Научная статья на тему 'ANALYSIS OF THE CONTROLLED SECURITY MODEL WITH UNCOUNTABLE NUMBER OF LINEAR LIMITATIONS ON MANAGEMENT STRATEGIES'

ANALYSIS OF THE CONTROLLED SECURITY MODEL WITH UNCOUNTABLE NUMBER OF LINEAR LIMITATIONS ON MANAGEMENT STRATEGIES Текст научной статьи по специальности «Математика»

CC BY
24
6
i Надоели баннеры? Вы всегда можете отключить рекламу.
Область наук
Ключевые слова
controlled semi-Markov process / safety / management / strategy / randomization / optimization problem

Аннотация научной статьи по математике, автор научной работы — O.B. Zaitseva

The work analyzes the security model described by the controlled semi-Markov process with catastrophes. Management optimization is associated with determining the frequency of restoration work of the subsystem (security subsystem) which acts up attempts of malicious persons to disrupt the normal operation of the main system. The optimization criterion is the mathematical expectation of the time before the catastrophe (the moment of the first successful attempt to disrupt the normal operation of the main system). In the context of new linear limitations on management strategies, the structure of the optimal strategy was examined.

i Надоели баннеры? Вы всегда можете отключить рекламу.
iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.
i Надоели баннеры? Вы всегда можете отключить рекламу.

Текст научной работы на тему «ANALYSIS OF THE CONTROLLED SECURITY MODEL WITH UNCOUNTABLE NUMBER OF LINEAR LIMITATIONS ON MANAGEMENT STRATEGIES»

O. Zaitseva

ANALYSIS OF THE CONTROLLED SECURITY MODEL

WITH UNCOUNTABLE NUMBER OF LINEAR LIMITATIONS RT&A, No 3 (69) ON MANAGEMENT STRATEGIES_Volume 17, September 2022

ANALYSIS OF THE CONTROLLED SECURITY MODEL WITH UNCOUNTABLE NUMBER OF LINEAR LIMITATIONS ON MANAGEMENT STRATEGIES

O. B. Zaitseva •

Assistant Professor, Moscow Aviation Institute (National Research University), Moscow, 125993 Russia E-mail: o zaiceva@mail.ru

Abstract

The work analyzes the security model described by the controlled semi-Markov process with catastrophes. Management optimization is associated with determining the frequency of restoration work of the subsystem (security subsystem) which acts up attempts of malicious persons to disrupt the normal operation of the main system. The optimization criterion is the mathematical expectation of the time before the catastrophe (the moment of the first successful attempt to disrupt the normal operation of the main system). In the context of new linear limitations on management strategies, the structure of the optimal strategy was examined.

Keywords: controlled semi-Markov process, safety, management, strategy, randomization, optimization problem.

1. Introduction. Description Of Structural Elements Of Security Model Under Examination

Before we set a mathematical problem, let us describe a real physical (practical) situation, the mathematical model of which will be the object of examination of the present work.

Let us suppose that some system S is operating, performing important, responsible and necessary work. Let us suppose that there is another system S0 (opponent, malicious person) which tries to disrupt the high-quality performance of the work of the original system S. Finally, there is a security system S" which must act up attempts to disrupt the uninterrupted operation of the original system and ensure its safe operation.

Regarding the "functioning" of the system S0 we assume that the moments of attempts (attacks) to disrupt the operation of the main system S form a discrete set on the time axis. Regarding the operation of the system S" we assume that it can break and restore (the exact description of this process will be given below). Therefore, periods of good operation interchange with periods when the security system cannot perform its protection functions. For this reason one of the main hypothesis is formulated as follows: if the moment of the attempt to disrupt the operation of the system S falls during the period of good operation, then this attempt is acted up, if this moment falls during the period of broken operation and restoration, then an undesired event (catastrophe) occurs. If it is possible to reduce the periods of broken operation and restoration of the security system, that is, to manage the operation process, then by linking the moment of catastrophe with this control process, it is possible to set a mathematical task of finding the optimal management strategy. This will be done below.

