Computer systems resilience in the presence of cyber threats: Taxonomy and ontology
The rapid development of information technology has expanded the capabilities of cyberthreads regarding computer systems. Cybercriminals are developing new ways to avoid attack detection, so existing approaches are not able to withstand the growing threat of attacks. Meanwhile, the consequences of c...
Gespeichert in:
| Veröffentlicht in: | Radìoelektronnì ì komp'ûternì sistemi (Online) H. 1; S. 17 - 28 |
|---|---|
| Hauptverfasser: | , , , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
National Aerospace University «Kharkiv Aviation Institute
28.01.2020
|
| Schlagworte: | |
| ISSN: | 1814-4225, 2663-2012 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | The rapid development of information technology has expanded the capabilities of cyberthreads regarding computer systems. Cybercriminals are developing new ways to avoid attack detection, so existing approaches are not able to withstand the growing threat of attacks. Meanwhile, the consequences of cyberattacks are becoming more dangerous and destructive. One of the approaches to solve the problem is the construction of resilient systems that are able to quickly recover and continue to function under attack conditions. The subject of research is the construction process of the resilient computer systems in the face of cyber threats. The goal is to develop a taxonomy and ontology of resilient computer systems under cyberthreats. Results. The article presents the definitions of the resilience from the point of view of cybersecurity, presents the gap between the concepts of resilience and dependability. The paper presents the main elements of the taxonomic scheme of computer system resilience, which include threats (changes in the environment and requirements, network attacks, attacks on software, software and hardware vulnerabilities, errors, failures), information and technical conditions that computer system passes during its operating cycle, the principles on which resilience is based (proactivity, adaptability, resistance, diversity, elasticity, controlled degradation, defense in depth, ability to evolvability), as well as primary and secondary properties. Based on the above elements, a generalized taxonomic scheme of resilience related to information security has been developed. The work presents the operational cycle of a resilient CS as a set of information and technical states that the system goes through (preparation, system protection, threat detection, threat absorption, response to a threat, system recovery after a cyberattack, adaptation.) An ontology scheme of the resilience from the point of view of information security of computer systems in the presence of cyberthreats is developed. Conclusions A taxonomy and ontology of resilient computer systems in the presence of cyberthreats has been developed. |
|---|---|
| AbstractList | The rapid development of information technology has expanded the capabilities of cyberthreads regarding computer systems. Cybercriminals are developing new ways to avoid attack detection, so existing approaches are not able to withstand the growing threat of attacks. Meanwhile, the consequences of cyberattacks are becoming more dangerous and destructive. One of the approaches to solve the problem is the construction of resilient systems that are able to quickly recover and continue to function under attack conditions. The subject of research is the construction process of the resilient computer systems in the face of cyber threats. The goal is to develop a taxonomy and ontology of resilient computer systems under cyberthreats. Results. The article presents the definitions of the resilience from the point of view of cybersecurity, presents