Open access peer-reviewed chapter

Periodic Monitoring and Recovery of Resources in Information Systems

Written By

Alexey Markov, Alexander Barabanov and Valentin Tsirlov

Submitted: 30 October 2017 Reviewed: 12 February 2018 Published: 26 September 2018

DOI: 10.5772/intechopen.75232

From the Edited Volume

Probabilistic Modeling in System Engineering

Edited by Andrey Kostogryzov

Chapter metrics overview

1,058 Chapter Downloads

View Full Metrics

Abstract

This section deals with the issues of business continuity and recovery after disasters. The authors analyzed standards, laws, and regulations pertaining to the parameters of periodic monitoring and recovery in information systems. This section includes mathematical models of resources and environment periodic monitoring as well as periodic backup and recovery after interruptions or disasters. The work demonstrates that the well-known deterministic periodic monitoring and backup models do not take into account stochastic peculiarities of ergatic systems to the full extent. The authors developed new stochastic models of restricted monitoring and backup that allow taking into consideration resources constrains and random factors of information systems operation. The notion of Bernoulli stream has been introduced. This section suggests the criteria for selecting deterministic or stochastic monitoring and backup models and their combinations. A solution of direct and reverse task of the calculation of control and monitoring procedures frequency is offered. This section also provides a methodology for information system stability management, considering periodic monitoring, rollback, and recovery in case of interruption.

Keywords

  • business continuity
  • backup
  • rollback
  • recovery
  • regular procedures
  • limited stochastic control
  • Bernoulli flow
  • stochastic models
  • deterministic models
  • periodic inspection
  • stochastic redundancy

1. Introduction

Basic business continuity planning and disaster recovery procedures include periodic monitoring (control) of resource integrity and periodic backup [1, 2, 3, 4].

Requirements for periodic monitoring and backup established by current regulatory documents are briefly described subsequently.

Advertisement

2. Parameters of periodic monitoring and recovery in information systems

2.1. Periodic monitoring parameters

The main parameters of periodic monitoring and recovery in protected information systems (ISs) are provided as follows:

  • frequency of monitoring (internal monitoring) of security functions operability of information security controls used in the information systems;

  • frequency of external (external audit) of security functions operability of information security controls applied in the information systems; and

  • update frequency of the information system parameters and characteristics relating to the information security (change of passwords, update of the information security controls decision rules or signatures).

The results of completed analysis are shown in Table 1.

Name of document Frequency of internal monitoring Frequency of external monitoring Frequency of parameters update
ISA 62443–3-3:2013 + + +
ISO/IEC 27001:2013/ISO/IEC 27002:2013 + + +
PCI DSS + (6 months) + (6 months) + (90 days)
Australian Government Information Security Manual. Controls1 (Australia) + + + (90 days)
The IT-Grundschutz Catalogs2 (Germany) + + +
Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks3 (Great Britain) +
Information Security Provisions in Federal Information Systems4 (Russia) + + + (180, 120, 90, and 60 days)
Requirements for Information Security in Process Control Systems (Russia) + + + (180, 120, 90, and 60 days)
NIST SP 800–535/NIST SP 800-63B6 (USA) + + +

2.2. Periodic backup parameters

In practice [1, 2, 4, 5], the main parameter defining the frequency of periodic information backup is the recovery point objective (RPO)—the maximum period of data loss occurring due to an information security incident. The value recovery time objective (RTO) is the period of the information system unavailability in case of the information security incident. The value of RPO defines the backup frequency (Figure 1).

Figure 1.

Diagram of the system operation and incident recovery.

The analytical review of regulatory documents and methodologies defining the requirements for information security relating to periodic backup and recovery is shown in Table 2.

Document name Requirements for periodic backup Quantitative values or calculation formulae
ISA 62443–3-3:2013 +
ISO/IEC 15408 +
ISO/IEC 27001:2013/ ISO/IEC 27002:2013 +
Australian Government Information Security Manual Controls + +
The IT-Grundschutz Catalogs +
Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks
GOST R 56939 +
Information Security Provisions in Federal Information Systems +
Requirements for Information Security in Process Control Systems +
NIST SP 800–53/NIST SP 800–34 +
Framework for Improving Critical Infrastructure Cybersecurity1 +

As the completed review shows (Tables 1 and 2), there are clear requirements for periodic monitoring and backup though their main parameters are defined either by expert judgments or by management order.

