,
..., , - " "", , -, serg123_61@mail.ru
,
..., , ,
, -,
ibsaen@mail.ru
: , , , , , , , , , .
() ( ). , , . , . . . . , "-". . , , , . , , . . , - . , .
:
.., .. // T-Comm: . - 2015. - 1. - . 5-10.
For citation:
Ageev S.A., Saenko I.B. Method of intellectual multi-agent information security risk management in protected multiservice special-purposed networks // T-Comm. 2015. No.1. . 5-10.


() . [1-3] , , . , , , , ї.
[13, 14]. , , .
I.

() [3-5], () - , .
[I, 6-9]. .
.
, . , , () [10], :
= *

, [10]. - , , .
, .
:
- ;
- ;
- ;
- .
, , , , - (), -ї [5, 13].
.
1. . .
2. . , () ,
3. . ( ), , , , . .
4. . .
:
- ;
- ;
- ;
- ;
- ;
- ;
- .

2.
(, I) [14, 15]:
- - , . (), , ;
- - , (X) X, ;
- - , = (X) ;
. .
. . . |
0->4> 11 . . I [. .! / , [.][[. I> ;=1
<;>
. I.
- - , , (X)',
- - , .
3.
-ї, :
< => , => 0>. (2)
:
{ , , , , ), (3)
- ; -, , () ; / - , , . [, 15], , :
(. =. .&.- =- . &.....& . = .). => , = 3 . 3 =
\ \] ) 2 2] ) ] ] ! )
(4)
- , -

, )- , 3 - ;-

, - , => - , (0< |-'.| < 1) ~~
)- , - , ;-
.
(4) . : [. (() ~~
[- ; / | ;
I 1-1'
/\ - &[ ] 3 . /-

:
= (/[) X, /') X-X] /*її > j = (5)
^ :

- , / . =< >, 5 - , % ~< >
(6)


={

}
(?)
"I "2 "
(7) {3 , 3 > 3 } -
1 2
, [) ] , [15].



. 3.
, , , [15], .
4.
:
1) ( );
2) ;
3) .
5 10 15
ї
ї

s is
ї
, 2.
, () . . . [14].
(5). ; ,
. :
- () () ;
- ;
- ;
- .

-, , ,
. 2, , , . 3 -
. 1.
, .
, <>, <>. <>, . , .

, , . , , .
- [14].
, , - , , .

