500 rub
Journal Science Intensive Technologies №2 for 2026 г.
Article in number:
A model for assessing the security of a distributed computing system networks of complex organizational and technical systems
Type of article: scientific article
DOI: https://doi.org/10.18127/j19998465-202602-04
UDC: 623.618.3
Authors:

S.V. Chashchin1, D.A. Mosin2, D.V. Trefilov3, V.V. Kulikov4, L.V. Kazantseva5, A.A. Shiryaev6, A.N. Dementiev7

1-3 Military Space Academy named after A.F. Mozhaisky (St. Petersburg, Russia)
4 JSC Concern Morinsis-Agat (Moscow, Russia)
5-7 MIREA – Russian Technological University (RTU MIREA) (Moscow, Russia)
1 sonpo123@mail.ru, 2 mosin_da@mail.ru, 3 kirblack@inbox.ru, 6 shiryaev_a@mirea.ru, 7 dementev_a@mirea.r

Abstract:

The article discusses problematic issues of creating countermeasures against the impact of a potential violator on complex organizational and technical systems, such as information infrastructures of government agencies and enterprises. The high importance of automated control systems for the implementation of technological cycle tasks, as a result, and their basic element, a distributed computing network, in the event of conflict situations creates prerequisites for the impact of an intruder on it. Goal. Solving the problem of ensuring the sustainable functioning of complex organizational and technical systems by making changes in their configuration to fend off emerging threats. The novelty of the work lies in the development of an algorithm for assessing the security of a distributed computer network of a complex organizational and technical system operating under destructive influences, which makes it possible to determine the best structure, taking into account the possibility of an information system using internal resources and topology changes to purposefully reconfigure. Results. Based on the conducted research, an algorithm based on the use of the provisions of Markov chain theory and the Monte Carlo method is proposed, which makes it possible to assess the security of a distributed computing network based on the forecast of enemy impact, taking into account the availability of backup elements and the possibility of reconfiguration of a complex organizational and technical system. The practical significance lies in the suitability of the developed scientific and methodological apparatus for solving practical problems of ensuring (restoring) the operability of complex organizational and technical systems, a wide range of activities that arise during hardware failures and software failures of automation systems under destructive influences.

Pages: 42-48
For citation

Chashchin S.V., Mosin D.A., Trefilov D.V., Kulikov V.V., Kazant seva L.V., Shiryaev A.A., Dementiev A.N. A model for assessing the security of a distributed computing system networks of complex or ganizational and technical systems. Science Intensive Technolog ies. 2026. V. 27. № 2. P. 42−48. DOI: https://doi.org/ 10.18127/j19998465-202602-04 (in Russian)

References
  1. Rastrigin L.A. Adaptaciya slozhnyhsistem. Riga: Zinatne, 1981. 375 s. (in Russian)
  2. Gurov A.G. i dr. Razrabotka prognozov sispol'zovaniemdereva celej: Ucheb. pos. klaborat. rabote. M.: MAI. 1991. 44 s.(in Russian)
  3. Dudin M.N., Shkodinskij S.V. Vyzovy iugrozyekonomiki dlya ustojchivosti nacional'noj bankovskoj sistemy. Finansy: teoriyaipraktika. 2022. № 3(25) S. 52–71 (in Russian).
  4. Klimov S.M. Metody imodeli protivodejstviya komp'yuternymatakam. Lyubercy: Katalit, 2008. 316 s. (in Russian)
  5. Cherkesov G.N., Mozhaev A.S. Logiko-veroyatnostnye metody raschetanadezhnosti strukturno-slozhnyhsistem. Kachestvo inadezhnost' izdelij. – M.: Znanie. 1991. № 3 (15). S. 3–64 (in Russian).
  6. Chashchin S.V., Galankin A.V. Analiticheskaya model' zashchishchennosti avtomatizirovannoj si stemyupravleniya special'nogonaznacheniya vusloviyah programmno-matematicheskih vozdejstvij. Izv. Tul'skogo gosudarstvennogo universiteta. Ser.: Tekhnicheskie nauki. 2 0 2 Vyp. 4. S. 363–367 (in Russian).
  7. Sv-vo o gos. registracii progr ammydlya EVM № 2025614 0 4
  8. Progr ammnyjkomplekspoocenivaniyuzashchishchennostiRVS, funkcioniruyushchej vusloviyah programmno-matematicheskogo voz dejstviya. D. V. Trefilov, S. V. Chashchin, D. R. Garifullin, D. A. Kol'cov, A.S. Petuhov, A.V. Boyandinov. 2025 (in Russian).
  9. Positive Technologies: otchet ob uyazvimostyah ASU TP za 2021 god. URL.: http://www.safe-surf.ru (in Russian).
  10. Kurejchik V.V., Danilichenko V.I., Danilichenko E.V. Marshrutizaciya avtonomnyh ustrojstv vtrekhmernom prostranstv e. Informatika iavtomatizaciya. 2025. № 2(28). S. 497–499 (in Russian). 1
  11. Averkiev A.A., Kambulov D.A. Kiberbezopasnost' vidyimetody. Nauchno-obrazovatel'nyj zhurnaldlya studentov iprepodavatelej «StudNet». 2022. № 1. S. 569–572 (in Russian). 1
  12. Lipatnikov A.A., Shevchenko A.A., Melekhov K.V., Tkachev D.V. Metodika povysheniya zashchishchennosti setiperedachi dannyh ob"ektovkriticheskoj informacionnoj infrastruktury pri mnogoetapnyh atakah. Informacionno upr avlyayushchie sistemy. 2024. № 1. S.44–55 (in Russian).
Date of receipt: 04.07.2025
Approved after review: 07.08.2025
Accepted for publication: 26.02.2026