Considering high subjectivity of such decisions, it is reasonable to develop mathematical models for the calculation of periodic monitoring and backup parameters.

Advertisement

3. Mathematical models of periodic monitoring and backup

As noted earlier, the basic mechanism for providing functional stability to information systems (ISs) is systematic monitoring and backup against possible failures. There are two key approaches to arranging monitoring in IS. The first one relates to the occurrence of a certain event of the computation process (message processing, initiating an exchange among processes, system program call, etc.) [6]. This approach’s drawbacks are the difficulty in identifying a set of controlled events of the computation process and the potential for unlimited growth of control points. The latter makes the approach hard to apply during IS normal operation, given the specified resource and task-time restrictions.

The second approach involves a periodic check of the system at predetermined intervals [7, 8, 9, 10]. This is consistent with time schedules and allows the existing resource restrictions to be taken into consideration, but fails to fully reflect the stochastic nature of the occurrence of various errors and irregularities. Furthermore, a number of subjective factors make it impossible, in the first place, to organize periodic control in ergatic systems at strictly specified intervals. There is another approach, however, that takes into account the stochastic external factors of IS functional stability, given the specified time and economic constraints.

Under ISO/IEC 15408–1:2009,1 monitoring covers not only SW (assessment object) but also the operational environment. Let us consider stochastic and deterministic models of the earlier procedures.

3.1. Periodic resource monitoring models

Let us conditionally present the IS software (SW) operating process as alternating flows of errors I(y), normal operation recovery I(z), failures I(Q), and SW/environment control (Figure 2).

Figure 2.

Flows of errors, failures, recovery, and control.

Being mutually alternative, the flows of failures and normal system operation recovery result from the flow of errors and are shifted with respect thereto by the values Q(t) and z(t). The maximum of these values determines the manifestation of a respective flow. Assuming the recovery time to be instantaneous, the normal operation recovery flow may be considered part of the control flow. In this case, the task of providing SW functional stability comes down to that of optimizing restricted control that meets the condition z(t) < Q(t).

Let us consider the SW life cycle period t, having regard to the conducted inspection control of repeatable accuracy. Because the period t far exceeds the control time, let us assume the latter to be instantaneous. Then, the SW repeatable accuracy is characterized by the probability P( z ̂ <Q) = F z ̂ (Q) that the irregularity/vulnerability/error detection time z ̂ within the inter-control interval is not longer than the permissible SW life cycle period Q, where there is an irregularity. A periodic control fragment is shown in Figure 3.

Figure 3.

A fragment of the inspection control of an information security tool.

Let us consider the flow of irregularities (errors and vulnerabilities) to be the simplest one with the density of interval y ̂ distribution among them:

g y ̂ = λ e λy E1

where λ is the intensity of irregularities.

Let us define a stochastic model for the detection of irregularities. In this case, control is undertaken a certain number of times with equal probability and independently of one another. Thus, the limited flow formed by all the control points is Bernoulli’s flow with the density of interval T ̂ distribution among the control points [11]:

f T ̂ = n / t 1 T / t n 1 E2

where n is the number of control points.

The delay time z ̂ = T ̂ y ̂ is a function of two stochastic variables and has the following distribution function:

F z ̂ s = S n t 1 T t n 1 λ e λy dTdy ; t > 0 n > 0 E3

Having defined the integration limit (Figure 4), we obtain the following:

F z ̂ s = 0 t z y y + z n / t 1 T / t n 1 λ e λy dT dy + t z t y t n / t 1 T / t n 1 λ e λy dT dy E4

Figure 4.

Domain of integrating the irregularity detection time delay interval.

After simplifying (Eq. (4)), we have the following formula:

F z ̂ s = λ / t n 0 t z e λy t y n t z y n dy + t z t e λy t y n dy E5

Having expanded the formula integrands as a power series, we obtain an approximate value of the distribution function that is the basic computational ratio:

F z ̂ s = λ i = 0 n j = 0 r l = 1 n + j + 1 1 i + j + l + 1 C n i C n + j + 1 l λ j t j + 1 l z l j ! 1 + j + i E6

where r is the number of iterations.