O. Zaitseva

ANALYSIS OF THE CONTROLLED SECURITY MODEL

WITH UNCOUNTABLE NUMBER OF LINEAR LIMITATIONS RT&A, No 3 (69) ON MANAGEMENT STRATEGIES_Volume 17, September 2022

2. Mathematical Hypotheses

1. With regard to system S, there is no need to introduce any mathematical hypotheses, since management is related only to the security system So, and the moment of catastrophe depends on the state of the system S" and the characteristics of the system So.

2. Regarding the system So, we assume that the flow of attempts (attacks) in time is described by the stationary Poisson process with the parameter A. In the Poisson process the intervals -q between adjoined attacks are independent collectively and distributed according to exponential law with the parameter A

(0, x<0,

p{v<x} = {i-e-$*, x>0. (1)

The Poisson process is the Markov process. For the arbitrary moment t, the waiting time until the next attempt (attack) is also distributed according to the exponential law (1) with the same parameter. This property will be used when deriving basic relations.

3. The system S" breaks and the uptime f is distributed according to the law

F(x) = Ptf <x} = {1__Xex > Qi F(x) = 1 - F(x) = P[f >x} = e-&x, x > 0.

4. Let us suppose that the breakdown that appeared during the operation of the system is not detected (does not appear) by itself, and if we mark random time of the independent manifestation of the breakdown as then its distribution is equal to (x) = < x} = 0,x <

that is, the random time of the independent manifestation of the breakdown with the probability of one is equal to infinity.

Further, we will describe the maintenance process (control process). At the beginning moment

t0 = 0, the operation of the security system begins and a planned preventive update (prevention) of the system is assigned through the time v > 0 distributed according to the law G(u) = P{v<u}, G(0) = 0.

If the security system is not broken by the appointed moment v > 0, that is the event {u < occurred, then at the moment of v > 0 a planned preventive update of the system will begin which according to the hypothesis updates the system completely. Let us mark the duration of this planned preventive (prevention) update /", and the distribution function of this time length we mark F"(x) = P{Y" > x}.

If the system breaks by the assigned moment v > 0 (the event {v > occurred), but its breakdown was not detected by itself (the event {v < % + Q occurred), then the planned emergency system update will begin at the assigned moment v > 0. The duration of this restoration work we will mark y2, and the distribution law we will mark F2(x) = P{y2 < x},F2(x) = P{y2 > x}.

In the future for mathematical expectations entered above the restoration times Yo i = 1,2 we will use the symbols

Ti = I Fi(x)dx, i = 1,2. (2)

Jo

After the possible restoration works, when the security system is fully updated according to the hypothesis, the moment of the next preventive restoration work is rescheduled regardless of the past run of the process and the entire maintenance process is repeated again.

It is easy to see that the evolution of the security system S" is described with the semi-Markov process f (t), in which Markov moments are the moments of the beginning and end of restoration work. When determining a set of states let us note that at the start of restoration work it is known which restoration work begins. The duration of restoration work depends only on its type. Therefore, at this moment, the past run of the process and the future behavior of the process are independent if it is known which restoration work begins.

O. Zaitseva

ANALYSIS OF THE CONTROLLED SECURITY MODEL

WITH UNCOUNTABLE NUMBER OF LINEAR LIMITATIONS RT&A, No 3 (69)

ON MANAGEMENT STRATEGIES_Volume 17, September 2022

At the end of restoration work, the system by definition is a new one and the moment of eventual preventive prevention is rescheduled regardless of the past. Therefore, even at this moment of the end of restoration, the past run of the process and the future behavior of the process are independent.

Let us consider f (t) = 1, if at the nearest Markov moment, preceding moment t, the planned preventive prevention of the system begins. Let us consider %(t) = 2, if at the nearest Markov moment, preceding t, the planned emergency restoration of the system begins. Finally, we assume f (t) = 0 if the closest Markov moment, preceding t, is the moment the security system is updated. It should be noted here that part of the time in this state the security system spends in a broken state (hidden breakdown), and the breakdown does not appear itself, and that is why the model provides for periodic determination of the state of the security system.

5. In accordance with the basic hypothesis of the occurrence of catastrophes, formulated above, it is now possible to describe the effect of this process on the evolution of the security system 5".

