, Kiev, Ukraine
V. Buriachok
Head of the Department of Information and Cybersecurity,
B. Grinchenko Kyiv University, Kiev, Ukraine
L. Parkhuts
Professor, Department of Information Security,
Lviv Polytechnic National University, Lviv, Ukraine
H. Tarasova
Associate Professor of the Department,
Kiev National University of Technology and Design, Kiev, Ukraine
L. Kydyralina
Doctoral Candidate,
Kazakh National Pedagogical University named after Abay, Almaty, Kazakhstan
P. Skladannyi
Senior Lecturer of the Department of Information and Cybersecurity,
B. Grinchenko Kyiv University, Kiev, Ukraine
M. Skrypnyk
Doctor of Science (Economics)
Kyiv National University of Technology and Design, Kyiv, Ukraine
A. Shostakovska
Associate Professor of Department of Management and Marketing
European University, Kiev, Ukraine
Development of a Conceptual Model of Adaptive Access Rights Management with Using the
Apparatus of Petri Nets
http://www.iaeme.com/IJCIET/index.asp 96 editor@iaeme.com
ABSTRACT
The paper describes the conceptual model of adaptive control of cyber protection
of the informatization object (IO). Petri's Networks were used as a mathematical
device to solve the problem of adaptive control of user access rights. The simulation
model is proposed and the simulation in PIPE v4.3.0 package is performed. The
possibility of automating the procedures for adjusting the user profile to minimize or
neutralize cyber threats in the objects of informatization is shown. The model of
distribution of user tasks in computer networks of IO is proposed. The model, unlike
the existing, is based on the mathematical apparatus of Petri's Networks and contains
variables that allow reducing the power of the state space. Access control method
(ACM) is added. The addenda touched upon aspects of reconciliation of access rights
that are requested by the task and requirements of the security policy and the degree
of consistency of tasks and access to the IO nodes. Adjustment of rules and security
metrics for new tasks or redistributable tasks is described in the notation of Petri nets.
Key words: Cybersecurity, access rights management, security policy, mathematical
model, Petri nets, rule adjustment.
Cite this Article: V. Lakhno, V. Buriachok, L. Parkhuts, H. Tarasova, L. Kydyralina,
P. Skladannyi, M. Skrypnyk, A. Shostakovska, Development of a Conceptual Model
of Adaptive Access Rights Management with Using the Apparatus of Petri Nets,
International Journal of Civil Engineering and Technology (IJCIET) 9(11), 2018, pp.
95–104.
http://www.iaeme.com/IJCIET/issues.asp?JType=IJCIET&VType=9&IType=11
1. INTRODUCTION
The modern level of application of information technology (IT) and systems (ITS) at various
objects of informatization (IO) reached the highest level. At the same time, most specialists in
the field of IT note the need for primary tasks to preserve the integrity, confidentiality and
accessibility of information, regardless of its functional purpose [1, 2]. Almost annually
detection of previously unknown cyber threats (Cth) [3, 4] and a steady trend for the
formation of a new landscape Cth for digitalized technologies and systems, make the tasks of
information protection (IPr), information security (IS) and cybersecurity (CS) priority in the
whole world [1, 2, 5].
Despite the commonness of the tasks for CS for various IO (information-educational
environment of the modern university, automated control system for complex production or
banking system), has own specifics of cyber threats [1–5]. However, the initial task of
creating effective protection systems and CS any IO, remains the task of examining a specific
object of protection, modelling of a potential intruder (computer attacker – CA) and cyber
threats [1–5]. Implementation of the above steps will provide adequate requirements for
information security systems (ISS) IO.
In the context of the increasing complexity of cyber-attack scenarios on IO analysts of
information security services (IS) need to respond quickly to cyber-attacks, threat anomalies.
It makes the problem actual search for new ways to increase the effectiveness of decision-
making in tasks to respond to attempts at destructive intervention by the CA or unscrupulous
personnel in the work of IO. In this situation, a significant role can be played by various
intellectualized decision support systems (IDSS) and expert systems (ES) in tasks of
providing cybersecurity IO [5–7].
V. Lakhno, V. Buriachok, L. Parkhuts, H. Tarasova, L. Kydyralina, P. Skladannyi,
M. Skrypnyk, A. Shostakovska
http://www.iaeme.com/IJCIET/index.asp 97 editor@iaeme.com
We note that the mathematical component of the IDSS and ES in the CS tasks is various
models and algorithms that enable specialists to intellectually support solutions.
Within the framework of the research, the possibility of synthesizing analytical models for the
main types of unauthorized access to IO. The possibility of describing functional models of
various IO in terms of the Petri nets theory [4, 5, 7, 8].
Such a presentation will allow analysts IS and IPr to detail threats in the defended IO. In
addition, in the future, it is possible to identify states that potentially determine vulnerabilities
IO to new cyber threats. We also consider the prospects of using this model on the basis of
Petri (and Petri-Markov) networks and colored Petri nets as mathematical and algorithmic
components, which projected IDSS in the process of analyzing cyber threats for various IO. In
our opinion, these judgments make our paper relevant and increase the effectiveness of the
work on the creation of IDSS in the tasks of IPr and CS for various IO.
2. LITERATURE REVIEW AND PROBLEM POSING
In the papers [3–5, 8, 9] were presented results of research, devoted to the application of Petri
nets for the description of the threat model CS IO. Although these works have made an
undeniable theoretical contribution to this issue, in our opinion, the models proposed by the
authors are somewhat difficult to implement programmatically, especially IDSS and ES of IPr
and CS IO.
Based on the papers [3, 5] of the threat model, it is possible to construct using a visual
tabular form of displaying threats when updating the question of evaluating IO security. But,
this approach to drawing up models of threats is laborious. In addition, the growing number of
threats makes such a tabular presentation format difficult to comprehend, especially for
specialists with little experience in the field of CS.
Petri nets (and Petri-Markov) were also successfully used to describe intruder models [10,
11]. However, the authors did not consider the possibility of correcting the intruder model
(CA), in particular by combining it with models on the basis of graph theory, which would
allow more accurately describe state transitions in the process of probable overcoming of CA
perimeters (boundaries) of cyber protection for a particular object ОI.
In the papers [3, 8, 9] models ISS for various IO were considered as preliminary allocated
in Petri nets sequences of elementary operations, from which cyber-attack is possible. The
models allowed calculating the possibility of implementing different attacks for a certain
period of time. However, the models considered in [9, 10] did not allow us to calculate the
time characteristics in the process of implementing new cyber threats.
In the papers [5, 12], models based on Petri nets were proposed and described the
processes of implementing threats in information systems (IS). Although these models made
it possible to evaluate many of the security parameters IO, in particular, the likelihood of the
implementation of threats, the time to implement threats, the coherence of CA actions, they
are not fully completed. In these papers, the issue of resolving conflict situations arising when
IS states change during attacks has not been studied, belonging to different classes. This
circumstance, in our opinion, limits the practical applicability of this research.
Thus, the synthesis of new models, as well as the addition of existing models and methods
of adaptive cyber defense management of various IO with using of the capabilities of the
apparatus of Petri nets and taking into account the potential of visualization of Petri nets, can
become an effective tool for forecasting the state of security for particular IO. This will
significantly simplify the understanding for new cyber threats and in the future possible the
effective application of the proposed approaches by service analysts IPr, IS and CS of various
IO.
Development of a Conceptual Model of Adaptive Access Rights Management with Using the
Apparatus of Petri Nets
http://www.iaeme.com/IJCIET/index.asp 98 editor@iaeme.com
3. GOAL AND OBJECTIVES OF THE STUDY
The goal is the development of models and methods that contribute to increasing the stability
of the functioning of computer networks of various information objects on the basis of
adaptive management of cybersecurity mechanisms in conditions of increasing the number
and complexity of destructive unauthorized impact.
To achieve the goal of the research, the following tasks are solved:
Conceptual model of adaptive management of cyber protection of the information object
(IO) using the apparatus of Petri nets; models of distribution of user tasks in computer
networks of information objects (IO); Additions to the Access Control Method in the Context
of Reconciliation of Access Rights that are Requested by the Task and the Requirements of
the Security Policy and the Degree of Consistency of the Task and Access Permitted Nodes
IO.
4. MODELS AND METHODS
In accordance with the purposes of our research, this section of the article describes a
conceptual model of adaptive cyber protection management IO.
Accepted designations: B1 - block
information and measuring devices of
OBI; B2 - block of multichannel
control devices; В3 - OBI as object of
access control to resources; B4 - state
prediction unit in OBI; B5 - decision
block on the right of access; В6 - the
block of calculation of efficiency by
quantity of the realized threats
connected with infringement of access
in OBI; B7 - block of a priori
information; B8 - block of variable
models.
Figure 1 Scheme of the conceptual model of adaptive control of cyber protection of the information object.
An example of a solution of the problem adaptive management of user access rights using
apparatus of Petri nets and related software, which allows you to automate the adjustment of
the user profile, and also through the integration of IDSS module to recommend ways to
neutralize cyber threats in IO.
We formulated the tasks of managing access rights: 1) the model of access delimitation
for a given IO is constructed; 2) determine the model parameters that are controlled; 3)
parameterization of the risk of breach of confidentiality of information for IO to perform.
A formal mathematical statement of the problem of optimizing the scheme of access
delimitation in IO. Initial data: 1) access objects of IO –   IiaoAO i ,1,  ; 2) subjects of
access in IO –   JjsaSA j ,1,  ; 3) communication nodes (CN) in IO –   KkcnCN k ,1,  ; 4)
an adaptive mechanism that responds allows you to maintain access security metrics in the IO
at a given level –   JjIiamAM ji ,1,,1,0
,
0
 .
Suppose that an acceptable level of protection IO is achieved if the conditions are met, as
shown in Table 1.
V. Lakhno, V. Buriachok, L. Parkhuts, H. Tarasova, L. Kydyralina, P. Skladannyi,
M. Skrypnyk, A. Shostakovska
http://www.iaeme.com/IJCIET/index.asp 99 editor@iaeme.com
Table 1 The conditions under which an acceptable level of protection is achieved IО (for setting
optimization of access control of IO) [with considering 8, 9, 12]
No Parameter Condition
1
An adaptive mechanism that allows you
to maintain access security metrics in IO
at a given level [5, 9]. 





