31

This research focuses on modeling a security infrastructure composed ofapplications that utilize Petri nets. A core challenge in ensuring the safety of such systems arises from the need to handle vast volumes of environmental data related to the condition of the protected object, potential risks, and the generation of control responses. In this work, Petri net formalism is applied to represent the information flow and decision-making processes within the protection system's components. The structural and logical configuration of the system is modeled as a hypergraph, where its elements are defined as control nodes (CNs). These nodes are categorized based on their operational roles: detection nodes (DN), access nodes (AN), monitoring nodes (MN), delay nodes (DlN), and control mechanisms such as authorization and authentication modules (AuthM, AuthzM). The study also introduces detailed models for environmental data handling within specific protection units, including the abnormal movement detector, logic controller, central management unit, and a universal regulatory module

  • Read count 31
  • Date of publication 10-06-2025
  • Main LanguageIngliz
  • Pages 5-16
English

This research focuses on modeling a security infrastructure composed ofapplications that utilize Petri nets. A core challenge in ensuring the safety of such systems arises from the need to handle vast volumes of environmental data related to the condition of the protected object, potential risks, and the generation of control responses. In this work, Petri net formalism is applied to represent the information flow and decision-making processes within the protection system's components. The structural and logical configuration of the system is modeled as a hypergraph, where its elements are defined as control nodes (CNs). These nodes are categorized based on their operational roles: detection nodes (DN), access nodes (AN), monitoring nodes (MN), delay nodes (DlN), and control mechanisms such as authorization and authentication modules (AuthM, AuthzM). The study also introduces detailed models for environmental data handling within specific protection units, including the abnormal movement detector, logic controller, central management unit, and a universal regulatory module

