Application of tensor methodology and cluster analysis in modeling processes related to the assessment of the functional state of critical information infrastructure objects under destructive electromagnetic impacts
https://doi.org/10.21869/2223-1536-2025-15-4-175-191
Abstract
The purpose of the research is to substantiate the possibility of using the tensor and cluster analysis methodology to simulate the processes associated with the assessment of the functional state of critical information infrastructure (CII) objects in conditions of destructive electro-magnetic influences that cause functional damage to the microelectronic component of the information processing tools (routers, controls, computer equipment and monitoring) critical information infrastructure.
Methods. A systematic approach was used to model processes, as well as methods of tensor and cluster analysis in the framework of assessing the functional state of objects of critical information infrastructure in conditions of destructive effects. The integration of these approaches makes it possible to optimize the parameters of networks and communication nodes, as well as to increase their resistance to non-smooth destructive effects.
Results. A mathematical model has been developed to describe the state of the critical information infrastructure, based on the principles of tensor and cluster analysis, as well as on the hierarchical procedure for "degradation of the critical information infrastructure by watering" under conditions of destructive electromagnetic exposure. The proposed model is intended for the formation and implementation of decisive rules aimed at ensuring the stable functioning of critical information systems.
Conclusion. Based on the study, the possibility of applying tensor and cluster analysis to process modeling was proved related to the assessment of the functional state of critical information infrastructure objects under conditions of destructive electromagnetic influences and the hierarchical procedure of "degradation of critical information infrastructure by absorption" with the formulation and implementation of decisive rules during the investigated process, that will make it possible to subsequently apply the developed models and methods to increase protection of object elements and critical information infrastructure from individual external destructive electromagnetic effects.
About the Author
A. A. DvilianskiyРоссия
Alexey A. Dvilyansky, Candidate of Sciences (Engineering), Associate Professor, Associate Professor at the Department of Geoformation Systems
78 Vernadsky Ave., Moscow 119454
References
1. Maksimova E.A. Methods of identification and identification of sources of destructive impacts of infrastructural genesis. Elektronnyi setevoi politematicheskii zhurnal «Nauchnye trudy KubGTU» = Online journal of political science Scientific "Papers of Kuban State Technological University". 2022;(2):86–99. (In Russ.)
2. Maksimova E.A. Model of states of subjects of critical information infrastructure under destructive influences in a static mode. Trudy uchebnykh zavedenii svyazi = Proceedings of Educational Institutions of Communications. 2021;7(3):65–72. (In Russ.)
3. Dviliansky A.A., Ivanov V.A. Methodology for assessing the integrated protection of infocommunication system facilities from the effects of destructive electromagnetic radiation. Orel: Akademiya FSO Rossii; 2018. 230 p. (In Russ.)
4. Ivanov V.A., Dviliansky A.A., Ivanov I.V., Gondarenko E.A., et al. The role and place of electromagnetic weapons in the implementation of an offensive strategy in an information special operation. Tekhnika sredstv svyazi = Means of Communication Equipmen. 2022;(3):62–73. (In Russ.)
5. Sundeev P.V. Cluster model of distributed registry protection. Voprosy kiberbezopasnosti = Cybersecurity issues. 2025;(4):2–8. (In Russ.) https://doi.org/10.21681/2311-3456-2025-4-2-8
6. Lemeshko O., Papan J., Yeremenko O., Yevdokymenko M., Segec P. Research and Development of Delay-Sensitive Routing Tensor Model in IoT Core Networks. Sensors (Basel). 2021;(21):3934. https://doi.org/10.3390/s21113934
7. Gavdan G.P., Vavichkin A.N., Ivanenko V.G., Kuleshova Yu.D., Rybalko E.P. Sustainability of technological processes in the aspect of security of critical information infrastructure. Bezopasnost' informatsionnykh tekhnologii = IT Security = Information Technology Security = IT Security. 2023;30(2):32–52. (In Russ.) https://doi.org/10.26583/bit.2023.2.02
8. Dviliansky A.A., Ivanov V.A., Rytov M.Yu., E.A. Gondarenko, Guryev G.V. Mathematical model of the state of networks and communication nodes in the algebraic space of a tensor field when they are affected by an electromagnetic pulse. Intellektual'nye sistemy v proizvodstve = Intellectual systems in production. 2023;21(2):102–109. (In Russ.)
9. Dviliansky A.A., Ivanov V.A., Konyshev M.Yu. Ergooptimization of the system for ensuring the functional stability of critical information infrastructure facilities under conditions of destructive electromagnetic influence. Ergodizain = Ergodesign. 2021;(12):118–125. (In Russ.)
10. Weisfeld M. The object-oriented approach. Saint Petersburg: Piter; 2020. 256 p. (In Russ.)
11. Beketov S.M., Zubkova D.A., Gintsyak A.M., Burlutskaya Zh.V., Redko S.G. Modern optimization methods and features of their application. Russian Technological Journal. 2025;13(4):78–94. (In Russ.)
12. Yusupbekov N.R., Gulyamov Sh.M., Tarasov V.B., Usmanova N.B., Doschanova M.Y. Distributed information space as an associative environment of infocommunication network structures. Promyshlennye ASU i kontrollery = Industrial ACS and controllers. 2019;(3):20–29. (In Russ.)
13. Tamm Yu.A. Optimization of the placement of new backbone hub stations with the structural expansion of the existing infocommunication network. Proektirovanie i tekhnologiya elektronnykh sredstv = Design and technology of electronic devices. 2019;(2);20–24. (In Russ.)
14. Dviliansky A.A. Mathematical method of modeling damage caused to objects of critical information infrastructure when exposed to destructive electromagnetic radiation. Promyshlennye ASU i kontrollery = Industrial ACS and controllers. 2019;(8):45–51. (In Russ.)
15. Dviliansky A.A. Numerical method for optimizing economic costs in the framework of ensuring the functional stability of critical information infrastructure facilities under the influence of electromagnetic pulses. Promyshlennye ASU i kontrollery = Industrial ACS and controllers. 2019;(9):54–59. (In Russ.)
16. Odoevsky S.M., Lebedev P.V. Methodology for assessing the stability of the technological management system of a special-purpose infocommunication network with a given topological and functional structure. Sistemy upravleniya, svyazi i bezopasnosti = Systems of Control, Communication and Security. 2021;(1):152–189. (In Russ.)
17. Rytov M.Y., Egemepko V.T., Dvilyansky A.A., Gorlov A.P., Tretyakov O.V., Gulak M.L. A way to ensure the Reliability of Information Portals of Regional Executive Authorities. International Journal of Innovative Technology and Exploring Engineering. 2019;8(6S3):614–617
18. Semenov S.S., Belov A.S., Volovikov V.S., Skubyev A.V. Methodology for substantiating the required level of durability of communication network equipment in conditions of external destructive influences. Sistemy upravleniya, svyazi i bezopasnosti = Systems of Control, Communication and Security. 2019;(1):33–53. (In Russ.) https://doi.org/10.24411/2410-9916-2019-10102
Review
For citations:
Dvilianskiy A.A. Application of tensor methodology and cluster analysis in modeling processes related to the assessment of the functional state of critical information infrastructure objects under destructive electromagnetic impacts. Proceedings of the Southwest State University. Series: IT Management, Computer Science, Computer Engineering. Medical Equipment Engineering. 2025;15(4):175-191. (In Russ.) https://doi.org/10.21869/2223-1536-2025-15-4-175-191
JATS XML