.Otherwise,0
;сnodea
onplacedisitif,1
, k
i
ji т
am
am
2
Damage from possible unauthorized
access to resources –
  JjIidaDA ji ,1,,1,0
,
0

[8, 12].
See note.
3
The structure of the computer network
IО –   KnmnsNS nm ,1,,, 
   
objects.Network
.Otherwise,0
;&if,1
,



 

o
onom
nm
NSwhere
NScnNScn
ns
Managed Parameters (are set by the administrator IP and CS)
1
Symptoms of sharing resources
IO –  isvSV  [6, 9].






.Otherwise,0
;allowedisnodea
toaccessgeneraltheif,1
ii svsv
2
Accommodation AO on nodes
IO –  1
,
1
kimpMP  

 

.Otherwise,0
;if,11
,
ki
ki
cnao
mp
3
Accommodation SA on nodes
IO –  2
,
2
kjmpMP  . 

 

.Otherwise,0
;if,12
,
kj
kj
cnsa
mp
Note: The damage from the probable unauthorized access to resources (line 2) determines
the degree of information resources on the IO node, and the user profile (taking into
account the characteristics of probable intruders, look at Table 2).
The conditions under which an acceptable level of protection is achieved IO (to specify
the optimization of access control for IO) is subsequently considered in conjunction with the
data in Table 2. We will assume that the objective function is the magnitude of the likely
expected damage from unauthorized access to information resources (IR) IO (further IR and
IО). This parameter is defined as a measure of the discrepancy between the real and optimal
delineation of user access to IR for a particular IO.
 

I
i
J
j
jijiji amamdaTF
1 1
0
,,
0
, , (1)
where  jiam ,
elements of a set that displays already implemented access rights.
Then
;0
,
1
,, jk
K
k
kiji wnsam   (2)
 ;1 1
,
1
,
0
, jkijkjk wsvww  (3)
 

K
k
jkkijk mpmpw
1
1
,
2
,
1
, . (4)
Development of a Conceptual Model of Adaptive Access Rights Management with Using the
Apparatus of Petri Nets
http://www.iaeme.com/IJCIET/index.asp 100 editor@iaeme.com
Table 2 Characteristics of potential intruders [9, 10, 13]
Classification Characteristic
For reasons of violation Violation of integrity, confidentiality, accessibility with
mercenary or other purpose.
According to the level of
awareness and qualification
of CA
Intruder (or CA): 1) a high level of knowledge; 2) sufficient
knowledge to gather information, use of known exploits and
write your own software for cyber attacking; 3) CA is not
an authorized user of IO.
By location Without physical access to the IO territory. The intruder
acts remotely, for example, through public networks.
Thus, the formulation of the task of differentiating access rights was obtained. This
problem relates to the tasks of non-linear optimization of the vector of controllable parameters
in Boolean variables:
 

I
i
J
j
jijiji amamdaUD
1 1
0
,,
0
,min (5)
for the following restrictions


K
k
jida
1
1
, 1 (6)
.1
1
2
,

K
k
jida (7)
Constant adjustment of the profile of the active user assumed the use of a special iterative
algorithm [14]. This algorithm based on the implicit server feedback with the user specific IO
resources. The key factor is the query statistics. The evaluation of the current user profile was
used to rank users into groups by the degree of danger for IR and IO. Accepted: a) user; b) a
potentially dangerous user; c) dangerous user; d) the intruder.
Optimization of access control procedures was carried out on the basis of the definition of
such parameters: 1) Intensity of transitions (determined on the basis of regression models)
[14]; 2) Parameterization of the risk associated with violation of confidentiality of information
IO. It is defined as a multifactorial regression model of the 2-nd order [15]:
  ,,
1,
,
1
2
,
1
0 jihhdahdahdadaP ji
m
ji
ji
m
ao
aoaoao
m
k
kkr   

where   
T
mhhh ,...,1 managed parameters that regulate the rules of delineating access in
networks of specific IO:  time.
With respect to any IO with a distributed resource access scheme, the subscriber task
model is defined as follows
  RESMRTFTRsATPISPN ,,,,,, 0 , (8)
where   FMPNTTGRPN ,,, IR and IO (are represented by the Petri nets);   tgrTGR set
of vertices graph (top - supplier IR and IO);  tT number of transitions between vertices;
  nmpnmpnMPN ,...,1 Petri nets marking; F neighbor ratio; PIS information security
policy; AT – active tasks initiated by users IR IO; 0s initial state  ;sS 
 SAPISMRTATPNFTR: transition function between states IR ОI;  UCLMRT ,
markers in Petri nets, CL class of resources that subscribers (users) request (U); RES
current position in the access rights to IR in IO.
V. Lakhno, V. Buriachok, L. Parkhuts, H. Tarasova, L. Kydyralina, P. Skladannyi,
M. Skrypnyk, A. Shostakovska
http://www.iaeme.com/IJCIET/index.asp 101 editor@iaeme.com
Taking into account the previous calculations, such rules were obtained for the software
product "Threat Analyzer" (described in detail [14]) to make a decision on the possibility of
the user's access to the IR:
subscriber U (user IR and IO) authorized access to IR owner OWR, if the mutual
authentication procedure is correct. For the owner IR OWR a local account is defined. In this
case, this entry shows all subscribers and their access type in accordance with the security
program:
 
   
  
 ,,,
0,
,,
,,
PISOWRUPISByALAccIs
UOWRUDToMapU
UOWRTGRByTRUIsOWRUUByTRUIs
PISOWRURiAssCOMPHas 







 (9)
and in relation to IR IO, local accounts on the nodes, which subscribers are displayed,
must also have the right of access – RI to the object Ob:
 
 
 
  
 ,,,
0,
,
,
,,,,
PISOWRUPISByALAccIs
UOWRUDToMapUListU
UOWRTGRByTRUIs
OWRUUByTRUIs
RIObPISOWRURiAssFCHas 













