Loading

Setting the Optimum Time for a Special Audit to Improve the Enterprise’s Cyber Security
Barabash Oleg1, Halakhov Yevhen2

1Barabash Oleg, Department of Mathematics, State University of Telecommunications, Kyiv, Ukraine.
2Halakhov Yevhen*, Department of Mathematics, State University of Telecommunications, Kyiv, Ukraine.
Manuscript received on February 06, 2020. | Revised Manuscript received on February 10, 2020. | Manuscript published on February 30, 2020. | PP: 1567-1572 | Volume-9 Issue-3, February, 2020. | Retrieval Number: C4677029320 /2020©BEIESP | DOI: 10.35940/ijeat.C4677.029320
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: The article presents a method for setting the optimal time for special audit to improve the level of cyber defense of an enterprise working in the field of market relations of IT services. Studying the issue of providing measures to reduce the risk of a cyber-incident, analyzed the time series of the intensity of cyber-attacks of the enterprise. An analytical function of the cyber-attack intensity at an enterprise that satisfies the nonlinear Bernoulli differential equation is considered. The elasticity interval of the analytic function of the cyber-attack intensity at the enterprise is found. Analysis of cyber-attack time series on the enterprise system for the same time periods falling within the time interval from the end of the planned audit to the beginning of the next one. An analytical alignment of the time series of the cyber-attack intensity function was performed using a logistic curve. A stepwise p-transformation of a small parameter into a cyber-attack intensity function for an enterprise was introduced and the dimensionlessness of the variables was performed, which made it possible to calculate the sensitivity of a dimensionless cyber-attack intensity function from a small parameter p over a set time period. The study is based on the application of the theory of elasticity of the intensity function of cyber-attacks, which determines the time interval at which to conduct a special audit at the enterprise. Due to the found elasticity interval of the cyber-attack intensity function, the optimal time for special audit was determined.
Keywords: Cyber security, time series, cyber-attack intensity, logistic curve, elasticity, Bernoulli equation, p-transformations, filtering, special audit.