In order to compare stochastic and deterministic models, let us elaborate on the latter. The deterministic model’s control points form a regular flow with a constant value of the interval T = t/(n + 1) and the irregularity detection time distribution density:

g z ̂ = λ e λ T z ; 0 < z < T E7

It can be shown that the expression for the distribution function in the deterministic model is as follows:

F z ̂ d = e λT e λz 1 ; 0 < z < T E8

Comparison of the expressions for the models (Eqs. (4) and (8)) suggests that the models under review conform to the process of detecting SW repeatable accuracy disturbances (at specified values λ , Q, t, and n):

F z ̂ s z F z ̂ d z E9

The irregularity detection probability P n for the SW life cycle period t can be presented as follows:

P n = n + 1 F z ̂ E10

where n is the number of inspection control points (n > 0), F z ̂ = max F z ̂ s z F z ̂ d z .

A review of the models discussed earlier showed an advantage of the stochastic model, given a small number of inspection control points. Conceptually, it can be accounted for by the fact that even with a small number of random points of SW characteristics control, there is always a likelihood that an irregularity is detected once it has occurred, whereas in the case of the deterministic model, the inspection period may not be less than the specified value.

3.2. Operational environment periodic control model

The control of restrictions imposed on SW primarily involves inspecting SW environment and operation/production conditions. Such inspections help rule out irregularities (errors, vulnerabilities) concerning the SW front-end interface. In this regard, the procedures for detecting environment irregularities can be interpreted as a mechanism to prevent SW irregularities.

Environment control requirements are specified by ISO 15408 standards.

Let us consider IS operation where an SW error prevention mechanism is available.

When developing environment control models, we will adhere to the approach outlined in the previous section. We will assume SW repeatable accuracy to be characterized by the probability P z ̂ < Q = F z ̂ Q that the preliminary control z ̂ time between the environment control point and a possible point of occurrence of SW characteristic disturbance does not exceed the permissible time Q. Let us define a stochastic model of environment irregularity control (Figure 5).

Figure 5.

Operation of the system, with an irregularity error prevention mechanism available.

It can be shown that the preliminary control time is a function of two random values z ̂ = y ̂ T ̂ and has the following distribution function:

F z ̂ s = S n t 1 T t n 1 λ e λy dTdy ; t > 0 n > 0 E11

where n is the number of environment control points and λ is the SW characteristic disturbance intensity.

Having defined integration limits (Figure 6) and simplified the expression, we obtain the following:

F z ̂ s = 0 z f T ̂ T e λT 1 e λT dT + z t z f T ̂ T e λT 1 e λz dT + t z t f T ̂ T e λT dT e λt z t n , E12

Figure 6.

Domain of integrating the irregularity prevention time interval.

Having expanded the formula integrands as a power series, we obtain an approximate value of the distribution function that is the basic computational ratio:

F z ̂ s n i = 0 r j = 0 n 1 b 1 b 2 e λt z t n ; t > 0 n > 0 E13

where r is the number of iterations; b 1 = 1 i + j C n 1 i λ j j ! t i + 1 i + j + 1 ; b 2 = t i + j + 1 z i + j + 1 2 j e λz t z i + j + 1 e λz .

Let us compare the obtained stochastic model and the deterministic one. The deterministic model’s control points form a regular flow with a constant value of the interval T = t/(n + 1) and the following preliminary control time distribution density:

g z ̂ = λ e λ T + z ; 0 < z < T E14

Hence, the expression for the distribution function in the deterministic model will be as follows:

F z ̂ d = e λT 1 e λz ; 0 < z < T E15

By comparing computational model expressions at specified values λ, Q, t, and n, we obtain a criterion to choose a model:

F z ̂ s z F z ̂ d z E16

The probability P n of irregularity prevention for SW life cycle period t can be presented as follows:

P n = n + 1 F z ̂ E17

where n is the number of control points (n > 0), F z ̂ = max F z ̂ s z F z ̂ d z .

Comparative analysis of stochastic and deterministic models showed the former’s effectiveness with a small number of control points. Therefore, when managing system information security by numerical methods, it is possible to identify preferred models (stochastic, deterministic, or combined) that bolster confidence in SW. This gives an effect akin to introducing structure redundancy, that is, a special type of redundancy—stochastic—the use of which is unlikely to result in higher costs [11].

An example of comparing deterministic and stochastic models is shown in Figure 7.

Figure 7.

Irregularity prevention probability versus the number of preliminary control points.