 (10)
where: Acc access; RI right of access to IR; AL allowed; TRU is reliable; MapU
subscriber/user card; ListU local subscriber account; UDToMapU function, which displays
a lot of users IR in IO in the format of local owner accounts IR – OWR.
Taking into account the papers [5, 9, 12, 13] refinements to the method control and access
management (CAM) were proposed, taking into account the specifics of the network IO.
Refined and supplemented method CAM is to reconcile access rights, which are requested by
the task and requirements of the security policy, and in addition, the coordination of the task
and access-authorized nodes IO. For IO nodes, there is also a procedure for reconciling access
rights for all subscribers who have the appropriate rights. As a result, a lot of nodes will be
received, at which subscriber tasks are allowed to be performed. This takes into account the
current security policy indicators for a specific IO and security metrics. It is possible to adjust
the rules for new tasks or redistributed tasks. This, adjustment or redistribution of tasks can be
described in the notation of Petri nets and taking into account the mathematical model, which
is described by expressions (8) – (10).
5. SIMULATION EXPERIMENT
Based on the above reasoning, on the basis of modified Petri nets (MPN) the model for
adaptive role-based access control to resources was developed IO (Access Control System –
ACS). And simulation modelling was performed in the package PIPE v4.3.0 (Platform
Independent Petri nets Editor). This approach allowed us to correctly describe conflict
situations, in addition, the peculiarity of processing requests that arise on most IS IO in the
multi-user mode. Figure 2. the scheme of the simulation model is presented. The diagram
shows the logical structure of the operating system model of the access rights (for the variant
of three-stage control). Positions and transitions in the network model based on МPN are
shown in Table 3.
During researches have been performed to evaluate the effectiveness of the proposed
models and refinements to the method of monitoring access rights. To evaluate the
effectiveness of the proposed solutions, an indicator was used that characterizes the reduction
of time spent on decision-making. Accordingly, the estimated time spent on processing data
before and after application, models and method, which proposed. The simulation experiment
was carried out for 400 computational nodes.
Development of a Conceptual Model of Adaptive Access Rights Management with Using the
Apparatus of Petri Nets
http://www.iaeme.com/IJCIET/index.asp 102 editor@iaeme.com
Table 3 Positions and transitions in the network model of the system with access rights in the basis of
modernized Petri nets
Figure 2. Scheme of the simulation model of adaptive
access rights management taking into account role
regulation
Positions
Symbol Description of position for
the user
1P Active state
2P Allowed to work in the project
3P Allowed to work with
functional components
4P Allowed to files of information
resources of IO
5P Checking the rights for the job
6P Checking the access rights to
functional components
7P Checking access to files
8P Restoration of the initial state
ACS
9P Limitation of activity in time
(for example, during job
adjustments)
Transitions
Symbol Description
8...1 TT Represent a set of conditions
for the transition (and
modification) of markers from
one network position to
another. The conditions are
determined by a set of a priori
data.
1- The total number of cyber threats that were implemented in IO;
2- Cyber threats associated with violation of access rights and abuse of authority.
Figure 3 Information Security Assessment IO
The statistical data obtained in the course of simulation modeling (in particular,
concerning the dynamics of markers, gave grounds to establish specific characteristics ACS
for companies that participated in the approbation of the model.
6. RESULTS AND DISCUSSION
The advantage of our research is the fact that the proposed solutions, in particular, the
developed conceptual model of adaptive access rights management using Petri nets apparatus,
V. Lakhno, V. Buriachok, L. Parkhuts, H. Tarasova, L. Kydyralina, P. Skladannyi,
M. Skrypnyk, A. Shostakovska
http://www.iaeme.com/IJCIET/index.asp 103 editor@iaeme.com
as well as models and method, have been successfully tested in the subsystem of the
administration of information and cybersecurity of several large universities in Ukraine, as
well as in commercial enterprises of Kiev and Dnipro. On the basis of the proposed solutions,
software products have been created, which made it possible to automate the control,
maintenance and modification of subscriber accounts of IO networks. At the same time, in
these software products (especially the “Threat Analyzer” [14]), the opportunity has been laid
to adjust subscriber access levels to information resources.
The disadvantage of this paper is not a large degree of approbation of the proposed
solutions, but research and work in the chosen direction continues.
The prospect of further research is the possibility of applying the results obtained for the
subsequent algorithmization of the processes associated with the analysis IS and CS of
various IO, in particular, for solving applied problems that are related to the problem of
management and access control in critical computer systems and information objects. In this
context, our work continues previous publications of the authors [14, 15].
7. GRATITUDES
The research and the article were carried out within the framework of promising scientific and
technical programs of the Department of Computer Systems and Networks of National
University of Bioresources and Natural Resources Use of Ukraine as well as a grant of the
Republic of Kazakhstan registration number AP05132723 "Development of adaptive expert
systems in the field of cybersecurity of very important information objects".
8. CONCLUSIONS
The results of this paper:
The conceptual model of adaptive management of cyber protection of the object of
informatization (IO) is described. An example of solving the problem of adaptive
management of user access rights using the apparatus of Petri nets is considered. A
corresponding model was implemented and simulations were performed in the PIPE v4.3.0
package. The possibility of automation of user profile adjustment procedures for minimizing
or neutralizing cyber threats in IO is shown;
the distribution model of tasks assigned by users in computer networks of information
objects is described. The basis for the model was the mathematical apparatus of Petri nets.
Unlike the existing ones, the model contains variables that allow reducing the power of the
state subspace. Also, the effectiveness of modeling has been improved, in particular by
reducing the time spent on making decisions related to the regulation of access rights;
the method of access control was updated and supplemented (ACM). The model takes into
account the current security policy indicators for specific IO and security metrics with
possible adjustments of the latter. Correction of rules and security metrics for new tasks or
redistributed tasks is described in Petri nets notation.
REFERENCES
[1] Gupta, Brij, Dharma P., Agrawal, & Shingo, Yamaguchi, eds. (2016). Handbook of
research on modern cryptographic solutions for computer and cyber security, IGI Global.
[2] Liu, X., Zhu, P., Zhang, Y., & Chen, K. (2015). A collaborative intrusion detection
mechanism against false data injection attack in advanced metering infrastructure, IEEE
Transactions on Smart Grid, 6(5), pp. 2435–2443.
Development of a Conceptual Model of Adaptive Access Rights Management with Using the
Apparatus of Petri Nets
http://www.iaeme.com/IJCIET/index.asp 104 editor@iaeme.com
[3] Jasiul, B., Szpyrka, M., & Śliwa, J. (2014). Detection and modeling of cyber-attacks with
Petri nets, Entropy, 16(12), pp. 6602–6623.
[4] Liu, X., Zhang, J., & Zhu, P. (2017). Modeling cyber-physical attacks based on
probabilistic colored Petri nets and mixed-strategy game theory. International Journal of
Critical Infrastructure Protection, 16, pp. 13–25.
[5] Jasiul, B., Szpyrka, M., & Śliwa, J. (2015). Formal specification of malware models in the
form of colored Petri nets. In Computer Science and its Applications, Springer, Berlin,
Heidelberg, pp. 475–482.
[6] Akhmetov, B., Lakhno, V., Boiko, Y., etc. (2017). Designing a decision support system
for the weakly formalized problems in the provision of cybersecurity. Eastern-European
Journal of Enterprise Technologies, (1(2)), pp. 4–15.
[7] Arendt, D. L., Burtner, R., Best, D. M., Bos, N. D., Gersh, J. R., Piatko, C. D., & Paul, C.
L. (2015). Ocelot: user-centered design of a decision support visualization for network
quarantine. In Visualization for Cyber Security (VizSec), IEEE Symposium, IEEE, pp. 1–
8.
[8] Alheeti, K. M. A., Gruebler, A., McDonald-Maier, K. D., & Fernando, A. (2016).
Prediction of DoS attacks in external communication for self-driving vehicles using a
fuzzy petri net model. In Consumer Electronics (ICCE), IEEE International Conference,
IEEE, pp. 502–503.
[9] de Carvalho, M. A., & Bandiera-Paiva, P. (2017). Evaluating ISO 14441 privacy
requirements on role based access control (RBAC) restrict mode via Colored Petri nets
(CPN) modeling. In Security Technology (ICCST), International Carnahan Conference,
IEEE, pp. 1–8.
[10] Appel, M., Konigorski, U., & Walther, M. (2018). A Graph Metric for Model Predictive
Control of Petri nets, IFAC-PapersOnLine, 51(2), pp. 254–259.
[11] Gao, Z., Zhao, C., Shang, C., & Tan, C. (2017). The optimal control of mine drainage
systems based on hybrid Petri nets. In Chinese Automation Congress (CAC), IEEE, pp.
78–83.
[12] Narayanan, M., & Cherukuri, A.K. (2018). Verification of Cloud Based Information
Integration Architecture using Colored Petri nets. International Journal of Computer
Network and Information Security, 10(2), 1.
[13] Lakhno, V.A., Nikolaievskyi, O.Y. etc. (2017). Models and tools for automatization of the
linguistic research, ournal of Theoretical and Applied Information Technology, Vol. 95,
Iss. 5, pp. 989–999.
[14] Tikhonov, U., Lakhno, V., etc. (2016). Development of ontological approach in e-learning
when studying information technologies, Eastern-European Journal of Enterprise
Technologies, No 5 (2), pp. 13–20.
[15] Lytvynenko, L., Nikolaievskyi, etc. (2017). Development of knowledge-oriented system
of machine translation based on the analytic-synthetic text processing, Eastern-European
Journal of Enterprise Technologies, No 1(2), pp. 15–24.