the gap between the concepts of resilience and dependability. The paper presents the main elements of the taxonomic scheme of computer system resilience, which include threats (changes in the environment and requirements, network attacks, attacks on software, software and hardware vulnerabilities, errors, failures), information and technical conditions that computer system passes during its operating cycle, the principles on which resilience is based (proactivity, adaptability, resistance, diversity, elasticity, controlled degradation, defense in depth, ability to evolvability), as well as primary and secondary properties. Based on the above elements, a generalized taxonomic scheme of resilience related to information security has been developed. The work presents the operational cycle of a resilient CS as a set of information and technical states that the system goes through (preparation, system protection, threat detection, threat absorption, response to a threat, system recovery after a cyberattack, adaptation.) An ontology scheme of the resilience from the point of view of information security of computer systems in the presence of cyberthreats is developed. Conclusions A taxonomy and ontology of resilient computer systems in the presence of cyberthreats has been developed. |
| Author | Лисенко, Сергій Миколайович Бобровнікова, Кіра Юліївна Щука, Роман Володимирович Харченко, Вячеслав Сергійович |
| Author_xml | – sequence: 1 givenname: Сергій Миколайович orcidid: 0000-0001-7243-8747 surname: Лисенко fullname: Лисенко, Сергій Миколайович – sequence: 2 givenname: Вячеслав Сергійович orcidid: 0000-0001-5352-077X surname: Харченко fullname: Харченко, Вячеслав Сергійович – sequence: 3 givenname: Кіра Юліївна orcidid: 0000-0002-1046-893X surname: Бобровнікова fullname: Бобровнікова, Кіра Юліївна – sequence: 4 givenname: Роман Володимирович surname: Щука fullname: Щука, Роман Володимирович |
| BookMark | eNp1kM1LAzEQxYMoWKtnr_kHtk2yX1lvUvwoFDxYz2E2mWjq7qYkEdz_3rXVi-BpmMe8x5vfBTkd_ICEXHO2yEUl2DLge1wIJtiCL5g4ITNRVXkmGBenZMYlL7JCiPKcXMW4Y4wJWZe8ljPyvPL9_iNhoHGMCftIA0bXORw0UjfQ9IZ0P0mH3Vuqx3a6TW8BIcUbuoVPP_h-pDAY6ofkO_86XpIzC13Eq585Jy_3d9vVY7Z5elivbjeZ5qWoM8uwaVqNOte6kFMbbrFi2FqwYGpW1xJAQ2usyNti0qQ2orGlrKUpcuRtPifrY67xsFP74HoIo_Lg1EHw4VVBSE53qBreaCMlM1iywhQcpgKyMGCxzHlT1VNWeczSwccY0CrtEiQ3_RTAdYozdQCtvkGrb9CKKyYm3_KP77fHf44vWo-FMg |
| CitedBy_id | crossref_primary_10_3389_fpubh_2024_1342937 |
| ContentType | Journal Article |
| DBID | AAYXX CITATION DOA |
| DOI | 10.32620/reks.2020.1.02 |
| DatabaseName | CrossRef DOAJ Directory of Open Access Journals |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | CrossRef |
| Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 2663-2012 |
| EndPage | 28 |
| ExternalDocumentID | oai_doaj_org_article_919cd880de504d41a52784dafe531967 10_32620_reks_2020_1_02 |
| GroupedDBID | AAYXX ALMA_UNASSIGNED_HOLDINGS CITATION GROUPED_DOAJ |
| ID | FETCH-LOGICAL-c1527-f0e99bcec3cc481781fe60ebfafad70778aacabdf23b4afa8cd29f5878d43e1b3 |
| IEDL.DBID | DOA |
| ISSN | 1814-4225 |
| IngestDate | Mon Nov 17 07:19:39 EST 2025 Sat Nov 29 06:59:24 EST 2025 Tue Nov 18 21:48:31 EST 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c1527-f0e99bcec3cc481781fe60ebfafad70778aacabdf23b4afa8cd29f5878d43e1b3 |
| ORCID | 0000-0001-7243-8747 0000-0002-1046-893X 0000-0001-5352-077X |
| OpenAccessLink | https://doaj.org/article/919cd880de504d41a52784dafe531967 |
| PageCount | 12 |
| ParticipantIDs | doaj_primary_oai_doaj_org_article_919cd880de504d41a52784dafe531967 crossref_citationtrail_10_32620_reks_2020_1_02 crossref_primary_10_32620_reks_2020_1_02 |
| PublicationCentury | 2000 |
| PublicationDate | 2020-01-28 |
| PublicationDateYYYYMMDD | 2020-01-28 |
| PublicationDate_xml | – month: 01 year: 2020 text: 2020-01-28 day: 28 |
