USE OF KOHONEN MAPS TO ANALYZE THE INFORMATION SECURITY LEVEL OF COUNTRIES TAKING INTO ACCOUNT THEIR DEVELOPMENT

Keywords: information security, Kohonen maps, distance matrix, quantization error matrix, hit density matrix, nonlinear normalization, development

Abstract

The development of computer technology leads to the emergence of information threats in the country associated with the appearance of information wars and cyber terrorism. There is a need to analyze the level of information security of the country because of this reason. It is also necessary to take into account the level of country development. Two groups of indicators were selected for analysis – information security indexes and development indicators. Global Cybersecurity Index, National Cyber Security Index, ICT Development Index, Networked Readiness Index, Digital Development Level formed a group of information security indicators. Thirty-seven indicators of world development were included in another group. The dataset was generated for 159 world countries in 2018. A correlation analysis was carried out in this work to identify indicators with a close statistical relationship. As a result, 12 development indicators were selected. Non-linear normalization was also performed to bring the data into comparable values. Further research was carried out using an analytical platform Deductor Academic. Data were checked for quality, outliers, duplicates and inconsistencies. As a result, outliers were identified for three observations of the indicator “Life expectancy”, after which the data were replaced with probable values. Kohonen maps were constructed, taking into account different combinations of parameters, as a result of which the option with the lowest quantization errors and optimal hit density was chosen. Based on the results of the experiments, it was selected the method for determining the initial weights of neurons “From eigenvectors”, the neighborhood function “Stepped”, the error level for data recognition is less than 0.05, the size of the map is 24:18. As a result, seven clusters were obtained, which characterize groups of countries by the level of information security, taking into account the indicators of their development. Clusters “0” and “1” include countries with the highest level of development and information security. Group “2” characterizes countries with above-average indicators. The third cluster identifies countries with an average level of development and protection. Group “4” includes countries with indicators for which the degree is below average. The fifth cluster assesses countries with a low level of development and information security, and the sixth cluster characterizes the level of countries as very low.

References

Kosevich E. Cyber security strategies of Latin America countries. Iberoamerica (Russian Federation). 2020. Vol. 1. P. 137–159. DOI: 10.37656/S20768400-2020-1-07.

Kirilenko V.P., Alexeyev G.V. Political technologies and international conflicts in the information space of the Baltic Sea region. Baltic Region. 2018. Vol. 10. № 4. Р. 20–38. DOI: 10.5922/2079-8555-2018-4-2.

Singh A.N., Gupta M.P. Information Security Management Practices: Case Studies from India. Global Business Review. 2019. Vol. 20. № 1. P. 253–271. DOI: 10.1177/0972150917721836.

Ključnikov A., Mura L., Sklenár D. Information security management in smes: Factors of success. Entrepreneurship and Sustainability Issues. 2019. Vol. 6. № 4. P. 2081–2094. DOI: 10.9770/jesi.2019.6.4(37).

Sadigov M., Kuzmenko O., Yarovenko H. Blockchain technology based system-dynamicsimulation modeling of enterprise’s syber security system. 55th International Scientific Conference on Economic and Social, Baku, Azerbaijan, 18–19 June 2020. Varazdin Development and Entrepreneurship Agency. 2020. Vol. 1/4. P. 399–408. URL: https://www.esd-conference.com/upload/book_of_proceedings/Book_of_Proceedings_esdBaku2020_Vol1_Online.pdf (дата звернення: 20.08.2020).

Dorosh M., Voitsekhovska M., Balchenko I. Research and Determination of Personal Information Security Culture Level Using Fuzzy Logic Methods. 2nd International Conference on Computer Science, Engineering and Education Applications, ICCSEEA 2019, Kiev, Ukraine, 29 March 2019. Advances in Intelligent Systems and Computing. 2019. Vol. 938. P. 503–512. DOI: 10.1007/978-3-030-16621-2_47.

Schmitz C., Pape S. LiSRA: Lightweight Security Risk Assessment for decision support in information security. Computers and Security. 2020. Vol. 90. № 101656. DOI: 10.1016/j.cose.2019.101656.