More Related Content

What's hot

AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKSAN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKSijcsa
 
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...IJECEIAES
 
A study of existing ontologies in the io t domain
A study of existing ontologies in the io t domainA study of existing ontologies in the io t domain
A study of existing ontologies in the io t domainSof Ouni
 
Top Cited Articles in 2019 - International Journal of Network Security & Its ...
Top Cited Articles in 2019 - International Journal of Network Security & Its ...Top Cited Articles in 2019 - International Journal of Network Security & Its ...
Top Cited Articles in 2019 - International Journal of Network Security & Its ...IJNSA Journal
 
April 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information TechnologyApril 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information TechnologyAIRCC Publishing Corporation
 
Army Study: Ontology-based Adaptive Systems of Cyber Defense
Army Study: Ontology-based Adaptive Systems of Cyber DefenseArmy Study: Ontology-based Adaptive Systems of Cyber Defense
Army Study: Ontology-based Adaptive Systems of Cyber DefenseRDECOM
 
A Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic AlgorithmA Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic Algorithmijtsrd
 
Top cited article in 2019 - International Journal of Network Security & Its A...
Top cited article in 2019 - International Journal of Network Security & Its A...Top cited article in 2019 - International Journal of Network Security & Its A...
Top cited article in 2019 - International Journal of Network Security & Its A...IJNSA Journal
 
New Research Articles 2021 June Issue International Journal of Computer Scien...
New Research Articles 2021 June Issue International Journal of Computer Scien...New Research Articles 2021 June Issue International Journal of Computer Scien...
New Research Articles 2021 June Issue International Journal of Computer Scien...AIRCC Publishing Corporation
 
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...IJECEIAES
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comPhD Assistance
 
CRITICAL INFRASTRUCTURE CYBERSECURITY CHALLENGES: IOT IN PERSPECTIVE
CRITICAL INFRASTRUCTURE CYBERSECURITY CHALLENGES: IOT IN PERSPECTIVECRITICAL INFRASTRUCTURE CYBERSECURITY CHALLENGES: IOT IN PERSPECTIVE
CRITICAL INFRASTRUCTURE CYBERSECURITY CHALLENGES: IOT IN PERSPECTIVEIJNSA Journal
 
Security optimization of dynamic networks with probabilistic graph modeling a...
Security optimization of dynamic networks with probabilistic graph modeling a...Security optimization of dynamic networks with probabilistic graph modeling a...
Security optimization of dynamic networks with probabilistic graph modeling a...Pvrtechnologies Nellore
 
The road to internet of things :a survey
The road to internet of things :a surveyThe road to internet of things :a survey
The road to internet of things :a surveySana
 
Spring 2012 Seminar Catalogue
Spring 2012 Seminar CatalogueSpring 2012 Seminar Catalogue
Spring 2012 Seminar Cataloguealidade
 
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...IJCNCJournal
 
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING IJNSA Journal
 

What's hot (20)

AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKSAN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
AN ONTOLOGY FOR EXPLORING KNOWLEDGE IN COMPUTER NETWORKS
 
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
Balancing Trade-off between Data Security and Energy Model for Wireless Senso...
 
A study of existing ontologies in the io t domain
A study of existing ontologies in the io t domainA study of existing ontologies in the io t domain
A study of existing ontologies in the io t domain
 
Top Cited Articles in 2019 - International Journal of Network Security & Its ...
Top Cited Articles in 2019 - International Journal of Network Security & Its ...Top Cited Articles in 2019 - International Journal of Network Security & Its ...
Top Cited Articles in 2019 - International Journal of Network Security & Its ...
 
April 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information TechnologyApril 2021: Top 10 View Article in Computer Science & Information Technology
April 2021: Top 10 View Article in Computer Science & Information Technology
 
Army Study: Ontology-based Adaptive Systems of Cyber Defense
Army Study: Ontology-based Adaptive Systems of Cyber DefenseArmy Study: Ontology-based Adaptive Systems of Cyber Defense
Army Study: Ontology-based Adaptive Systems of Cyber Defense
 
Phd defence presentation
Phd defence presentationPhd defence presentation
Phd defence presentation
 
A Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic AlgorithmA Model for Encryption of a Text Phrase using Genetic Algorithm
A Model for Encryption of a Text Phrase using Genetic Algorithm
 
Top cited article in 2019 - International Journal of Network Security & Its A...
Top cited article in 2019 - International Journal of Network Security & Its A...Top cited article in 2019 - International Journal of Network Security & Its A...
Top cited article in 2019 - International Journal of Network Security & Its A...
 
New Research Articles 2021 June Issue International Journal of Computer Scien...
New Research Articles 2021 June Issue International Journal of Computer Scien...New Research Articles 2021 June Issue International Journal of Computer Scien...
New Research Articles 2021 June Issue International Journal of Computer Scien...
 
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...
Trust correlation of mobile agent nodes with a regular node in a Adhoc networ...
 
Research proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.comResearch proposal on Computing Security and Reliability - Phdassistance.com
Research proposal on Computing Security and Reliability - Phdassistance.com
 
CRITICAL INFRASTRUCTURE CYBERSECURITY CHALLENGES: IOT IN PERSPECTIVE
CRITICAL INFRASTRUCTURE CYBERSECURITY CHALLENGES: IOT IN PERSPECTIVECRITICAL INFRASTRUCTURE CYBERSECURITY CHALLENGES: IOT IN PERSPECTIVE
CRITICAL INFRASTRUCTURE CYBERSECURITY CHALLENGES: IOT IN PERSPECTIVE
 
Security optimization of dynamic networks with probabilistic graph modeling a...
Security optimization of dynamic networks with probabilistic graph modeling a...Security optimization of dynamic networks with probabilistic graph modeling a...
Security optimization of dynamic networks with probabilistic graph modeling a...
 
The road to internet of things :a survey
The road to internet of things :a surveyThe road to internet of things :a survey
The road to internet of things :a survey
 
Spring 2012 Seminar Catalogue
Spring 2012 Seminar CatalogueSpring 2012 Seminar Catalogue
Spring 2012 Seminar Catalogue
 
L010517180
L010517180L010517180
L010517180
 
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
UTILIZING XAI TECHNIQUE TO IMPROVE AUTOENCODER BASED MODEL FOR COMPUTER NETWO...
 