Let us enter into consideration the absorption state, in which the process f (t) passes at the moment of the first unreflected attack. Such an event will occur when the attack appears on the restoration period (states 1 or 2) or on the latent breakdown period (state 0). At this moment t we consider that %(t) = 3.

Therefore, the process %(t) characterizing the evolution of the security system and taking values from the finite set E = {0,1,2,3} is described. Figure 1 shows the transition graph of the process t(t).

Figure 1: Transition graph of the process f (t)

3. Determination Of Process Characteristics. Setting The Mathematical

Task

The random process f (t) described above is a homogeneous controlled semi-Markov process with a finite set of states E = {0,1,2,3}, management is realized only in state 0 and is contained in choosing the period through which the restoration work should begin. Therefore, trajectories are step functions and equality U = 0, is true for the management (decision) space U in state 0. The management strategy is determined by the distribution of G(u) = P{u < u}, G(0) = 0, that is, it belongs to a set of Markov homogeneous randomize strategies.

More details on the construction, characteristics and properties of homogeneous controlled semi-Markov processes with a finite set of states can be found in [1].

A homogeneous controlled semi-Markov process X(t) = (%(t),u(t)L is defined as a two-dimensional step process, the first component of which f (t) describes the evolution of the controlled component, and the second one u(t) describes the control process. One of the main characteristics of the homogeneous controlled semi-Markov process is the semi-Markov kernel Q(* (t, u), i,j £ E, t £ 0, +ro), u £ U which is defined as the conditional probability that the following condition of the first component will be the condition j and transition to this state will happen until moment t under as long as the previous condition is i and the decision u is made.

O. Zaitseva

ANALYSIS OF THE CONTROLLED SECURITY MODEL

WITH UNCOUNTABLE NUMBER OF LINEAR LIMITATIONS RT&A, No 3 (69)

ON MANAGEMENT STRATEGIES_Volume 17, September 2022

Construction of a semi-Markov kernel.

From the description of the system functioning it follows that if i = 1,2, the following equalities are true

Qio(t) = Qi0(t,u) = P{Yi <t,V>Yi} = E e~$%dF((x),

Jo

Qij(t,u) = 0, j = 1,2,

Qis (t) = Qi3 (t, u) =P{r1<t,r1< Yi} = ¡0+ ¿e~$xFi(x)dx (3)

The last equalities in (3) are true, since the Markov moments of the beginning and end of restoration work interchange. In addition, to go to zero state, it is necessary and enough that the carried out restoration work ends before moment t and there are no attacks during the restoration work. To go to state 3, it is necessary and enough that the attack takes place before t, and the carried out restoration work before that moment does not end.

It should be noted that these functions are independent of management, since in states i = 1,2, management is not realized.

If i = 0, the following equalities are true:

Qoo(t,u) = 0, Q01(t,u) = + 0'u U>t'

le &u, u < t,

& „-$t , $

(0, u>t, \1- fj e~ + , u>t,

{&-$Ke e ), u<t, I1 —e-$u + -$-e-&u, u<t,

With the limit transition if t ^ ro, we get the transition probabilities of the states of the imbedded Markov chain p(* = limt^) j™ Qi*(t, u)dG(u), i,j EE = {0,1,2,3}.

For the model under examination, we have from equalities (3) and (4) r™ f™ u

Poo = 0, poi =1 e-MudG(u), Vo2 =1 ~^(e-$u - e-&u)dG(u) Jo Jo

P*> =C {1-T-Ae-$u + J—ie^^

Pío = jo™ e-$xdFi(x), Pi* = a j = 12, pi3 = jo™ Áe-$xFi(x)dx, i = 1,2 (5)

It is not difficult to test the obvious equality if i=0,1,2

Umt^) ^ Qij(t) =ZPij =1.

