{"id":4600,"date":"2021-03-12T13:55:15","date_gmt":"2021-03-12T11:55:15","guid":{"rendered":"http:\/\/journals.khnu.km.ua\/vestnik\/?p=4600"},"modified":"2021-04-22T11:00:08","modified_gmt":"2021-04-22T08:00:08","slug":"%d0%be%d1%86%d1%96%d0%bd%d1%8e%d0%b2%d0%b0%d0%bd%d0%bd%d1%8f-%d0%b5%d1%84%d0%b5%d0%ba%d1%82%d0%b8%d0%b2%d0%bd%d0%be%d1%81%d1%82%d1%96-%d1%80%d1%96%d1%88%d0%b5%d0%bd%d1%8c-%d0%b2-%d1%81%d0%b8%d1%81","status":"publish","type":"post","link":"https:\/\/journals.khnu.km.ua\/vestnik\/?p=4600","title":{"rendered":"\u041e\u0446\u0456\u043d\u044e\u0432\u0430\u043d\u043d\u044f \u0435\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0456 \u0440\u0456\u0448\u0435\u043d\u044c \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u0445  \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457"},"content":{"rendered":"<p><!--more--><\/p>\n<p style=\"text-align: center;\">\u041e\u0426\u0406\u041d\u042e\u0412\u0410\u041d\u041d\u042f \u0415\u0424\u0415\u041a\u0422\u0418\u0412\u041d\u041e\u0421\u0422\u0406 \u0420\u0406\u0428\u0415\u041d\u042c \u0412 \u0421\u0418\u0421\u0422\u0415\u041c\u0410\u0425 \u0417\u0410\u0425\u0418\u0421\u0422\u0423 \u0406\u041d\u0424\u041e\u0420\u041c\u0410\u0426\u0406\u0407<\/p>\n<p style=\"text-align: center;\">EVALUATION OF DE\u0421ISIONS EFFICIENCY IN INFORMATION SECURITY SYSTEMS<\/p>\n<p><strong>\u0421\u0442\u043e\u0440\u0456\u043d\u043a\u0438: 307-310. \u041d\u043e\u043c\u0435\u0440: \u21165, 2020 (289)<\/strong><br \/>\n<strong>\u0410\u0432\u0442\u043e\u0440\u0438:<\/strong><br \/>\n\u0412.\u042e. \u0422\u0406\u0422\u041e\u0412\u0410, \u041e.\u0421. \u0410\u041d\u0414\u0420\u041e\u0429\u0423\u041a, \u0412.\u0421. \u041e\u0420\u041b\u0415\u041d\u041a\u041e, \u0406.\u041c. \u0428\u0415\u0412\u0427\u0423\u041a, \u0412.\u0421. \u0414\u0410\u0426\u0415\u041d\u041a\u041e<br \/>\n\u0425\u043c\u0435\u043b\u044c\u043d\u0438\u0446\u044c\u043a\u0438\u0439 \u043d\u0430\u0446\u0456\u043e\u043d\u0430\u043b\u044c\u043d\u0438\u0439 \u0443\u043d\u0456\u0432\u0435\u0440\u0441\u0438\u0442\u0435\u0442<br \/>\nV. TITOVA, O. ANDROSHCHUK, V. ORLENKO, I. SHEVCHUK, V. DATSENKO<br \/>\nKhmelnytskyi National University<br \/>\n<strong>DOI:<\/strong> <a href=\"https:\/\/www.doi.org\/10.31891\/2307-5732-2020-289-5-307-310\">https:\/\/www.doi.org\/10.31891\/2307-5732-2020-289-5-307-310<\/a><br \/>\n<strong>\u0420\u0435\u0446\u0435\u043d\u0437\u0456\u044f\/Peer review :<\/strong> 23.09.2020 \u0440.<br \/>\n<strong>\u041d\u0430\u0434\u0440\u0443\u043a\u043e\u0432\u0430\u043d\u0430\/Printed :<\/strong> 27.11.2020 \u0440.<\/p>\n<p style=\"text-align: center;\"><strong>\u0410\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u043c\u043e\u0432\u043e\u044e \u043e\u0440\u0438\u0433\u0456\u043d\u0430\u043b\u0443<\/strong><\/p>\n<p>\u0412 \u0434\u0430\u043d\u0456\u0439 \u0441\u0442\u0430\u0442\u0442\u0456 \u0440\u043e\u0437\u0433\u043b\u044f\u043d\u0443\u0442\u043e \u0432\u0456\u0434\u043e\u043c\u0456 \u043c\u0435\u0442\u043e\u0434\u0438 \u043e\u0446\u0456\u043d\u044e\u0432\u0430\u043d\u043d\u044f \u0435\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0456 \u0440\u0456\u0448\u0435\u043d\u044c. \u041f\u0440\u043e\u0430\u043d\u0430\u043b\u0456\u0437\u043e\u0432\u0430\u043d\u043e \u043c\u043e\u0436\u043b\u0438\u0432\u0456\u0441\u0442\u044c \u0457\u0445 \u0432\u0438\u043a\u043e\u0440\u0438\u0441\u0442\u0430\u043d\u043d\u044f \u0434\u043b\u044f \u043e\u0446\u0456\u043d\u044e\u0432\u0430\u043d\u043d\u044f \u0435\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0456 \u0440\u0456\u0448\u0435\u043d\u044c, \u0449\u043e \u043f\u0440\u0438\u0439\u043c\u0430\u044e\u0442\u044c\u0441\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430\u043c\u0438 \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457 \u0441\u0442\u043e\u0441\u043e\u0432\u043d\u043e \u043a\u043b\u0430\u0441\u0438\u0444\u0456\u043a\u0430\u0446\u0456\u0457 \u0442\u0430 \u0432\u0438\u0437\u043d\u0430\u0447\u0435\u043d\u043d\u044f \u0437\u0430\u0433\u0440\u043e\u0437. \u041d\u0430 \u043e\u0441\u043d\u043e\u0432\u0456 \u0432\u0438\u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0445 \u043f\u0435\u0440\u0435\u0432\u0430\u0433 \u0442\u0430 \u043d\u0435\u0434\u043e\u043b\u0456\u043a\u0456\u0432 \u0456\u0441\u043d\u0443\u044e\u0447\u0438\u0445 \u043c\u0435\u0442\u043e\u0434\u0456\u0432 \u0437\u0430\u043f\u0440\u043e\u043f\u043e\u043d\u043e\u0432\u0430\u043d\u043e \u0432\u043b\u0430\u0441\u043d\u0438\u0439 \u043c\u0435\u0442\u043e\u0434 \u043e\u0446\u0456\u043d\u044e\u0432\u0430\u043d\u043d\u044f \u0435\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0456 \u0440\u0456\u0448\u0435\u043d\u044c, \u044f\u043a\u0438\u0439 \u0434\u043e\u0437\u0432\u043e\u043b\u044f\u0454 \u043f\u0456\u0434\u0432\u0438\u0449\u0438\u0442\u0438 \u0432\u0456\u0434\u0441\u043e\u0442\u043e\u043a \u043f\u0440\u0438\u0439\u043d\u044f\u0442\u0438\u0445 \u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u0438\u0445 \u0440\u0456\u0448\u0435\u043d\u044c \u0442\u0430 \u043e\u043f\u0442\u0438\u043c\u0456\u0437\u0443\u0432\u0430\u0442\u0438 \u0435\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u0456\u0441\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457 \u0432 \u0446\u0456\u043b\u043e\u043c\u0443.<br \/>\n<strong>\u041a\u043b\u044e\u0447\u043e\u0432\u0456 \u0441\u043b\u043e\u0432\u0430:<\/strong> \u0441\u0438\u0441\u0442\u0435\u043c\u0438 \u0437\u0430\u0445\u0438\u0441\u0442\u0443 \u0456\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0456\u0457, \u0431\u0430\u0433\u0430\u0442\u043e\u043a\u0440\u0438\u0442\u0435\u0440\u0456\u0430\u043b\u044c\u043d\u0430 \u043e\u043f\u0442\u0438\u043c\u0456\u0437\u0430\u0446\u0456\u044f, \u043c\u0435\u0442\u043e\u0434 \u0430\u043d\u0430\u043b\u0456\u0437\u0443 \u0456\u0454\u0440\u0430\u0440\u0445\u0456\u0439, \u043c\u0435\u0442\u043e\u0434 \u041f\u0430\u0440\u0435\u0442\u043e.<\/p>\n<p style=\"text-align: center;\"><strong>\u0420\u043e\u0437\u0448\u0438\u0440\u0435\u043d\u0430 \u0430\u043d\u043e\u0442\u0430\u0446\u0456\u044f \u0430\u043d\u0433\u043b\u0456\u0439\u0441\u044c\u043a\u043e\u044e \u043c\u043e\u0432\u043e\u044e<\/strong><\/p>\n<p>The functioning of most information security systems is reduced to the recognition of many active processes, their classification in order to identify malicious and dangerous processes and make decisions to respond to them. The decision-making process is based on taking into account a large number of conflicting requirements and evaluating decision options according to many criteria. The inconsistency of the characteristics of the processes, the ambiguity of the evaluation of the process, the incompleteness of the information obtained greatly complicate the final decision and significantly affect its quality.