Br36413417
Br36413417Br36413417
Br36413417
 
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
DESIGN AND IMPLEMENTATION OF THE ADVANCED CLOUD PRIVACY THREAT MODELING
 

Similar to DEVELOPMENT OF A CONCEPTUAL MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT WITH USING THE APPARATUS OF PETRI NETS

Titles with Abstracts_2023-2024_Cyber Security.pdf
Titles with Abstracts_2023-2024_Cyber Security.pdfTitles with Abstracts_2023-2024_Cyber Security.pdf
Titles with Abstracts_2023-2024_Cyber Security.pdfinfo751436
 
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMS
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMSDEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMS
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMSIAEME Publication
 
Artificial intelligence and machine learning in dynamic cyber risk analytics ...
Artificial intelligence and machine learning in dynamic cyber risk analytics ...Artificial intelligence and machine learning in dynamic cyber risk analytics ...
Artificial intelligence and machine learning in dynamic cyber risk analytics ...Petar Radanliev
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...ijccsa
 
n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...
n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...
n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...IJECEIAES
 
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...IJNSA Journal
 
Automatic Insider Threat Detection in E-mail System using N-gram Technique
Automatic Insider Threat Detection in E-mail System using N-gram TechniqueAutomatic Insider Threat Detection in E-mail System using N-gram Technique
Automatic Insider Threat Detection in E-mail System using N-gram TechniqueIRJET Journal
 
May 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information TechnologyMay 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information TechnologyAIRCC Publishing Corporation
 
Payette, Caceres, Anegbe _tim_review_june2015
Payette, Caceres, Anegbe _tim_review_june2015Payette, Caceres, Anegbe _tim_review_june2015
Payette, Caceres, Anegbe _tim_review_june2015Erika Caceres Lopez CSM
 
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...IRJET Journal
 
Trust-based secure routing against lethal behavior of nodes in wireless adhoc...
Trust-based secure routing against lethal behavior of nodes in wireless adhoc...Trust-based secure routing against lethal behavior of nodes in wireless adhoc...
Trust-based secure routing against lethal behavior of nodes in wireless adhoc...IJECEIAES
 
THE INTEREST OF HYBRIDIZING EXPLAINABLE AI WITH RNN TO RESOLVE DDOS ATTACKS: ...
THE INTEREST OF HYBRIDIZING EXPLAINABLE AI WITH RNN TO RESOLVE DDOS ATTACKS: ...THE INTEREST OF HYBRIDIZING EXPLAINABLE AI WITH RNN TO RESOLVE DDOS ATTACKS: ...
THE INTEREST OF HYBRIDIZING EXPLAINABLE AI WITH RNN TO RESOLVE DDOS ATTACKS: ...IJNSA Journal
 
APPLICATION OF SELF-ORGANIZING FEATURE MAPS AND MARKOV CHAINS TO RECOGNITION ...
APPLICATION OF SELF-ORGANIZING FEATURE MAPS AND MARKOV CHAINS TO RECOGNITION ...APPLICATION OF SELF-ORGANIZING FEATURE MAPS AND MARKOV CHAINS TO RECOGNITION ...
APPLICATION OF SELF-ORGANIZING FEATURE MAPS AND MARKOV CHAINS TO RECOGNITION ...IAEME Publication
 
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...AIRCC Publishing Corporation
 
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...ijcsit
 
Efficient network management and security in 5G enabled internet of things us...
Efficient network management and security in 5G enabled internet of things us...Efficient network management and security in 5G enabled internet of things us...
Efficient network management and security in 5G enabled internet of things us...IJECEIAES
 
A comprehensive study of distributed Denial-of-Service attack with the detect...
A comprehensive study of distributed Denial-of-Service attack with the detect...A comprehensive study of distributed Denial-of-Service attack with the detect...
A comprehensive study of distributed Denial-of-Service attack with the detect...IJECEIAES
 
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...IJNSA Journal
 
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET Journal
 

Similar to DEVELOPMENT OF A CONCEPTUAL MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT WITH USING THE APPARATUS OF PETRI NETS (20)

Titles with Abstracts_2023-2024_Cyber Security.pdf
Titles with Abstracts_2023-2024_Cyber Security.pdfTitles with Abstracts_2023-2024_Cyber Security.pdf
Titles with Abstracts_2023-2024_Cyber Security.pdf
 
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMS
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMSDEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMS
DEVELOPMENT OF A MODEL OF CYBER SECURITY MANAGEMENT FOR AUTOMATED SYSTEMS
 
Artificial intelligence and machine learning in dynamic cyber risk analytics ...
Artificial intelligence and machine learning in dynamic cyber risk analytics ...Artificial intelligence and machine learning in dynamic cyber risk analytics ...
Artificial intelligence and machine learning in dynamic cyber risk analytics ...
 
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
SECURITY AND PRIVACY AWARE PROGRAMMING MODEL FOR IOT APPLICATIONS IN CLOUD EN...
 
n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...
n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...
n-Tier Modelling of Robust Key management for Secure Data Aggregation in Wire...
 
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
INFORMATION AND COMMUNICATION SECURITY MECHANISMS FOR MICROSERVICES-BASED SYS...
 
Automatic Insider Threat Detection in E-mail System using N-gram Technique
Automatic Insider Threat Detection in E-mail System using N-gram TechniqueAutomatic Insider Threat Detection in E-mail System using N-gram Technique
Automatic Insider Threat Detection in E-mail System using N-gram Technique
 
May 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information TechnologyMay 2022: Most Downloaded Articles in Computer Science &Information Technology
May 2022: Most Downloaded Articles in Computer Science &Information Technology
 
Payette, Caceres, Anegbe _tim_review_june2015
Payette, Caceres, Anegbe _tim_review_june2015Payette, Caceres, Anegbe _tim_review_june2015
Payette, Caceres, Anegbe _tim_review_june2015
 
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
IRJET- Implementation of Artificial Intelligence Methods to Curb Cyber Assaul...
 
Trust-based secure routing against lethal behavior of nodes in wireless adhoc...
Trust-based secure routing against lethal behavior of nodes in wireless adhoc...Trust-based secure routing against lethal behavior of nodes in wireless adhoc...
Trust-based secure routing against lethal behavior of nodes in wireless adhoc...
 
THE INTEREST OF HYBRIDIZING EXPLAINABLE AI WITH RNN TO RESOLVE DDOS ATTACKS: ...
THE INTEREST OF HYBRIDIZING EXPLAINABLE AI WITH RNN TO RESOLVE DDOS ATTACKS: ...THE INTEREST OF HYBRIDIZING EXPLAINABLE AI WITH RNN TO RESOLVE DDOS ATTACKS: ...
THE INTEREST OF HYBRIDIZING EXPLAINABLE AI WITH RNN TO RESOLVE DDOS ATTACKS: ...
 
APPLICATION OF SELF-ORGANIZING FEATURE MAPS AND MARKOV CHAINS TO RECOGNITION ...
APPLICATION OF SELF-ORGANIZING FEATURE MAPS AND MARKOV CHAINS TO RECOGNITION ...APPLICATION OF SELF-ORGANIZING FEATURE MAPS AND MARKOV CHAINS TO RECOGNITION ...
APPLICATION OF SELF-ORGANIZING FEATURE MAPS AND MARKOV CHAINS TO RECOGNITION ...
 
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
Efficient Attack Detection in IoT Devices using Feature Engineering-Less Mach...
 
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
EFFICIENT ATTACK DETECTION IN IOT DEVICES USING FEATURE ENGINEERING-LESS MACH...
 
Efficient network management and security in 5G enabled internet of things us...
Efficient network management and security in 5G enabled internet of things us...Efficient network management and security in 5G enabled internet of things us...
Efficient network management and security in 5G enabled internet of things us...
 
A comprehensive study of distributed Denial-of-Service attack with the detect...
A comprehensive study of distributed Denial-of-Service attack with the detect...A comprehensive study of distributed Denial-of-Service attack with the detect...
A comprehensive study of distributed Denial-of-Service attack with the detect...
 
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
FEATURE EXTRACTION AND FEATURE SELECTION: REDUCING DATA COMPLEXITY WITH APACH...
 