j£E j£E

Now we will formulate a mathematical task. When describing the security model, it was noted that attacks are reflected, when the moments of attacks fall on the periods of good operation of the security system, and the moment of the first unreflected attack is determined as a catastrophe moment. The security system will not be able to defeat the attack if it is in restoration states i = 1,2. In addition, and in the state i = 0 part of the period, the security system can be in the state of latent breakdown and skip the attack. Therefore, the increase in the safety of operation of the main system S or the increase in the efficiency of operation of the security system S" will be associated with the numerical characteristic of a random moment of catastrophe - the mathematical expectation of the time before the catastrophe. This expectation depends on the initial characteristics, in particular, on the distribution function G(u), which determines the periodicity of planned restoration work. In the future, we will say that the distribution G(u) determines the management strategy. It should be noted here that in the model under examination, the management is realized only in state i = 0 and depends only on the state at the moment of decision-making. Therefore, in this case, the strategy has the property of Markov, homogeneity (there is no dependence on calendar time). In addition, the model considers a class of randomize strategies, since a random experiment is used when choosing a solution (the implementation of a random coefficient having a distribution G(u) determines the solution). The set of distribution definition G(u) we will call the management space R+ = (0, ro).

Thus, we come to the following mathematical tasks:

• to calculate the dependence of the mathematical expectation of the time before the catastrophe M(t/^(0) = 0) = M0(G) from the distribution G(u) determining the

O. Zaitseva

ANALYSIS OF THE CONTROLLED SECURITY MODEL

WITH UNCOUNTABLE NUMBER OF LINEAR LIMITATIONS RT&A, No 3 (69) ON MANAGEMENT STRATEGIES_Volume 17, September 2022

management strategies (here t is the time before the catastrophe and it is assumed that the security system is good at zero moment); • to find the maximum functional M0(G) by the set of permissible management strategies and determine the strategy on which this extremum is achieved. Further, let us be clear the concept of permissible strategies (distributions) introduced above. Let us mark the functional M(x/$(0) = i) = M((G) = M( and tt", G £ tt", the set of distributions for which these functionals exist. Next, we will introduce two distribution functions.

0 < G"(t) < G2(t) <1,t> 0,G"(t) = G2(t) = 0,t<0, and define a set of distributions

tt' ={0<G"_(C)<G(t)<G'(t)<1} (6)

Then the set of permissible distributions by the equality

tt =tt" ntt2 (7)

Let us note that limitations (6) can be represented as limitations of the type of inequalities on linear functionals

,(t) < J u(x,t)dG(x) < G'(t),u(x,t) = ft* < I'J

£ [0, +«>).

Now, in the accepted notations, it is possible to formulate a mathematical task: to determine the maximum M(t/^(0) = i) = M((G) = M( by the set of permissible distributions (7) and the distribution G(o) - the strategy on which this maximum is achieved, maxMo(G) = M0(G(o)).

4. Definition Of Target Functional Structure

Let us calculate the dependency of mathematical expectations of the time before the catastrophe. For conditional mathematical expectations M( = M(t/^(0) = i), i = 0,1,2, we write out a system of algebraic equations using the formula of full mathematical expectation

3

Mo =ZM0( pn

i=l

Mi = MnPio + Mi,pi3, i = 1,2, (8)

where Mi* means a conditional mathematical expectation of the time before the catastrophe if f (0) = i and this component made the first transition to the state j. From the above description, there are the following equalities

= fo" fo" tdiQii(t,u)dG(u)+Mi 2

Poi

.. J0 t8tQi3(t> n , n .. J0 t8tQio(t> . .. . , n /m

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

Mi, = -, i = 0,1,2, Mn = -+Mo,i = 1,2. (9)

Pi3 Pi 0

Substituting (9) into equations (8), we obtain a system of algebraic equations

¥ ¥ f 3 \

M0 = jjtd11 Z Qoi (t,U ) IdG (U ) + MlPoi + M2P02

0 0 V i=l 0

¥ ¥ M = j tdtQi0 (t) + j tdtQt3 (t) + MoPo, i = 1,2.