Yevseiev S., Aleksiyev V., Balakireva S., Peleshok Y., Milov O., Petrov O., Rayevnyeva O., Tomashevsky B., Tyshyk I., Shmatko O. Development of a methodology for building an information security system in the corporate research and education system in the context of university autonomy. Eastern-European Journal of Enterprise Technologies. 2019. Vol. 3. № 9–99. Р. 49–63. DOI: 10.15587/1729-4061.2019.169527.

National Cyber Security Index. NCSI. URL: https://ncsi.ega.ee/ncsi-index (дата звернення: 20.08.2020).

World Development Indicators. The World Bank. URL: https://databank.worldbank.org/source/world-development-indicators/Type/TABLE/preview/on (дата звернення: 20.08.2020).

Kohonen T. Self-Organized Formation of Topologically Correct Feature Maps. Biological Cybernetics. 1982. Vol. 43. № 1. Р. 59–69. DOI: 10.1007/BF00337288.

Kosevich, E. (2020). Cyber security strategies of Latin America countries. Iberoamerica (Russian Federation), 1, 137-159. DOI: 10.37656/S20768400-2020-1-07.

Kirilenko, V.P., Alexeyev, G.V. (2018). Political technologies and international conflicts in the information space of the Baltic Sea region. Baltic Region, 10(4), 20–38. DOI: 10.5922/2079-8555-2018-4-2.

Singh, A.N., Gupta, M.P. (2019). Information Security Management Practices: Case Studies from India. Global Business Review, 20(1), 253–271. DOI: 10.1177/0972150917721836.

Ključnikov, A., Mura, L., Sklenár, D. (2019). Information security management in smes: Factors of success. Entrepreneurship and Sustainability Issues, 6(4), 2081–2094. DOI: 10.9770/jesi.2019.6.4(37).

Sadigov, M., Kuzmenko, O., Yarovenko, H. (2020, June). Blockchain technology based system-dynamicsimulation modeling of enterprise’s syber security system. In proceedings of the 55th International Scientific Conference on Economic and Social (Azerbaijan, Baku, 18–19 June 2020). Varazdin Development and Entrepreneurship Agency, vol. 1/4, pp. 399–408. Available at: https://www.esd-conference.com/upload/book_of_proceedings/Book_of_Proceedings_esdBaku2020_Vol1_Online.pdf (accessed 20 August 2020).

Dorosh, M., Voitsekhovska, M., Balchenko, I. (2019, January). Research and Determination of Personal Information Security Culture Level Using Fuzzy Logic Methods. In proceedings of the 2nd International Conference on Computer Science, Engineering and Education Applications, ICCSEEA 2019 (Ukraine, Kiev, 29 March 2019), Advances in Intelligent Systems and Computing, vol. 938, pp. 503–512. DOI: 10.1007/978-3-030-16621-2_47.

Schmitz, C., Pape, S. (2020). LiSRA: Lightweight Security Risk Assessment for decision support in information security. Computers and Security, 90, no. 101656. DOI: 10.1016/j.cose.2019.101656.

Yevseiev S., Aleksiyev V., Balakireva S., Peleshok Y., Milov O., Petrov O., Rayevnyeva O., Tomashevsky B., Tyshyk I., Shmatko O. (2019) Development of a methodology for building an information security system in the corporate research and education system in the context of university autonomy. Eastern-European Journal of Enterprise Technologies, vol. 3, no. 9–99, pp. 49–63. DOI: 10.15587/1729-4061.2019.169527.

National Cyber Security Index. NCSI. Available at: https://ncsi.ega.ee/ncsi-index (accessed 20 August 2020).

World Development Indicators. The World Bank. Available at: https://databank.worldbank.org/source/world-development-indicators/Type/TABLE/preview/on (accessed 20 August 2020).

Kohonen, T. (1982). Self-Organized Formation of Topologically Correct Feature Maps. Biological Cybernetics, 43 (1), pp. 59–69. DOI: 10.1007/BF00337288.

Article views: 182
PDF Downloads: 177
Published
2020-09-11
How to Cite
Yarovenko, H. (2020). USE OF KOHONEN MAPS TO ANALYZE THE INFORMATION SECURITY LEVEL OF COUNTRIES TAKING INTO ACCOUNT THEIR DEVELOPMENT. Economic Scope, (157), 118-124. https://doi.org/10.32782/2224-6282/157-21
Section
MATHEMATICAL METHODS, MODELS AND INFORMATION TECHNOLOGIES IN ECONOMY