Ijciet 10 02_001
Ijciet 10 02_001Ijciet 10 02_001
Ijciet 10 02_001
 
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed ServersIRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
IRJET- 3 Juncture based Issuer Driven Pull Out System using Distributed Servers
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSIAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSIAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSIAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSIAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOIAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYIAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEIAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTIAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 

Recently uploaded (20)

Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 

DEVELOPMENT OF A CONCEPTUAL MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT WITH USING THE APPARATUS OF PETRI NETS

  • 1. http://www.iaeme.com/IJCIET/index.asp 95 editor@iaeme.com International Journal of Civil Engineering and Technology (IJCIET) Volume 9, Issue 11, November 2018, pp. 95–104, Article ID: IJCIET_09_11_010 Available online at http://www.iaeme.com/ijciet/issues.asp?JType=IJCIET&VType=9&IType=10 ISSN Print: 0976-6308 and ISSN Online: 0976-6316 ©IAEME Publication Scopus Indexed DEVELOPMENT OF A CONCEPTUAL MODEL OF ADAPTIVE ACCESS RIGHTS MANAGEMENT WITH USING THE APPARATUS OF PETRI NETS V. Lakhno Department of Computer systems and networks, National University of Life and Environmental Sciences of Ukraine, Kiev, Ukraine V. Buriachok Head of the Department of Information and Cybersecurity, B. Grinchenko Kyiv University, Kiev, Ukraine L. Parkhuts Professor, Department of Information Security, Lviv Polytechnic National University, Lviv, Ukraine H. Tarasova Associate Professor of the Department, Kiev National University of Technology and Design, Kiev, Ukraine L. Kydyralina Doctoral Candidate, Kazakh National Pedagogical University named after Abay, Almaty, Kazakhstan P. Skladannyi Senior Lecturer of the Department of Information and Cybersecurity, B. Grinchenko Kyiv University, Kiev, Ukraine M. Skrypnyk Doctor of Science (Economics) Kyiv National University of Technology and Design, Kyiv, Ukraine A. Shostakovska Associate Professor of Department of Management and Marketing European University, Kiev, Ukraine
  • 2. Development of a Conceptual Model of Adaptive Access Rights Management with Using the Apparatus of Petri Nets http://www.iaeme.com/IJCIET/index.asp 96 editor@iaeme.com ABSTRACT The paper describes the conceptual model of adaptive control of cyber protection of the informatization object (IO). Petri's Networks were used as a mathematical device to solve the problem of adaptive control of user access rights. The simulation model is proposed and the simulation in PIPE v4.3.0 package is performed. The possibility of automating the procedures for adjusting the user profile to minimize or neutralize cyber threats in the objects of informatization is shown. The model of distribution of user tasks in computer networks of IO is proposed. The model, unlike the existing, is based on the mathematical apparatus of Petri's Networks and contains variables that allow reducing the power of the state space. Access control method (ACM) is added. The addenda touched upon aspects of reconciliation of access rights that are requested by the task and requirements of the security policy and the degree of consistency of tasks and access to the IO nodes. Adjustment of rules and security metrics for new tasks or redistributable tasks is described in the notation of Petri nets. Key words: Cybersecurity, access rights management, security policy, mathematical model, Petri nets, rule adjustment. Cite this Article: V. Lakhno, V. Buriachok, L. Parkhuts, H. Tarasova, L. Kydyralina, P. Skladannyi, M. Skrypnyk, A. Shostakovska, Development of a Conceptual Model of Adaptive Access Rights Management with Using the Apparatus of Petri Nets, International Journal of Civil Engineering and Technology (IJCIET) 9(11), 2018, pp. 95–104. http://www.iaeme.com/IJCIET/issues.asp?JType=IJCIET&VType=9&IType=11 1. INTRODUCTION The modern level of application of information technology (IT) and systems (ITS) at various objects of informatization (IO) reached the highest level. At the same time, most specialists in the field of IT note the need for primary tasks to preserve the integrity, confidentiality and accessibility of information, regardless of its functional purpose [1, 2]. Almost annually detection of previously unknown cyber threats (Cth) [3, 4] and a steady trend for the formation of a new landscape Cth for digitalized technologies and systems, make the tasks of information protection (IPr), information security (IS) and cybersecurity (CS) priority in the whole world [1, 2, 5]. Despite the commonness of the tasks for CS for various IO (information-educational environment of the modern university, automated control system for complex production or banking system), has own specifics of cyber threats [1–5]. However, the initial task of creating effective protection systems and CS any IO, remains the task of examining a specific object of protection, modelling of a potential intruder (computer attacker – CA) and cyber threats [1–5]. Implementation of the above steps will provide adequate requirements for information security systems (ISS) IO. In the context of the increasing complexity of cyber-attack scenarios on IO analysts of information security services (IS) need to respond quickly to cyber-attacks, threat anomalies. It makes the problem actual search for new ways to increase the effectiveness of decision- making in tasks to respond to attempts at destructive intervention by the CA or unscrupulous personnel in the work of IO. In this situation, a significant role can be played by various intellectualized decision support systems (IDSS) and expert systems (ES) in tasks of providing cybersecurity IO [5–7].
  • 3. V. Lakhno, V. Buriachok, L. Parkhuts, H. Tarasova, L. Kydyralina, P. Skladannyi, M. Skrypnyk, A. Shostakovska http://www.iaeme.com/IJCIET/index.asp 97 editor@iaeme.com We note that the mathematical component of the IDSS and ES in the CS tasks is various models and algorithms that enable specialists to intellectually support solutions. Within the framework of the research, the possibility of synthesizing analytical models for the main types of unauthorized access to IO. The possibility of describing functional models of various IO in terms of the Petri nets theory [4, 5, 7, 8]. Such a presentation will allow analysts IS and IPr to detail threats in the defended IO. In addition, in the future, it is possible to identify states that potentially determine vulnerabilities IO to new cyber threats. We also consider the prospects of using this model on the basis of Petri (and Petri-Markov) networks and colored Petri nets as mathematical and algorithmic components, which projected IDSS in the process of analyzing cyber threats for various IO. In our opinion, these judgments make our paper relevant and increase the effectiveness of the work on the creation of IDSS in the tasks of IPr and CS for various IO. 2. LITERATURE REVIEW AND PROBLEM POSING In the papers [3–5, 8, 9] were presented results of research, devoted to the application of Petri nets for the description of the threat model CS IO. Although these works have made an undeniable theoretical contribution to this issue, in our opinion, the models proposed by the authors are somewhat difficult to implement programmatically, especially IDSS and ES of IPr and CS IO. Based on the papers [3, 5] of the threat model, it is possible to construct using a visual tabular form of displaying threats when updating the question of evaluating IO security. But, this approach to drawing up models of threats is laborious. In addition, the growing number of threats makes such a tabular presentation format difficult to comprehend, especially for specialists with little experience in the field of CS. Petri nets (and Petri-Markov) were also successfully used to describe intruder models [10, 11]. However, the authors did not consider the possibility of correcting the intruder model (CA), in particular by combining it with models on the basis of graph theory, which would allow more accurately describe state transitions in the process of probable overcoming of CA perimeters (boundaries) of cyber protection for a particular object ОI. In the papers [3, 8, 9] models ISS for various IO were considered as preliminary allocated in Petri nets sequences of elementary operations, from which cyber-attack is possible. The models allowed calculating the possibility of implementing different attacks for a certain period of time. However, the models considered in [9, 10] did not allow us to calculate the time characteristics in the process of implementing new cyber threats. In the papers [5, 12], models based on Petri nets were proposed and described the processes of implementing threats in information systems (IS). Although these models made it possible to evaluate many of the security parameters IO, in particular, the likelihood of the implementation of threats, the time to implement threats, the coherence of CA actions, they are not fully completed. In these papers, the issue of resolving conflict situations arising when IS states change during attacks has not been studied, belonging to different classes. This circumstance, in our opinion, limits the practical applicability of this research. Thus, the synthesis of new models, as well as the addition of existing models and methods of adaptive cyber defense management of various IO with using of the capabilities of the apparatus of Petri nets and taking into account the potential of visualization of Petri nets, can become an effective tool for forecasting the state of security for particular IO. This will significantly simplify the understanding for new cyber threats and in the future possible the effective application of the proposed approaches by service analysts IPr, IS and CS of various IO.