0 0

Solution of this system

M = fo f" tdt Vh Qoi(t, u))dG(u) + Y.i=i,2 Poi Uo,3 f" tdtQij (0

1 — PioPoi — P2oPo2

determines the functional under examination - the mathematical expectation of the time before the catastrophe. If we take into account the equations (2) and (4), we get

^ r, V- #xt . *

Z

n r+ ^ j1--Te +-Te , u>t,

Qoí (t,u) = R ^-A ^-A

i=" u, u<t,

O. Zaitseva

ANALYSIS OF THE CONTROLLED SECURITY MODEL

WITH UNCOUNTABLE NUMBER OF LINEAR LIMITATIONS RT&A, No 3 (69) ON MANAGEMENT STRATEGIES_Volume 17, September 2022

Z Qij(t) = 1-Fi(t)e-$t,i = 1,2.

j=0,3

Thus, taking into account (5), we finally obtain that M0 = M0(G) is bilinear functional

JA(u)dG(u)

M0(G) = °-—, (10)

0( ) B(u)dG(u) ( )

in which the subintegral functions are determined by the equalities

rm u fm

+e-&U J F1(t)e~$tdt+ - e-&U) J F2(t)e-Atdt

B(u) = 1- e-&U J)) e-XxdF1(x) - ^(e-$U - e-&U) ¡0) e-AxdF2(x) (11)

5. Solution Of Optimization Task. Optimal Management Strategy Construction

The above research proves that the task of constructing the optimal management strategy is now formulated as follows: to determine the maximum of the bilinear functional (10), in which the subintegral functions are determined by equalities (11), by the set of distribution functions satisfying conditions (6) and (7), and the distribution G(0) where this maximum is reached

Mo(G(0)) = maxG£n Mo (G).

The basis for solving the task will be two statements:

• A theorem on distribution structure where the maximum linear functional over the set of distributions (7) is achieved, the proof of which is given in [2];

• A theorem on coincidence of sets of distributions where the maximum of bilinear functional is reached and the maximum of specially selected linear functional is reached, the proof of which is given in [3].

Further we will give the definitions of these statements.

THEOREM [2]. If there is the maximum of the linear functional L(G) = J+m C(u)dG(u) with respect to the set (7) and the subintegral function C(u) has the maximum at point 0 < t" < and in the area 0 < t < t" the subintegral function is non-decreasing, and in the area t" < t < the subintegral function is non-increasing, then the maximum of the functional is achieved on the distribution

G(0)(U) = \G1(U)' °<u<ui> (12)

{G2(U), U" < U <

that is

maxL(G) = L(G(0)) = Gen

= ¡0+UC(u)dG1(u) + C(U") lim G2 (it) - G" (it-^j + J+) C(u)dG2(u) = C. (13)

and the following equality is correct

max^ {J0U C(x)dG"(x) + C(t) [júnG'^) - G^u)] + f++°0 C(x)dG2(x)} = C. (14)

LEMMA [3]. If there is the maximum of bilinear functional M0(G0) = maxGe> M0 (G) = C (10) in some set distributions 0 then

{0: Mo(0) = C = maxG£n Mo (G)} = [0: maxGen L (G) = L(<P)}, where the subintegral function of the linear functional L(G) = J0 C(u)dG(u) is defined by the equality C(u) = A(u) - CB(u).

The lemma condition about existence of the maximum of functional (10) means that the set [0: Mo(0) = C = maxGen M0 (G)} is not empty.

The converse statement is also true.

STATEMENT. If there is such a constant C for which

[&:maxGen f)(A(u) - CB(u))dG(u) = J0°°(^(u) - CB(u))d&(u)} ± 0,

O. Zaitseva

ANALYSIS OF THE CONTROLLED SECURITY MODEL WITH UNCOUNTABLE NUMBER OF LINEAR LIMITATIONS ON MANAGEMENT STRATEGIES

RT&A, No 3 (69) Volume 17, September 2022

then there is the maximum of bilinear functional (10) and this maximum is C.

From the above statements follows

COROLLARY [2]. If there is the maximum of bilinear functional M0(G0) = maxGe> M0 (G) = C (10) in set distributions Ü, determined by correlations (6) and (7), and function C(u) = A(u) — CB(u) has the maximum in the point 0 < t" < and in the area 0 < t < t" subintegral function is non-decreasing, and in the area t" < t < the subintegral function is non-increasing, then the maximum of this bilinear functional is reached on distribution (12) and

max M 0(G) = M0(G(0)) =

J A(x)dGl(x) + A(u) lim G2(t) —Gl(u) + J A(x)dG2(u)

(15)

e[0,m)

= C.