3.3. Periodic backup models

The previous subsections dealt with deterministic and stochastic SW control models. When tackling comprehensive tasks of providing IS operational reliability and security, it is important to ensure information safety in case of incidents. This can be achieved by developing an incident management system.2

Apart from control models, this work also investigates backup and recovery models.

The backup mechanism is intended to recover a system’s normal operation in case of a failure or an incident, such a recovery starting from the last backup time (Figure 8).

Figure 8.

Program operation using a checkpoint mechanism.

The backup mechanism control task boils down to developing a checkpoint (CP) setting model that minimizes the mathematical expectation of the program operation delay time, given the restrictions on the total SW operation time and the number of CP. The issues of minimizing the mathematical expectation of delay time by changing the CP setting frequency and the determined interval among checkpoints are discussed in [9].

Let us consider a situation when an interval is a random value.

If the failure flow of the computation process is regarded as simple, it can be shown that the delay time z ̂ = y ̂ T ̂ is a function of two random values and has the following mathematical expectation:

M z ̂ s = S y T n t 1 T t n 1 λ e λy dTdy ; t > 0 n > 0 E18

where n is the number of environment control points and λ is system’s failure intensity.

Having defined integration limits (Figure 9) and simplified the expression, we obtain the following:

M z ̂ s = 0 t n / t 1 T / t n 1 e λT λ dT 0 t / 2 n / t 1 T / t n 1 e 2 λT T + 1 λ dT b 1 , E19

where b 1 = e λt 2 n ( 1 λ + nt / 2 n + 2 ) .

Figure 9.

Domain of integrating the program operation delay time interval.

Having expanded the integrands as a power series, we obtain an approximate value of the mathematical expectation of delay time:

M z ̂ s n i = 0 n 1 j = 0 r 1 j + i C n + 1 i λ j t j b 2 j ! b 1 , E20

where b 2 = 1 λ i + j + 1 t 2 i + 2 i + j + 2 1 2 i + 1 λ i + j + 1 , r is the number of iterations.

In order to compare the obtained stochastic model (Eq. (20)) and the deterministic one, we consider the latter in more detail. The deterministic model’s checkpoints form a regular flow with a constant value of the interval T = t n + 1 . The delay time distribution density will be as follows:

g z ̂ = λ e λ T + z ; 0 < z < T . E21

It can be shown that the expression for the mathematical expectation of delay time in the deterministic model is as follows:

M z ̂ d = e λT λ 1 e λT λT + 1 ; 0 < z < T E22

By comparing the expressions (Eqs. (20) and (22)), we obtain a criterion allowing a model to be chosen at specific values λ, t, and n:

M z ̂ s z M z ̂ d z E23

Considering the CP setting time and restart to be instantaneous, we obtain a total SW operation time model, given the availability of the CP mechanism:

t n = t + n + 1 M z ̂ E24

where t is the SW operation time, n is the number of checkpoints, and M z ̂ = max M z ̂ s z M z ̂ d z is the mathematical expectation of the SW operation delay time in case of failure.

Here is an example using the department archive data for the first half of 2017. The database (DB) was inspected seven times over this period. The inspections revealed 12 errors, all of which were corrected by standard methods, with the relevant entry made in the administrator log. The following error parameters were calculated:

  • the average time between errors M z ̂ = 43.83 h;

  • the error intensity λ = 0.022 1/h;

  • the average quadratic deviation δ z ̂ = 30.04 h; and

  • Cramér-von Mises criterion (goodness of fit) k(n) = 0.55.

This allowed the error flow to be considered a stationary Poissonian flow. A study of the electronic archive DB operation in 2000–2017 showed that the restriction on the correctable error detection time Q was more than 1 month.

The DB recovery probabilities calculated by the formulas (Eqs. (20) and (22)) and their dependence on the number of control points for the first half of 2010 (t = 1052 h) are shown in Figure 10.

Figure 10.

DB error detection probabilities versus the number of control points.

Taking into account the electronic archive availability requirements, it is advisable to use only three control points when applying the stochastic model (Table 3).

Control type Number of control points Man hours Recovery probability
Conventional 7 42 1.0
Deterministic 4 24 0.99996
Stochastic 3 18 0.99997

Table 3.

An example of control parameter calculation results.

Thus, the practical solutions offered in this work allow for the stochastic nature of DB errors. This permits the desired error detection model to be chosen at a specified DB and electronic archive parameters.