  • 4. Development of a Conceptual Model of Adaptive Access Rights Management with Using the Apparatus of Petri Nets http://www.iaeme.com/IJCIET/index.asp 98 editor@iaeme.com 3. GOAL AND OBJECTIVES OF THE STUDY The goal is the development of models and methods that contribute to increasing the stability of the functioning of computer networks of various information objects on the basis of adaptive management of cybersecurity mechanisms in conditions of increasing the number and complexity of destructive unauthorized impact. To achieve the goal of the research, the following tasks are solved: Conceptual model of adaptive management of cyber protection of the information object (IO) using the apparatus of Petri nets; models of distribution of user tasks in computer networks of information objects (IO); Additions to the Access Control Method in the Context of Reconciliation of Access Rights that are Requested by the Task and the Requirements of the Security Policy and the Degree of Consistency of the Task and Access Permitted Nodes IO. 4. MODELS AND METHODS In accordance with the purposes of our research, this section of the article describes a conceptual model of adaptive cyber protection management IO. Accepted designations: B1 - block information and measuring devices of OBI; B2 - block of multichannel control devices; В3 - OBI as object of access control to resources; B4 - state prediction unit in OBI; B5 - decision block on the right of access; В6 - the block of calculation of efficiency by quantity of the realized threats connected with infringement of access in OBI; B7 - block of a priori information; B8 - block of variable models. Figure 1 Scheme of the conceptual model of adaptive control of cyber protection of the information object. An example of a solution of the problem adaptive management of user access rights using apparatus of Petri nets and related software, which allows you to automate the adjustment of the user profile, and also through the integration of IDSS module to recommend ways to neutralize cyber threats in IO. We formulated the tasks of managing access rights: 1) the model of access delimitation for a given IO is constructed; 2) determine the model parameters that are controlled; 3) parameterization of the risk of breach of confidentiality of information for IO to perform. A formal mathematical statement of the problem of optimizing the scheme of access delimitation in IO. Initial data: 1) access objects of IO –   IiaoAO i ,1,  ; 2) subjects of access in IO –   JjsaSA j ,1,  ; 3) communication nodes (CN) in IO –   KkcnCN k ,1,  ; 4) an adaptive mechanism that responds allows you to maintain access security metrics in the IO at a given level –   JjIiamAM ji ,1,,1,0 , 0  . Suppose that an acceptable level of protection IO is achieved if the conditions are met, as shown in Table 1.
  • 5. V. Lakhno, V. Buriachok, L. Parkhuts, H. Tarasova, L. Kydyralina, P. Skladannyi, M. Skrypnyk, A. Shostakovska http://www.iaeme.com/IJCIET/index.asp 99 editor@iaeme.com Table 1 The conditions under which an acceptable level of protection is achieved IО (for setting optimization of access control of IO) [with considering 8, 9, 12] No Parameter Condition 1 An adaptive mechanism that allows you to maintain access security metrics in IO at a given level [5, 9].       .Otherwise,0 ;сnodea onplacedisitif,1 , k i ji т am am 2 Damage from possible unauthorized access to resources –   JjIidaDA ji ,1,,1,0 , 0  [8, 12]. See note. 3 The structure of the computer network IО –   KnmnsNS nm ,1,,,      objects.Network .Otherwise,0 ;&if,1 ,       o onom nm NSwhere NScnNScn ns Managed Parameters (are set by the administrator IP and CS) 1 Symptoms of sharing resources IO –  isvSV  [6, 9].       .Otherwise,0 ;allowedisnodea toaccessgeneraltheif,1 ii svsv 2 Accommodation AO on nodes IO –  1 , 1 kimpMP       .Otherwise,0 ;if,11 , ki ki cnao mp 3 Accommodation SA on nodes IO –  2 , 2 kjmpMP  .      .Otherwise,0 ;if,12 , kj kj cnsa mp Note: The damage from the probable unauthorized access to resources (line 2) determines the degree of information resources on the IO node, and the user profile (taking into account the characteristics of probable intruders, look at Table 2). The conditions under which an acceptable level of protection is achieved IO (to specify the optimization of access control for IO) is subsequently considered in conjunction with the data in Table 2. We will assume that the objective function is the magnitude of the likely expected damage from unauthorized access to information resources (IR) IO (further IR and IО). This parameter is defined as a measure of the discrepancy between the real and optimal delineation of user access to IR for a particular IO.    I i J j jijiji amamdaTF 1 1 0 ,, 0 , , (1) where  jiam , elements of a set that displays already implemented access rights. Then ;0 , 1 ,, jk K k kiji wnsam   (2)  ;1 1 , 1 , 0 , jkijkjk wsvww  (3)    K k jkkijk mpmpw 1 1 , 2 , 1 , . (4)
  • 6. Development of a Conceptual Model of Adaptive Access Rights Management with Using the Apparatus of Petri Nets http://www.iaeme.com/IJCIET/index.asp 100 editor@iaeme.com Table 2 Characteristics of potential intruders [9, 10, 13] Classification Characteristic For reasons of violation Violation of integrity, confidentiality, accessibility with mercenary or other purpose. According to the level of awareness and qualification of CA Intruder (or CA): 1) a high level of knowledge; 2) sufficient knowledge to gather information, use of known exploits and write your own software for cyber attacking; 3) CA is not an authorized user of IO. By location Without physical access to the IO territory. The intruder acts remotely, for example, through public networks. Thus, the formulation of the task of differentiating access rights was obtained. This problem relates to the tasks of non-linear optimization of the vector of controllable parameters in Boolean variables:    I i J j jijiji amamdaUD 1 1 0 ,, 0 ,min (5) for the following restrictions   K k jida 1 1 , 1 (6) .1 1 2 ,  K k jida (7) Constant adjustment of the profile of the active user assumed the use of a special iterative algorithm [14]. This algorithm based on the implicit server feedback with the user specific IO resources. The key factor is the query statistics. The evaluation of the current user profile was used to rank users into groups by the degree of danger for IR and IO. Accepted: a) user; b) a potentially dangerous user; c) dangerous user; d) the intruder. Optimization of access control procedures was carried out on the basis of the definition of such parameters: 1) Intensity of transitions (determined on the basis of regression models) [14]; 2) Parameterization of the risk associated with violation of confidentiality of information IO. It is defined as a multifactorial regression model of the 2-nd order [15]:   ,, 1, , 1 2 , 1 0 jihhdahdahdadaP ji m ji ji m ao aoaoao m k kkr     where    T mhhh ,...,1 managed parameters that regulate the rules of delineating access in networks of specific IO:  time. With respect to any IO with a distributed resource access scheme, the subscriber task model is defined as follows   RESMRTFTRsATPISPN ,,,,,, 0 , (8) where   FMPNTTGRPN ,,, IR and IO (are represented by the Petri nets);   tgrTGR set of vertices graph (top - supplier IR and IO);  tT number of transitions between vertices;   nmpnmpnMPN ,...,1 Petri nets marking; F neighbor ratio; PIS information security policy; AT – active tasks initiated by users IR IO; 0s initial state  ;sS   SAPISMRTATPNFTR: transition function between states IR ОI;  UCLMRT , markers in Petri nets, CL class of resources that subscribers (users) request (U); RES current position in the access rights to IR in IO.
  • 7. V. Lakhno, V. Buriachok, L. Parkhuts, H. Tarasova, L. Kydyralina, P. Skladannyi, M. Skrypnyk, A. Shostakovska http://www.iaeme.com/IJCIET/index.asp 101 editor@iaeme.com Taking into account the previous calculations, such rules were obtained for the software product "Threat Analyzer" (described in detail [14]) to make a decision on the possibility of the user's access to the IR: subscriber U (user IR and IO) authorized access to IR owner OWR, if the mutual authentication procedure is correct. For the owner IR OWR a local account is defined. In this case, this entry shows all subscribers and their access type in accordance with the security program:           ,,, 0, ,, ,, PISOWRUPISByALAccIs UOWRUDToMapU UOWRTGRByTRUIsOWRUUByTRUIs PISOWRURiAssCOMPHas          (9) and in relation to IR IO, local accounts on the nodes, which subscribers are displayed, must also have the right of access – RI to the object Ob:           ,,, 0, , , ,,,, PISOWRUPISByALAccIs UOWRUDToMapUListU UOWRTGRByTRUIs OWRUUByTRUIs RIObPISOWRURiAssFCHas                (10) where: Acc access; RI right of access to IR; AL allowed; TRU is reliable; MapU subscriber/user card; ListU local subscriber account; UDToMapU function, which displays a lot of users IR in IO in the format of local owner accounts IR – OWR. Taking into account the papers [5, 9, 12, 13] refinements to the method control and access management (CAM) were proposed, taking into account the specifics of the network IO. Refined and supplemented method CAM is to reconcile access rights, which are requested by the task and requirements of the security policy, and in addition, the coordination of the task and access-authorized nodes IO. For IO nodes, there is also a procedure for reconciling access rights for all subscribers who have the appropriate rights. As a result, a lot of nodes will be received, at which subscriber tasks are allowed to be performed. This takes into account the current security policy indicators for a specific IO and security metrics. It is possible to adjust the rules for new tasks or redistributed tasks. This, adjustment or redistribution of tasks can be described in the notation of Petri nets and taking into account the mathematical model, which is described by expressions (8) – (10). 