| PublicationDecade | 2020 |
| PublicationTitle | Radìoelektronnì ì komp'ûternì sistemi (Online) |
| PublicationYear | 2020 |
| Publisher | National Aerospace University «Kharkiv Aviation Institute |
| Publisher_xml | – name: National Aerospace University «Kharkiv Aviation Institute |
| SSID | ssj0002875178 ssib044757823 ssib052605930 ssib038076033 |
| Score | 2.09356 |
| Snippet | The rapid development of information technology has expanded the capabilities of cyberthreads regarding computer systems. Cybercriminals are developing new... |
| SourceID | doaj crossref |
| SourceType | Open Website Enrichment Source Index Database |
| StartPage | 17 |
| SubjectTerms | ddos-атака виявлення бот-мереж захист мережі зловмисне програмне забезпечення кібератака кіберзагроза резильєнтність самоадаптивні системи сценарій безпеки |
| Title | Computer systems resilience in the presence of cyber threats: Taxonomy and ontology |
| URI | https://doaj.org/article/919cd880de504d41a52784dafe531967 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAON databaseName: DOAJ Directory of Open Access Journals customDbUrl: eissn: 2663-2012 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0002875178 issn: 1814-4225 databaseCode: DOA dateStart: 20170101 isFulltext: true titleUrlDefault: https://www.doaj.org/ providerName: Directory of Open Access Journals – providerCode: PRVHPJ databaseName: ROAD: Directory of Open Access Scholarly Resources (ISSN International Center) customDbUrl: eissn: 2663-2012 dateEnd: 99991231 omitProxy: false ssIdentifier: ssib044757823 issn: 1814-4225 databaseCode: M~E dateStart: 20030101 isFulltext: true titleUrlDefault: https://road.issn.org providerName: ISSN International Centre |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV07b9swECYKI0MzFEnboE6agEOHLkr0oEyym-3YcIBGDioFsCeBTyAPOIHj5PfnjpINLUWXjiIoQTx-4h3vxO8j5AeXAwtuzkbaahEx-JzwsDKLvNImFdb6XNggNsGLQiwW8qYj9YX_hDX0wI3hLmQijQWQWZfHzLJE5Vgqs8q7gJ5wjjzmsrOZAiQhi_qgU59DVjtwhbvrHKP4rQbgfUgx8TwJyzZ4PBYxQHnDA5QhYfvF2j0gtXcKK8x5m4DZurAO039wSdMD8qmNJemwGcMh-eBWn8l-h2HwCynH8-ubWwhZabksq8l1ScHiV79DYoleFbSaTShOQrieT-l4OYK-1ezPZFiVv2g1XKDO4ZIOi0s6L6pQdfpKbqeTajyLWh2FyKBobeRjJ6U2zmTGMAHDTLwbxE575ZXlMedCKaO09WmmGbQJY1MJk8SFZZlLdHZEequnlftGqHRa8lQxbxyEerCVirHMKrVNPNOp5X1yvjVNbVqScdS6eKxhsxFsWaMta7RlndRx2ic_dzc8N_waf-86QlvvuiExdmgAuNQtXOp_weX4fzzkhHzEt8JMTCq-k95m_epOyZ5529y9rM8CEt8BSTbU4g |
| linkProvider | Directory of Open Access Journals |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=COMPUTER+SYSTEMS+RESILIENCE+IN+THE+PRESENCE+OF+CYBER+THREATS%3A+TAXONOMY+AND+ONTOLOGY&rft.jtitle=Rad%C3%ACoelektronn%C3%AC+%C3%AC+komp%27%C3%BBtern%C3%AC+sistemi+%28Online%29&rft.au=%D0%A1%D0%B5%D1%80%D0%B3%D1%96%D0%B9+%D0%9C%D0%B8%D0%BA%D0%BE%D0%BB%D0%B0%D0%B9%D0%BE%D0%B2%D0%B8%D1%87+%D0%9B%D0%B8%D1%81%D0%B5%D0%BD%D0%BA%D0%BE&rft.au=%D0%92%D1%8F%D1%87%D0%B5%D1%81%D0%BB%D0%B0%D0%B2+%D0%A1%D0%B5%D1%80%D0%B3%D1%96%D0%B9%D0%BE%D0%B2%D0%B8%D1%87+%D0%A5%D0%B0%D1%80%D1%87%D0%B5%D0%BD%D0%BA%D0%BE&rft.au=%D0%9A%D1%96%D1%80%D0%B0+%D0%AE%D0%BB%D1%96%D1%97%D0%B2%D0%BD%D0%B0+%D0%91%D0%BE%D0%B1%D1%80%D0%BE%D0%B2%D0%BD%D1%96%D0%BA%D0%BE%D0%B2%D0%B0&rft.au=%D0%A0%D0%BE%D0%BC%D0%B0%D0%BD+%D0%92%D0%BE%D0%BB%D0%BE%D0%B4%D0%B8%D0%BC%D0%B8%D1%80%D0%BE%D0%B2%D0%B8%D1%87+%D0%A9%D1%83%D0%BA%D0%B0&rft.date=2020-01-28&rft.pub=National+Aerospace+University+%C2%ABKharkiv+Aviation+Institute&rft.issn=1814-4225&rft.eissn=2663-2012&rft.issue=1&rft.spage=17&rft.epage=28&rft_id=info:doi/10.32620%2Freks.2020.1.02&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_919cd880de504d41a52784dafe531967 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1814-4225&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1814-4225&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1814-4225&client=summon |