Advertisement

4. System functional stability management

In general, IS periodic control involves performing a number of standard procedures:

  • software error control;

  • operational environment error control; and

  • backup in case of failure.

Choosing a strategy and the number of control/backup points helps manage the system’s stability, integrity, and accessibility levels [12]. For example, considering the earlier procedures, one can define the system availability ratio (operational availability factor [13]):

R = t t + M n r r p + 1 p P n e e + 1 P n e e P n p p E25

where t is the task solution time, M n r r is the mathematical expectation of the program operation delay time in case of n r being the backup points, p is the SW error-free performance (SW efficiency), P n e e is the error prevention probability in case of n e environment control points, and P n p p is the error detection probability in case of n p SW control points.

In the above formula, p is the SW failure-free performance probability; error prevention probability— P n e = n e + 1 F z ̂ ; error detection probability— P n p = n p + 1 F z ̂ ; availability factor R = t t + M n r r ; M n r r = t + n r + 1 M z ̂ .

The constraining factor (Eq. (25)) is the SW dependability cost index defined as the cost of standard procedures:

C n e n p n r = C e n e + C p n p + C r n r E26

where C p is the cost of one SW error detection control event; C e is the cost of one environment control event for error prevention; and C r is the cost of setting one checkpoint.

The SW operation security management task comes down to optimizing the availability factor, with the constraining factor (Eq. (26)). The following two optimization tasks can be defined:

  1. Direct task: Using partial redundancy of the number of standard procedures, ensure that the SW security index is at least equal to the specified index R rg , with a minimum possible cost of standard procedures in general, that is

    min C n e n p n r R n e n p n r > R rg E27

  2. Reverse task: Using partial redundancy of the number of standard procedures, ensure that the cost of all standard procedures does not exceed the specified value C rg , with a maximum possible SW reliability index, that is

    max R n e n p n r C n e n p n r < C rg E28

4.1. Direct optimization task

Analysis (Eq. (25)) showed that R is a nondifferentiable monotone increasing function that is strictly convex upward.

In order to solve optimization tasks, therefore, it is advisable to employ sequential search methods.

Let us assume the value of incremental difference R ( n e , n p , n r )/ C to be an enumeration criterion. Let us determine an enumeration step in accordance with the dichotomy rule. In this case, the computational scheme for solving the direct task can be presented as follows:

  1. Define a set of initial values of the number of standard procedures:

    N o = { n 0 i , n 0 j , n 0 k }, where i,j,k ϵ {e,p,r}.

  2. Calculate the initial value R:

    R 0 = R( N o ).

  3. If R 0 > R rg , perform the following operations:

    1. 3.1. Find a set of search interval values

      L 0 = { L 0 i , L 0 j , L 0 k }, where L 0 l = n 0 l - n lw l ; n lw l is the lower boundary nl.

    2. 3.2. Obtain the set of possible values of the number of standard procedures

      N 1 i = { n 1 i , n 0 j , n 0 k }, where n 1 i = n 0 i L 0 i / 2 .

    3. 3.3. Find another set of values of the number of standard procedures

      N 1 = N 1 i , where i is the index of the standard procedure conforming to the minimization condition:

      min ( R 0 - R( N 1 i )/( C i L 0 i / 2 )), where i,j,k ϵ {e,p,r}.

  4. If R 0 < R rg , perform the following operations:

    1. 4.1. Find a set of search interval values

      L 0 = { L 0 i , L 0 j , L 0 k }, where L 0 l = n u l - n 0 l ; n u l is the upper boundary nl.

    2. 4.2. Obtain three sets of possible values of the number of standard procedures

      N 0 i = { n 1 i , n 0 j , n 0 k }, where n 1 i = n 0 i + L 0 i / 2 .

    3. 4.3. Find another set of values of the number of standard procedures

      N 1 = N 1 i , where i is the index of the standard procedure conforming to the maximization condition:

      max ( R N 1 i R 0 - /( C i L 0 i / 2 )), where i,j,k ϵ {e,p,r}.

  5. Increase the iteration index

    τ = τ + 1 .

  6. Calculate the value R

    R τ = R N τ .

  7. Find a set of search interval values

    L τ = { L τ i , L τ 1 j , L τ 1 k }, where L τ i = L τ + 1 i / 2 .