5. SIMULATION EXPERIMENT Based on the above reasoning, on the basis of modified Petri nets (MPN) the model for adaptive role-based access control to resources was developed IO (Access Control System – ACS). And simulation modelling was performed in the package PIPE v4.3.0 (Platform Independent Petri nets Editor). This approach allowed us to correctly describe conflict situations, in addition, the peculiarity of processing requests that arise on most IS IO in the multi-user mode. Figure 2. the scheme of the simulation model is presented. The diagram shows the logical structure of the operating system model of the access rights (for the variant of three-stage control). Positions and transitions in the network model based on МPN are shown in Table 3. During researches have been performed to evaluate the effectiveness of the proposed models and refinements to the method of monitoring access rights. To evaluate the effectiveness of the proposed solutions, an indicator was used that characterizes the reduction of time spent on decision-making. Accordingly, the estimated time spent on processing data before and after application, models and method, which proposed. The simulation experiment was carried out for 400 computational nodes.
  • 8. Development of a Conceptual Model of Adaptive Access Rights Management with Using the Apparatus of Petri Nets http://www.iaeme.com/IJCIET/index.asp 102 editor@iaeme.com Table 3 Positions and transitions in the network model of the system with access rights in the basis of modernized Petri nets Figure 2. Scheme of the simulation model of adaptive access rights management taking into account role regulation Positions Symbol Description of position for the user 1P Active state 2P Allowed to work in the project 3P Allowed to work with functional components 4P Allowed to files of information resources of IO 5P Checking the rights for the job 6P Checking the access rights to functional components 7P Checking access to files 8P Restoration of the initial state ACS 9P Limitation of activity in time (for example, during job adjustments) Transitions Symbol Description 8...1 TT Represent a set of conditions for the transition (and modification) of markers from one network position to another. The conditions are determined by a set of a priori data. 1- The total number of cyber threats that were implemented in IO; 2- Cyber threats associated with violation of access rights and abuse of authority. Figure 3 Information Security Assessment IO The statistical data obtained in the course of simulation modeling (in particular, concerning the dynamics of markers, gave grounds to establish specific characteristics ACS for companies that participated in the approbation of the model. 6. RESULTS AND DISCUSSION The advantage of our research is the fact that the proposed solutions, in particular, the developed conceptual model of adaptive access rights management using Petri nets apparatus,
  • 9. V. Lakhno, V. Buriachok, L. Parkhuts, H. Tarasova, L. Kydyralina, P. Skladannyi, M. Skrypnyk, A. Shostakovska http://www.iaeme.com/IJCIET/index.asp 103 editor@iaeme.com as well as models and method, have been successfully tested in the subsystem of the administration of information and cybersecurity of several large universities in Ukraine, as well as in commercial enterprises of Kiev and Dnipro. On the basis of the proposed solutions, software products have been created, which made it possible to automate the control, maintenance and modification of subscriber accounts of IO networks. At the same time, in these software products (especially the “Threat Analyzer” [14]), the opportunity has been laid to adjust subscriber access levels to information resources. The disadvantage of this paper is not a large degree of approbation of the proposed solutions, but research and work in the chosen direction continues. The prospect of further research is the possibility of applying the results obtained for the subsequent algorithmization of the processes associated with the analysis IS and CS of various IO, in particular, for solving applied problems that are related to the problem of management and access control in critical computer systems and information objects. In this context, our work continues previous publications of the authors [14, 15]. 7. GRATITUDES The research and the article were carried out within the framework of promising scientific and technical programs of the Department of Computer Systems and Networks of National University of Bioresources and Natural Resources Use of Ukraine as well as a grant of the Republic of Kazakhstan registration number AP05132723 "Development of adaptive expert systems in the field of cybersecurity of very important information objects". 8. CONCLUSIONS The results of this paper: The conceptual model of adaptive management of cyber protection of the object of informatization (IO) is described. An example of solving the problem of adaptive management of user access rights using the apparatus of Petri nets is considered. A corresponding model was implemented and simulations were performed in the PIPE v4.3.0 package. The possibility of automation of user profile adjustment procedures for minimizing or neutralizing cyber threats in IO is shown; the distribution model of tasks assigned by users in computer networks of information objects is described. The basis for the model was the mathematical apparatus of Petri nets. Unlike the existing ones, the model contains variables that allow reducing the power of the state subspace. Also, the effectiveness of modeling has been improved, in particular by reducing the time spent on making decisions related to the regulation of access rights; the method of access control was updated and supplemented (ACM). The model takes into account the current security policy indicators for specific IO and security metrics with possible adjustments of the latter. Correction of rules and security metrics for new tasks or redistributed tasks is described in Petri nets notation. REFERENCES [1] Gupta, Brij, Dharma P., Agrawal, & Shingo, Yamaguchi, eds. (2016). Handbook of research on modern cryptographic solutions for computer and cyber security, IGI Global. [2] Liu, X., Zhu, P., Zhang, Y., & Chen, K. (2015). A collaborative intrusion detection mechanism against false data injection attack in advanced metering infrastructure, IEEE Transactions on Smart Grid, 6(5), pp. 2435–2443.
  • 10. Development of a Conceptual Model of Adaptive Access Rights Management with Using the Apparatus of Petri Nets http://www.iaeme.com/IJCIET/index.asp 104 editor@iaeme.com [3] Jasiul, B., Szpyrka, M., & Śliwa, J. (2014). Detection and modeling of cyber-attacks with Petri nets, Entropy, 16(12), pp. 6602–6623. [4] Liu, X., Zhang, J., & Zhu, P. (2017). Modeling cyber-physical attacks based on probabilistic colored Petri nets and mixed-strategy game theory. International Journal of Critical Infrastructure Protection, 16, pp. 13–25. [5] Jasiul, B., Szpyrka, M., & Śliwa, J. (2015). Formal specification of malware models in the form of colored Petri nets. In Computer Science and its Applications, Springer, Berlin, Heidelberg, pp. 475–482. [6] Akhmetov, B., Lakhno, V., Boiko, Y., etc. (2017). Designing a decision support system for the weakly formalized problems in the provision of cybersecurity. Eastern-European Journal of Enterprise Technologies, (1(2)), pp. 4–15. [7] Arendt, D. L., Burtner, R., Best, D. M., Bos, N. D., Gersh, J. R., Piatko, C. D., & Paul, C. L. (2015). Ocelot: user-centered design of a decision support visualization for network quarantine. In Visualization for Cyber Security (VizSec), IEEE Symposium, IEEE, pp. 1– 8. [8] Alheeti, K. M. A., Gruebler, A., McDonald-Maier, K. D., & Fernando, A. (2016). Prediction of DoS attacks in external communication for self-driving vehicles using a fuzzy petri net model. In Consumer Electronics (ICCE), IEEE International Conference, IEEE, pp. 502–503. [9] de Carvalho, M. A., & Bandiera-Paiva, P. (2017). Evaluating ISO 14441 privacy requirements on role based access control (RBAC) restrict mode via Colored Petri nets (CPN) modeling. In Security Technology (ICCST), International Carnahan Conference, IEEE, pp. 1–8. [10] Appel, M., Konigorski, U., & Walther, M. (2018). A Graph Metric for Model Predictive Control of Petri nets, IFAC-PapersOnLine, 51(2), pp. 254–259. [11] Gao, Z., Zhao, C., Shang, C., & Tan, C. (2017). The optimal control of mine drainage systems based on hybrid Petri nets. In Chinese Automation Congress (CAC), IEEE, pp. 78–83. [12] Narayanan, M., & Cherukuri, A.K. (2018). Verification of Cloud Based Information Integration Architecture using Colored Petri nets. International Journal of Computer Network and Information Security, 10(2), 1. [13] Lakhno, V.A., Nikolaievskyi, O.Y. etc. (2017). Models and tools for automatization of the linguistic research, ournal of Theoretical and Applied Information Technology, Vol. 95, Iss. 5, pp. 989–999. [14] Tikhonov, U., Lakhno, V., etc. (2016). Development of ontological approach in e-learning when studying information technologies, Eastern-European Journal of Enterprise Technologies, No 5 (2), pp. 13–20. [15] Lytvynenko, L., Nikolaievskyi, etc. (2017). Development of knowledge-oriented system of machine translation based on the analytic-synthetic text processing, Eastern-European Journal of Enterprise Technologies, No 1(2), pp. 15–24.