Abstract
An approach to self-regulation of the network infrastructure of cyberphysical systems is proposed using the mathematical apparatus of de Bruijn graphs and overlap graphs employed in the bioinformatic problem of genome assembly. This approach reduces the time required for reconfiguring the system due to faster “linking” of the restored sections of the objective function.
Similar content being viewed by others
REFERENCES
Lavrova, D.S., Alekseev, I.V., and Shtyrkina, A.A., Security analysis based on controlling dependences of network traffic parameters by wavelet transformation, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 931–935.
Pavlenko, E. and Zegzhda, D., Sustainability of cyber-physical systems in the context of targeted destructive influences, IEEE Industrial Cyber-Physical Systems, 2018, pp. 830–834.
Zegzhda, D.P. and Pavlenko, E.Yu., Digital manufacturing security indicators, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1150–1159. https://doi.org/10.3103/S0146411618080333
Krundyshev, V. and Kalinin, M., Prevention of false data injections in smart infrastructures, 2019 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom 2019, 2019. https://doi.org/10.1109/BlackSeaCom.2019.8812786
Kalinin, M.O., Permanent protection of information systems with method of automated security and integrity control, SIN'10: Proceedings of the 3rd International Conference of Security of Information and Networks, 2010, pp. 118–123. https://doi.org/10.1145/1854099.1854125
Zegzhda, D.P., Zegzhda, P.D., and Kalinin, M.O., Clarifying integrity control at the trusted information environment, Lect. Notes Comput. Sci., 2010, vol. 6258, pp. 337–344.
Stepanova, T., Kalinin, M., Baranov, P., and Zegzhda, D., Homogeneity analysis of power consumption for information security purposes, Proceedings of the 3rd International Conference of Security of Information and Networks, 2010, pp. 113–117.
Pavlenko, E., Zegzhda, D., and Shtyrkina, A., Criterion of cyber-physical systems sustainability, CEUR Workshop Proc., 2019, vol. 2603, pp. 60–64.
Zegzhda, D., Lavrova, D., and Poltavtseva, M., Multifractal security analysis of cyberphysical systems, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 2, pp. 196–204.
Lavrova, D., Poltavtseva, M., and Shtyrkina, A., Security analysis of cyber-physical systems network infrastructure, Proceedings of 2018 IEEE Industrial Cyber-Physical Systems, ICPS 2018, 2018, pp. 818–823. https://doi.org/10.1109/ICPHYS.2018.8390812
Pavlenko, E.Yu., Yarmak, A.V., and Moskvin, D.A., Hierarchical approach to analyzing security breaches in information systems, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 829–834.
Lavrova, D.S., Zegzhda, D.P., and Zaitseva, E.A., Modeling of the network infrastructure of complex objects for solving the problem of countering cyber attacks, Vopr. Kiberbezop., 2019, no. 2, pp. 13–20.
Kompo, F. and Pevzner, P., Genome Reconstruction: A Puzzle of a Billion Pieces. http://kvant.mccme.ru/ pdf/2014/2014-03.pdf.
Sergushichev, A.A., et al., Combined application of de Bruyne graph, overlap graph, and microassembly for de novo genome assembly, Izv. Sarat. Univ., Nov. Ser., Ser. Mat. Mekh. Inf., 2013, vol. 13, no. 2-2, pp. 51–57.
Smart Grid Conceptual Model. http://www.science.smith.edu/~jcardell/Courses/EGR325/SmartGrid%20 Readings/Smart%20Grid%20Interop%20Panel%202010%20Panel.pdf.
Hartmann, T., et al., Generating realistic smart grid communication topologies based on real-data, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm), Venice, 2014, pp. 428–433.
Belenko, V., Krundyshev, V., and Kalinin, M., Intrusion detection for Internet of Things applying metagenome fast analysis, Proceedings of the 3rd World Conference on Smart Trends in Systems, Security and Sustainability, 2019, pp. 129–135.
Markov, Y.A., Kalinin, M.O., and Zegzhda, D.P., A technique of abnormal behavior detection with genetic sequences alignment algorithms, International Conference on Enterprise Information Systems and Web Technologies 2010, 2010, pp. 104–110.
Markov, Y.A. and Kalinin, M.O., Intellectual intrusion detection with sequences alignment methods, Lect. Notes Comput. Sci., 2010, vol. 6258, pp. 217–228.
Kalinin, M., Krundyshev, V. Zegzhda, P., and Belenko, V., Network security architectures for VANET, ACM International Conference Proceeding Series, 2017, pp. 73–79. https://doi.org/10.1145/3136825.3136890
Minin, A. and Kalinin, M., Information security in computer networks with dynamic topology, ACM International Conference Proceeding Series, 2015. https://doi.org/10.1145/2799979.2800023
Konoplev, A.S. and Kalinin, M.O., Security policy verification in grid systems, Proceedings of the 6th International Conference on Security of Information and Networks, 2013, pp. 356–358.
Kalinin, M.O. and Konoplev, A.S., Formalization of objectives of grid systems resources protection against unauthorized access, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2014, vol. 17, no. 3, pp. 272–277.
Konoplev, A.S. and Kalinin, M.O., Graphanalytical model of key distribution in networks with dynamic architecture, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 3, pp. 277–284.
Funding
This research was carried out within the framework of the scholarship of the President of the Russian Federation for young scientists and graduate students SP-1932.2019.5.
Author information
Authors and Affiliations
Corresponding authors
Ethics declarations
The authors declare that they have no conflicts of interest.
Additional information
Translated by K. Lazarev
About this article
Cite this article
Zaitseva, E.A., Lavrova, D.S. Self-Regulation of the Network Infrastructure of Cyberphysical Systems on the Basis of the Genome Assembly Problem. Aut. Control Comp. Sci. 54, 813–821 (2020). https://doi.org/10.3103/S0146411620080350
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.3103/S0146411620080350