  8. If R 0 > R rg , perform the following operations:

    1. 8.1. Obtain a set of possible values of the number of standard procedures

      N τ i = { n τ + 1 i , n τ j , n τ k }, where n τ + 1 i = n τ i L τ i / 2 .

    2. 8.2. Find another set of values of the number of standard procedures

      N τ = N τ + 1 i , where i is the index of the standard procedure conforming to the minimization condition:

      min ( R 0 - R( N τ + 1 i )/( C i L τ i / 2 )), where i,j,k ϵ {e,p,r}.

      If N τ + 1 = N τ 1 , withdraw from the procedure.

  9. Otherwise ( R τ < R rg ), perform the following operations:

    1. 9.1. Obtain the set of possible values of the number of standard procedures:

      N τ + 1 i = { n τ + 1 i , n τ j , n τ k }, where n τ + 1 i = n τ i + L τ i / 2 .

    2. 9.2. Find another set of values of the number of standard procedures

      N τ + 1 = N τ + 1 i , where i is the index of the standard procedure conforming to the maximization condition:

      max ( R N τ + 1 i R 0 / ( C i L τ i / 2 )), where i,j,k ϵ {e,p,r}.

    3. 9.3. If N τ + 1 = N τ 1 , record the value R τ + 1 = R ( N τ 1 ) and withdraw from the procedure.

  10. Proceed to item 5.

    The period of this computation scheme can be reduced as follows:

    • by specifying the effective initial values, for example, by using personnel’s experience (knowledge) or statistically accumulative tables;

    • by reducing the calculation of standard procedure indices to their calculation only as per deterministic models. This is acceptable with a great number of standard procedures (more than 5–20) when stochastic models are less effective than deterministic ones.

4.2. Reverse optimization task

The reverse task can be solved using the branch-and-bound procedure. In this case, the computation scheme will be as follows:

  1. Specify a cost-ordered set N of initial values of the number of standard procedures

    N τ = { n τ 1 , n τ 2 , n τ 3 }, C 1 C 2 C 3 ,

    which meets the normalization requirement:

    0 C rq - i = 1 3 n C i C i ; i = 1 ; 3 ¯ ,

    where τ is the ramification index;

  2. Calculate the maximum value R by directed enumeration n 2 at the fixed value n 1 = n r 1 and the initial value n 2 = n r 2 :

    R N τ = max R n 1 = n τ 1 ) ,

    where N τ meets the normalization requirement;

  3. Calculate the maximum value R by directed enumeration n 2 at the fixed value n 1 = n τ 1 + 1 and the initial value n 2 = n τ 2 :

    R N τ + 1 = max R n 1 = n τ 1 + 1 ) ,

    where N τ + 1 meets the normalization requirement;

  4. Calculate the maximum value R by directed enumeration n 2 at the fixed value n 1 = n τ 1 1 and the initial value n 2 = n τ 2 :

    R N τ 1 = max R n 1 = n τ 1 1 ) , where N τ 1 meets the normalization requirement;

  5. If R τ = max R τ 1 R τ R τ + 1 , withdraw from the computation scheme;

  6. If R τ + 1 = max R τ 1 R τ R τ + 1 , let τ = τ + 1 , perform item 3 and proceed to item 5;

  7. If R τ 1 = max R τ 1 R τ R τ + 1 , let τ = −1 and proceed to item 4.

In practice, there may be a task of calculating indices not for the SW functional stability (dependability) system in general but for a part thereof (checkpoint or error prevention/detection mechanisms). This means a transition from multidimensional to unidimensional task interpretation, which helps substantially simplify computational procedures. Thus, solving a partial reverse optimization task boils down to a single calculation of a specific index when n = C rq / C .

When solving a direct task, the effectiveness of the computation scheme can be additionally improved by adjusting the variable change interval, for example, by defining the next variable value in accordance with a distribution law, and so on.

Advertisement

5. Conclusion

Thus, in this section, we have considered stochastic and deterministic models of SW periodic monitoring and backup, which allow for time and computational/data resource constraints. Representing monitoring and backup points as a restricted Bernoulli’s flow helps obtain random time intervals with the preset number thereof and, accordingly, allow for the effect of stochastic external factors on the system operation process.

Comparative analysis of stochastic and deterministic models showed the former’s effectiveness with a small number of control and backup points. Therefore, when managing IS stability by numerical methods, it is possible to identify preferred models (stochastic, deterministic, or combined) which enhance IS functional stability. This gives an effect akin to introducing structure redundancy, that is, a special type of redundancy (stochastic), the use of which is unlikely to result in higher costs. The application of stochastic models in engineering systems can be facilitated by using a random-impulse generator that forms random-restricted Bernoulli’s flows [11].