Name of reference
1 1.A. Kabulov, I. Kalandarov and I. Yarashov, "Problems Of Algorithmization Of Control Of Complex Systems Based On Functioning Tables In Dynamic Control Systems," 2021 International Conference on Information Science and Communications Technologies(ICISCT), 2021, pp. 1-4, doi: 10.1109/ICISCT52966.2021.9670017. 2.A. Kabulov and I. Yarashov, "Mathematical model of Information Processing in the Ecological Monitoring Information System," 2021 International Conference on Information Science and Communications Technologies (ICISCT), 2021, pp. 1-4, doi: 10.1109/ICISCT52966.2021.9670192. 3.A. Kabulov, I. Yarashov and A. Otakhonov, "Algorithmic Analysis of the System Based on the Functioning Table and Information Security," 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), 2022, pp. 1-5, doi: 10.1109/IEMTRONICS55184.2022.9795746. 4.A. Kabulov, I. Saymanov, I. Yarashov and F. Muxammadiev, "Algorithmic method of security of the Internet of Things based on steganographic coding," 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), 2021, pp. 1-5, doi: 10.1109/IEMTRONICS52119.2021.9422588. 5.I. Yarashov, "Algorithmic Formalization Of User Access To The Ecological Monitoring Information System," 2021 International Conference on Information Science and Communications Technologies (ICISCT), 2021, pp. 1-3, doi: 10.1109/ICISCT52966.2021.9670023. 6.A. Kabulov, I. Normatov, I. Kalandarov and I. Yarashov, "Development of An Algorithmic Model And Methods For Managing Production Systems Based On Algebra Over Functioning Tables," 2021 International Conference on Information Science and Communications Technologies (ICISCT), 2021, pp. 1-4, doi: 10.1109/ICISCT52966.2021.9670307. 7.A. Kabulov, I. Saymanov, I. Yarashov and A. Karimov, "Using Algorithmic Modeling to Control User Access Based on Functioning Table," 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS), 2022, pp. 1-5, doi: 10.1109/IEMTRONICS55184.2022.9795850. 8.Kabulov A. V., Yarashov I. K., Jo‘Rayev M. T. Computer viruses and virus protection problems //Science and Education. –2020. –Т. 1. –No. 9. –С. 179-184.9.Kabulov A. et al. Algorithmic method of security of the Internet of Things based on steganographic coding. 2021 IEEE International IOT //Electronics and Mechatronics Conference, IEMTRONICS. –2021.10.Madrahimova D., Yarashov I. Limited in solving problems of computational mathematics the use of elements //Science and Education. –2020. –Т. 1. –No. 6. –С. 7-14.11.Kabulov A., Yarashov I., Vasiyeva D. SECURITY THREATS AND CHALLENGES IN IOT TECHNOLOGIES //Science and Education. –2021. –Т. 2. –No. 1. –С. 170-178.12.Kabulov A., Muhammadiyev F., Yarashov I. ANALYSIS OF INFORMATION SYSTEM THREATS //Science and Education. –2020. –Т. 1. –No. 8. –С. 86-9113.Gaynazarov S. M. et al. ALGORITHM OF MOBILE APPLICATION FOR MEDICINE SEARCH //Science and Education. –2020. –Т. 1. –No. 8. –С. 600-605.14.Кабулов А. В. Шерзод Туйлибоевич Болтаев, andГулдофарид Муроджоновна Хабибжонова.«АЛГОРИТМИЧЕСКИЕ АВТОМАТНЫЕ МОДЕЛИ И МЕТОДЫ СОЗДАНИЯ РАСПРЕДЕЛЕННЫХ МИКРОПРОЦЕССОРНЫХ СИСТЕМ УПРАВЛЕНИЯ И ИНФОРМАЦИОННОЙ БЕЗОПАСНОСТИ.» //WORLDSCIENCE: PROBLEMSANDINNOVATIONS. –2019.15.Yarashov I., Normatov I., Mamatov A. THE STRUCTURE OF THE ECOLOGICAL INFORMATION PROCESSING DATABASE AND ITS ORGANIZATION //International Conference on Multidimensional Research and Innovative Technological Analyses. –2022. –С. 114-117. 16.Кабулов А. В. и др. АЛГОРИТМИЧЕСКИЕ АВТОМАТНЫЕ МОДЕЛИ И МЕТОДЫ СОЗДАНИЯ РАСПРЕДЕЛЕННЫХ МИКРОПРОЦЕССОРНЫХ СИСТЕМ УПРАВЛЕНИЯ И ИНФОРМАЦИОННОЙ БЕЗОПАСНОСТИ //WORLDSCIENCE: PROBLEMSANDINNOVATIONS: сборник статей XXIX. –2019. –С. 40.17.Yarashov I., Normatov I., MamatovA. ECOLOGICAL INFORMATION PROCESSING TECHNOLOGIES AND INFORMATION SECURITY //International Conference on Multidimensional Research and Innovative Technological Analyses. –2022. –С. 73-76.18.Kabulov A., Yarashov I., Mirzataev S. DEVELOPMENT OF THE IMPLEMENTATION OF IOT MONITORING SYSTEM BASED ON NODE-RED TECHNOLOGY //Karakalpak Scientific Journal. –2022. –Т. 5. –No. 2. –С. 55-64.19.Бабаджанов А. Ф. и др. АЛГОРИТМИЧЕСКИЙ АНАЛИЗ СИСТЕМЫ ЗАЩИТЫ ИНФОРМАЦИИ НА ОСНОВЕ ТАБЛИЦ ФУНКЦИОНИРОВАНИЯ //InternationalJournalofContemporaryScientificandTechnicalResearch. –2022. –С. 216-219.20.I. Yarashov, "Development of a reliable method for grouping users in user access control based on a Functioning table," 2022 International Conference on Information Science and Communications Technologies (ICISCT), 2022, pp. 1-5. 21.I. Normatov, I. Yarashov, A. Otakhonov and B. Ergashev, “Construction of reliable well distribution functions based on the principle of invariance for convenient user access control,” 2022 International Conference on Information Science and Communications Technologies (ICISCT), 2022, pp. 1-5. 22.S. Toshmatov, I. Yarashov, A. Otakhonov and A. Ismatillayev, “Designing an algorithmic formalization of threat actions based on a Functioning table,” 2022 International Conference on Information Science and Communications Technologies (ICISCT), 2022, pp. 1-5.23.Sukhoverkhov A.S. Metodicheskiy podkhod k modelirovaniyu funktsionirovaniya sredstv zashchity informatsii na osnove primeneniya apparata teorii setey Petri-Markova, Telekommunikatsii. 2012. No 8, pp. 41-48.24.Мальков, М. В., andС. Н. Малыгина. "Сети Петри и моделирование." Труды Кольского научного центра РАН 3 (2010): 35-40.25.Wang, Shouguang, et al. "A reduced reachability tree for a class of unbounded Petri nets." IEEE/CAA Journal of Automatica Sinica 2.4 (2015): 345-352.
Waiting