J B( x)dGl( x) + B(u)

lim G2(t) — Gj(u)

J B(x)dG2(x)

If you use these statements to find the maximum of the bilinear functional M0(G) (10), in which the subintegral functions are determined by equations (11), then the task will result in examining the function C(u) = A(u) — CB(u).

To simplify transformations let us enter symbols

- CO f o

ßi = I Fi (t)e-Átdt,aí = I

Jo 'o

aí = — I

Jo

e~Át dFi(t),i = 1,2,

e~ÁtdFi(t) = 1—Aßi>0.

Then, taking into account the equalities (11) and the accepted symbols for the function C(u),

we have

C(u) = A(u) — CB(u) =

= (ß + Ä)--1-(U'e-$u - x>e-&uL + +—^—(e-Áu — e~&uLßn —

Aß ßA(ß — A) Ae L + Pl + ß-A(6 6 >P2

—c(1 —

(1 — e-&u(1 — Aß±) — -^—j (e-ÁU — e-&u)(1 — Aß2)j,

C(0) = ßi(1 — CA) < 0,C(=

(&+Á)

— C

(16)

The latter inequality follows from the obvious correlations

Pi >0,C> $.

For the derivative of the function C(u) after transformations, we have the equality

^==0—0 ("e-Áu—Äe-&u)—"e-&uß-—j—a (Xe-ÁU—»e-&u^2—

—C (ß' — ßi)(1 — M)(1 — *ßi) + (Ae-Áu — ße-&u)(1 — Aß') j =

= e-&u +e-Áu

1 (CßA —1) + -^ßi(1 — AC) + (ß2 — ßi)(1 — AC)

(ß — A) ß

ß — A (1—Aß')(1—AC)

ß — A

+

(M — X)

Now the derivative under examination can be represented as the product of two functions

dC(u)

v J = Vi(u)V2(u)

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

Co = C" =

du

W"(u) = e-&u,W2(u) = Co + C",

1 ___ . A _ ß2

(ß — A) ß

(CßA — 1) +--ßi(1 — AC) +

ß — A

ß — A

(ß2—ßi)(1—XC)

(1—Aß2)(1—AC)

(M—V

The first function V"(u) is positive and the second function V2(u) is decreasing since

dW7(u) , „

2W >(&-X)uii(1—Ap2)(1—AC)<0.

= ey

O. Zaitseva

ANALYSIS OF THE CONTROLLED SECURITY MODEL WITH UNCOUNTABLE NUMBER OF LINEAR LIMITATIONS ON MANAGEMENT STRATEGIES

RT&A, No 3 (69) Volume 17, September 2022

Thus, it has been proved that the derivative of the function (16) changes the sign from plus to minus up to one time, that is, the function (16) is either monotonic in the area R+ = 0, or has the maximum on area boundaries and fully satisfies the conditions of the above statements.

Therefore, the maximum of the functional (10), in which the subintegral functions are determined by the equalities (11), over the set distributions satisfying the inequalities { G: 0 < G"(u) < G(u) < G2(u) < 1,0 < и < (6), is achieved on the distribution

moreover, the parameter % is defined as maximum point of function 15. We remind that functions A(u) and B(u) are defined by equalities (11).

The conducted researches allowed to bring the task of functional analysis - the search for the extremum of bilinear functional by the set distribution functions to the task of mathematical analysis - the search for the maximum of some function by the set of real numbers. This essentially simplifies the practical use of the results set forth.

References

[1] Kashtanov, V.A. The Structure of the Functional of Accumulation Defined on a Trajectory of Semi-Markov Process with a Finite Set of States. Theory of Probability and its Appllications. Vol. 60, No. 2 (2016), pp. 281-294.

[2] Kashtanov, V.A., Zaitseva, O.B. & Efremov, A.A. Controlled Semi-Markov Processes with Constraints on Control Strategies and Construction of Optimal Strategies in Reliability and Safety Models. Math Notes 109, 585-592 (2021).

[3] Kashtanov, V.A. Discrete distributions in control problems, in Probabilistic Methods in Discrete mathematics, Proceeding of the Fourth International Petrozavodsk Conference (Petrozavodsk, Russia, June 3-7, 1996), VSP, Utrecht, 1997, pp. 267-274.

6. Conclusion

i Надоели баннеры? Вы всегда можете отключить рекламу.