A similar approach was taken as a basis to solve the problem of efficiency assessment of the diagnostic mechanism for data array failures. Apart from the IS resource control and backup domain, the above-stated results can be of use in assessing the cost-effectiveness of control measures and mechanisms being implemented in various engineering and management systems. For better use of stochastic models, it is possible to use a random pulse generator (e.g., [14]).

References

  1. 1. Bird L, Higgins D, editors. Good Practice Guidelines 2013—Global Edition: A Guide to Global Good Practice in Business Continuity. 3rd ed. The Business Continuity Institute; 2013. 115 p
  2. 2. Engemann KJ, Henderson DM. Business Continuity and Risk Management: Essentials of Organizational Resilience. Rothstein Associates; 2011. 370 p
  3. 3. Pompon R. IT Security Risk Control Management: An Audit Preparation Plan. 1st ed. Apress; 2016. p. 311
  4. 4. Stewart JM, Chappie M, Gibson D. CISSP: Certified Information Systems Security Professional Study Guide. 7th ed. Sybex; 2015. p. 1104
  5. 5. Cummings D. Dataflow-Based Rollback Recovery in Distributed and Multi-Core Systems: A Novel Software Approach for Building Highly Reliable Distributed and Multi-Core Systems. Müller: VDM Verlag Dr; 2009. 236 p
  6. 6. Garcia E, Antsaklis PJ, Montestruque LA. Model-Based Control of Networked Systems. Cham: Birkhäuser; 2014. 382 p. DOI: 10.1007/978-3-319-07803-8
  7. 7. Getta JR. Discovering irregular periodic patterns in audit data. In: 2016 2nd IEEE International Conference on Computer and Communications (ICCC); 14–17 October 2016; Chengdu, China: IEEE; 2016. 16867467. DOI: 10.1109/CompComm.2016.7924671
  8. 8. Huai L, Qiushi L, Jianxin H, Tongzhou J. A novel fault-tolerant scheduling algorithm for periodic tasks of distributed control systems. In: 2009 Chinese Control and Decision Conference (CCDC '09); 17–19; June 2009; Guilin, China: IEEE; 2009. p. 1584–1588. DOI: 10.1109/CCDC.2009.5192227
  9. 9. Kostogryzov A, Nistratov G, Nistratov A. Some applicable methods to analyze and optimize system processes in quality management. In: Aized T, editor. Total Quality Management and six Sigma. InTech; 2012 Chapter 7. DOI: 10.5772/46106. Available from: https://www.intechopen.com/books/total-quality-management-and-six-sigma/some-applicable-methods-to-analyze-and-optimize-system-processes-in-quality-management
  10. 10. Yin JY, Guo G-C, Wu Y-X. A Hybrid Fault-Tolerant Scheduling Algorithm of Periodic and Aperiodic Real-Time Tasks to Partially Reconfigurable FPGAs. In: 2009 International Workshop on Intelligent Systems and Applications (ISA 2009); 23–24 May 2009; Wuhan, China: IEEE; 2009. p. 1–5. DOI: 10.1109/IWISA.2009.5072624
  11. 11. Markov AS, Kernozhitsky VA. Economically effective data bases diagnostics method. Advances in Modeling and Analysis B: Signals, Information, Data, Patterns. 1995;33(3):5-12
  12. 12. Markov AS. Paradigma ogranichennogo stohasticheskogo kontrolya [paradigm of limited stochastic control]. Izvestiya Instituta inzhenernoy phiziki. 2012;1(23):15-19 (In Rus.)
  13. 13. Ushakov IU. Probabilistic Reliability Models. Wiley; 2012. 248 p
  14. 14. Random pulse generator. Patent SU 840856. USSR; 1981; G06F 1/02; Bull. 23

Notes

  • ISO/IEC 15408–1:2009: IT—security techniques—evaluation criteria for IT security.
  • ISO/IEC TR 18044:2004 IT—security techniques—information security incident management.

Written By

Alexey Markov, Alexander Barabanov and Valentin Tsirlov

Submitted: 30 October 2017 Reviewed: 12 February 2018 Published: 26 September 2018