\u00a0To increase the efficiency of the final decision, it is necessary to develop a method of multi-objective optimization of decisions, which is why this work was devoted. To evaluate the efficiency of decisions in information security systems, the method was proposed that includes the advantages of the analytic hierarchy process and the Pareto efficiency. It is based on three matrices. Two of these matrices contain normalized values of threat characteristics, one &#8211; a set of decisions that need to be optimized, ranked on the analytic hierarchy process scale of preferences. Criteria for optimization are also calculated using pairwise comparisons of analytic hierarchy process preference scale values.\u00a0The proposed method provides increasing the percentage of identified correct decisions and has the following advantages: the result is always a single and effective decision; the possibility of compensation of values of partial criteria is eliminated. The method was implemented and tested in the subsystem for evaluating the decision efficiency of intrusion detection system based on in-depth learning networks and was used as the tools of multi-objective optimization of decisions for computer systems protection system.<br \/>\n<strong>Keywords:<\/strong> information security system, multi-objective optimization, analytic hierarchy process, Pareto efficiency.<\/p>\n<p style=\"text-align: center;\"><strong>References<\/strong><\/p>\n<ol>\n<li>Shtoyer R. Mnogokriterialnaya optimizatsiya. Teoriya vyichisleniy i prilozheniya\/ R. Shtoyer. \u2013 M.: Nauka, 1992. \u2013 204 s.<\/li>\n<li>Saati T. Prinyatie resheniy. Metod analiza ierarhiy\/ T. Saati. \u2013 M.: Radio i Svyaz, 1993. \u2013 320 s.<\/li>\n<li>Kini R.L. Prinyatie resheniy pri mnogih kriteriyah: predpochteniya i zamescheniya\/ R.L. Kini, H. Rayfa. \u2013 M.: Radio i svyaz, 1981. \u2013 560 c.<\/li>\n<li>Titova V.Iu. Klasyfikatsiia modelei zahroz v kompiuternykh systemakh\/ V.Iu. Titova, Yu.P. Klots, S.O. Savchuk. \u2013 Herald of Khmelnytskyi National University. \u2013 \u21162, 2020 (283). \u2013 S. 201-204.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[38],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/4600"}],"collection":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4600"}],"version-history":[{"count":4,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/4600\/revisions"}],"predecessor-version":[{"id":5038,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=\/wp\/v2\/posts\/4600\/revisions\/5038"}],"wp:attachment":[{"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4600"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4600"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.khnu.km.ua\/vestnik\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4600"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}