Self-Regulation of the Network Infrastructure of Cyberphysical Systems on the Basis of the Genome Assembly Problem | Automatic Control and Computer Sciences Skip to main content
Log in

Self-Regulation of the Network Infrastructure of Cyberphysical Systems on the Basis of the Genome Assembly Problem

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

An approach to self-regulation of the network infrastructure of cyberphysical systems is proposed using the mathematical apparatus of de Bruijn graphs and overlap graphs employed in the bioinformatic problem of genome assembly. This approach reduces the time required for reconfiguring the system due to faster “linking” of the restored sections of the objective function.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Japan)

Instant access to the full article PDF.

Fig. 1.
Fig. 2.
Fig. 3.
Fig. 4.
Fig. 5.
Fig. 6.
Fig. 7.
Fig. 8.

Similar content being viewed by others

REFERENCES

  1. Lavrova, D.S., Alekseev, I.V., and Shtyrkina, A.A., Security analysis based on controlling dependences of network traffic parameters by wavelet transformation, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 931–935.

    Article  Google Scholar 

  2. Pavlenko, E. and Zegzhda, D., Sustainability of cyber-physical systems in the context of targeted destructive influences, IEEE Industrial Cyber-Physical Systems, 2018, pp. 830–834.

    Book  Google Scholar 

  3. Zegzhda, D.P. and Pavlenko, E.Yu., Digital manufacturing security indicators, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp. 1150–1159. https://doi.org/10.3103/S0146411618080333

    Article  Google Scholar 

  4. Krundyshev, V. and Kalinin, M., Prevention of false data injections in smart infrastructures, 2019 IEEE International Black Sea Conference on Communications and Networking, BlackSeaCom 2019, 2019. https://doi.org/10.1109/BlackSeaCom.2019.8812786

  5. Kalinin, M.O., Permanent protection of information systems with method of automated security and integrity control, SIN'10: Proceedings of the 3rd International Conference of Security of Information and Networks, 2010, pp. 118–123. https://doi.org/10.1145/1854099.1854125

  6. Zegzhda, D.P., Zegzhda, P.D., and Kalinin, M.O., Clarifying integrity control at the trusted information environment, Lect. Notes Comput. Sci., 2010, vol. 6258, pp. 337–344.

    Article  Google Scholar 

  7. Stepanova, T., Kalinin, M., Baranov, P., and Zegzhda, D., Homogeneity analysis of power consumption for information security purposes, Proceedings of the 3rd International Conference of Security of Information and Networks, 2010, pp. 113–117.

  8. Pavlenko, E., Zegzhda, D., and Shtyrkina, A., Criterion of cyber-physical systems sustainability, CEUR Workshop Proc., 2019, vol. 2603, pp. 60–64.

    Google Scholar 

  9. Zegzhda, D., Lavrova, D., and Poltavtseva, M., Multifractal security analysis of cyberphysical systems, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 2, pp. 196–204.

  10. Lavrova, D., Poltavtseva, M., and Shtyrkina, A., Security analysis of cyber-physical systems network infrastructure, Proceedings of 2018 IEEE Industrial Cyber-Physical Systems, ICPS 2018, 2018, pp. 818–823. https://doi.org/10.1109/ICPHYS.2018.8390812

    Article  Google Scholar 

  11. Pavlenko, E.Yu., Yarmak, A.V., and Moskvin, D.A., Hierarchical approach to analyzing security breaches in information systems, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 829–834.

    Article  Google Scholar 

  12. Lavrova, D.S., Zegzhda, D.P., and Zaitseva, E.A., Modeling of the network infrastructure of complex objects for solving the problem of countering cyber attacks, Vopr. Kiberbezop., 2019, no. 2, pp. 13–20.

  13. Kompo, F. and Pevzner, P., Genome Reconstruction: A Puzzle of a Billion Pieces. http://kvant.mccme.ru/ pdf/2014/2014-03.pdf.

  14. Sergushichev, A.A., et al., Combined application of de Bruyne graph, overlap graph, and microassembly for de novo genome assembly, Izv. Sarat. Univ., Nov. Ser., Ser. Mat. Mekh. Inf., 2013, vol. 13, no. 2-2, pp. 51–57.

  15. Smart Grid Conceptual Model. http://www.science.smith.edu/~jcardell/Courses/EGR325/SmartGrid%20 Readings/Smart%20Grid%20Interop%20Panel%202010%20Panel.pdf.

  16. Hartmann, T., et al., Generating realistic smart grid communication topologies based on real-data, 2014 IEEE International Conference on Smart Grid Communications (SmartGridComm), Venice, 2014, pp. 428–433.

  17. Belenko, V., Krundyshev, V., and Kalinin, M., Intrusion detection for Internet of Things applying metagenome fast analysis, Proceedings of the 3rd World Conference on Smart Trends in Systems, Security and Sustainability, 2019, pp. 129–135.

  18. Markov, Y.A., Kalinin, M.O., and Zegzhda, D.P., A technique of abnormal behavior detection with genetic sequences alignment algorithms, International Conference on Enterprise Information Systems and Web Technologies 2010, 2010, pp. 104–110.

  19. Markov, Y.A. and Kalinin, M.O., Intellectual intrusion detection with sequences alignment methods, Lect. Notes Comput. Sci., 2010, vol. 6258, pp. 217–228.

    Article  Google Scholar 

  20. Kalinin, M., Krundyshev, V. Zegzhda, P., and Belenko, V., Network security architectures for VANET, ACM International Conference Proceeding Series, 2017, pp. 73–79. https://doi.org/10.1145/3136825.3136890

  21. Minin, A. and Kalinin, M., Information security in computer networks with dynamic topology, ACM International Conference Proceeding Series, 2015. https://doi.org/10.1145/2799979.2800023

  22. Konoplev, A.S. and Kalinin, M.O., Security policy verification in grid systems, Proceedings of the 6th International Conference on Security of Information and Networks, 2013, pp. 356–358.

  23. Kalinin, M.O. and Konoplev, A.S., Formalization of objectives of grid systems resources protection against unauthorized access, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2014, vol. 17, no. 3, pp. 272–277.

  24. Konoplev, A.S. and Kalinin, M.O., Graphanalytical model of key distribution in networks with dynamic architecture, Nonlinear Phenom. Complex Syst. (Dordrecht, Neth.), 2019, vol. 22, no. 3, pp. 277–284.

Download references

Funding

This research was carried out within the framework of the scholarship of the President of the Russian Federation for young scientists and graduate students SP-1932.2019.5.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to E. A. Zaitseva or D. S. Lavrova.

Ethics declarations

The authors declare that they have no conflicts of interest.

Additional information

Translated by K. Lazarev

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zaitseva, E.A., Lavrova, D.S. Self-Regulation of the Network Infrastructure of Cyberphysical Systems on the Basis of the Genome Assembly Problem. Aut. Control Comp. Sci. 54, 813–821 (2020). https://doi.org/10.3103/S0146411620080350

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411620080350

Keywords:

Navigation