1. .. . - .: -, 2003.
2. , ., .., ., 0,6. I/ . . - 2011, - 3. - . 30-39.
3. .., .., .., .. . - 201I. - N21. - . 50-57,
4. ., .., .., .. . - 20i2. - . 3(29). - . 8-18.
5. . , . - .: - , 2005. - 832 .
6. ITU-T Recommendation .3400, TMN management functions. - 2000.
7. ITU-T Recommendation M.3020. TMN interface specification methodology. - 2000.
8. PB 5819 - 112-2008. ї.
9. .. : . 3- . 3. - / . .. . - .: - , 2005. -592 .
10. .. - . - .: ї, 2013. - 336 .
1 I. 6,6,, . . . - .: - , 2012. - 284 ,
12. .., .., .. . - .: -, 2012. - 138 .
13. .. . . - 2009, T.4I. - . 74-103.
14. 3< . : Fuzzy-. - .: ї, 2013. - 352 .
15. .. MATLAB, - ,: - , 2007, - 288 .
COMMUNICATIONS
METHOD OF INTELLECTUAL MULTI-AGENT INFORMATION SECURITY RISK MANAGEMENT IN PROTECTED MULTISERVICE SPECIAL-PURPOSED NETWORKS
Sergei Ageev
Head of the science and technology center, OAO "Nil" Neptune", Saint Petersburg, Russia, serg123_61@mail.ru
Igor Saenko
Doctor of Sciences, Full Professor, Military Academy of Communication, Saint Petersburg, Russia, ibsaen@mail.ru Abstract
The article deals with the basic approaches to developing intelligent methods and algorithms for the estimation of risk management and information security (IS) in protected multiservice special-purposed networks (PMSPN). Requirements for risk management, which are defined by both international and domestic standards, are analyzed. The analysis showed that the standards do not define specific methods and algorithms of the IS-risk management in PMSPN. The main stages of IS-risk management in PMSPN are defined. On the basis of the conducted analysis, the method and the algorithm for IS-risk management in PMSPN are developed. System architecture of the intelligent multiagent is discussed. The construction of the IS-risk management subsystem that is based on the technology of distributed intelligent multiagents, the foundation of which is the "agent - manager" technology, is offered. The main features of this technology and its basic properties are considered. The article shows that the incompleteness, uncertainty and a weak structure of source data in the analysis of IS-risk management in PMSPN lead to use necessarily intelligent management methods, which mathematical foundation is based on the fuzzy sets' theory and fuzzy inference techniques. Based on the resulting data of the work, the comprehensive mathematical model of IS-risk assessment of PMSPN network elements is created. Numerical experiment on the developed mathematical model is made, and the results of the analysis are given. The article shows, that the use of the proposed methods when the IS-risk management system in PMSPN is developed increases the speed and accuracy of decision-making and allows you to search for management decisions in the Pareto-optimal solutions. The proposed solutions lead to a significant increase in the sustainability of the IS-subsystem in PMSPN, as well as significantly reduce the volume of service traffic.
Keywords: protected multi-service network, telematics communication services, information security risks, mathematical model, intelligent control, fuzzy inference, knowledge base, membership function, fuzzy data, linguistic variable.
References
1. Grebeshkov, A 2003, 'Standards and technology network connection', Eco-Trend, 288 p. [in Russian]
2. Saenko, l, Ageyev, S, Sherstyuk, Yu, Polubelova, O 2011, 'Automation framework manage multiservice networks', The problem of information security. Computer systems, no. 3, pp. 30-39. [in Russian]
3. Ageev, S, Bushuev, A, Egorov, Yu, Saenko, l 2011, 'Concept of automation of the management of information security in protected multiservice networks of spe-cial-purpose', Process automation control, no. 1, pp.50-57. [in Russian]
4. Ageev, S, Saenko, l, Egorov, Yu, Gladkih, A 2012, 'To develop a complex of mathematical management models of the protected multi-service network', Automa-tion of managerial processes, no.3 (29), pp. 8-18. [in Russian]
5. Stollings, C 2005, 'Computer networks, protocols and technologies of the In-ternet', BHVPetersburg .St. Petersburg, 832 p. [in Russian]
6. ITU-T Recommendation M.3400 2000, 'TMN management functions'. [in Russian]
7. ITU-T Recommendation M.3020 2000, 'TMN interface specification meth-odology'. [in Russian]
8. GOST RV 5819-112 2008, 'OACSS of the RF ARMED FORCES. General requirements to the automated integrated communication control system'. [in Rus-sian]
9. Yaroslavtsev, A 2005, 'Multiservice Networks', Telecommunication systems and networks. Vol. 3, Hotline-Telecom, 592 p. [in Russian]
10. Platonov, V 2013, 'Software-hardware data protection', Publishing Centre Academy, 336 p. [in Russian]
11. Borisov, V, Fedulov, A, Kruglov, V 2012, 'Fuzzy models and networks', Hotline-Telecom, 284 p. [in Russian]
12. Belov, V, Smirnov, A, Chistyakova, V 2012, 'Recognition of fuzzy defined conditions of technical systems', Hotline-Telecom, 138 p. [in Russian]
13. Kotenko, l 2009, 'Intelligent cyber security management mechanisms', Pro-ceedings of SPIIRAS, vol. 41, pp. 74-103. [in Russian]
14. Zach, Yu 2013, 'Decision making under fuzzy and blurry data: Fuzzy-technologies', Book House"LIBROKOM", 352 p. [in Russian]
15. Shtovba, S 2007, 'Fuzzy systems design using MATLAB', Hotline-Telecom, 288 p. [in Russian].