<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.2 20190208//EN" "http://jats.nlm.nih.gov/publishing/1.2/JATS-journalpublishing1.dtd">
<article article-type="research-article" dtd-version="1.2" xml:lang="ru" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"><front><journal-meta><journal-id journal-id-type="issn">2518-1092</journal-id><journal-title-group><journal-title>Research result. Information technologies</journal-title></journal-title-group><issn pub-type="epub">2518-1092</issn></journal-meta><article-meta><article-id pub-id-type="doi">10.18413/2518-1092-2024-9-4-0-4</article-id><article-id pub-id-type="publisher-id">3666</article-id><article-categories><subj-group subj-group-type="heading"><subject>ARTIFICIAL INTELLIGENCE AND DECISION MAKING</subject></subj-group></article-categories><title-group><article-title>&lt;strong&gt;OPTIMIZATION OF THE VOLUME OF TECHNICAL MEANS OF MACHINE LEARNING OF THE INFORMATION PROTECTION SYSTEM OF KEY SYSTEMS OF INFORMATION INFRASTRUCTURE&lt;/strong&gt;</article-title><trans-title-group xml:lang="en"><trans-title>&lt;strong&gt;OPTIMIZATION OF THE VOLUME OF TECHNICAL MEANS OF MACHINE LEARNING OF THE INFORMATION PROTECTION SYSTEM OF KEY SYSTEMS OF INFORMATION INFRASTRUCTURE&lt;/strong&gt;</trans-title></trans-title-group></title-group><contrib-group><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Prokushev</surname><given-names>Yaroslav Evgenievich</given-names></name><name xml:lang="en"><surname>Prokushev</surname><given-names>Yaroslav Evgenievich</given-names></name></name-alternatives><email>prokye@list.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Ponomarenko</surname><given-names>Sergey Vladimirovich</given-names></name><name xml:lang="en"><surname>Ponomarenko</surname><given-names>Sergey Vladimirovich</given-names></name></name-alternatives><email>kaf-otzi-spec@bukep.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Belov</surname><given-names>Alexander Sergeevich</given-names></name><name xml:lang="en"><surname>Belov</surname><given-names>Alexander Sergeevich</given-names></name></name-alternatives><email>belov_as@bsu.edu.ru</email></contrib><contrib contrib-type="author"><name-alternatives><name xml:lang="ru"><surname>Maksimov</surname><given-names>Riyan Renatovich</given-names></name><name xml:lang="en"><surname>Maksimov</surname><given-names>Riyan Renatovich</given-names></name></name-alternatives><email>maksimov.riyan@mail.ru</email></contrib></contrib-group><pub-date pub-type="epub"><year>2024</year></pub-date><volume>9</volume><issue>4</issue><fpage>0</fpage><lpage>0</lpage><self-uri content-type="pdf" xlink:href="/media/information/2024/4/ИТ.НР.9_4_4.pdf" /><abstract xml:lang="ru"><p>The purpose of this article is to consider the information activities of information security systems of information infrastructures of government agencies processing personal data in order to determine the main approaches to optimizing the volume of technical means of the information security system of information infrastructures using machine learning tools, since within the framework of the traditional approach, information protection is focused mainly on heuristic methods and the use of intuitive assessments of changes in the characteristics of information processes as a result of technical protection measures.

Based on the analysis of the organization of information protection of a given level (class) of security of the information system of a government agency, the author substantiates the integrated use of machine learning of the information security system in order to optimally use the functional volume of technical means allocated to ensure a given level (class) of security of the information security system of a government agency processing personal data.

The article proposes a number of new approaches to optimizing the volume of technical means of machine learning of an information infrastructure entity processing personal data.

The considered results made it possible to formulate the problem of modeling and optimizing the volume of technical means of machine learning of the information security system for the information activities of a government agency in the context of counteracting information leakage through technical channels.</p></abstract><trans-abstract xml:lang="en"><p>The purpose of this article is to consider the information activities of information security systems of information infrastructures of government agencies processing personal data in order to determine the main approaches to optimizing the volume of technical means of the information security system of information infrastructures using machine learning tools, since within the framework of the traditional approach, information protection is focused mainly on heuristic methods and the use of intuitive assessments of changes in the characteristics of information processes as a result of technical protection measures.

Based on the analysis of the organization of information protection of a given level (class) of security of the information system of a government agency, the author substantiates the integrated use of machine learning of the information security system in order to optimally use the functional volume of technical means allocated to ensure a given level (class) of security of the information security system of a government agency processing personal data.

The article proposes a number of new approaches to optimizing the volume of technical means of machine learning of an information infrastructure entity processing personal data.

The considered results made it possible to formulate the problem of modeling and optimizing the volume of technical means of machine learning of the information security system for the information activities of a government agency in the context of counteracting information leakage through technical channels.</p></trans-abstract><kwd-group xml:lang="ru"><kwd>information security system</kwd><kwd>optimization of the volume of technical means</kwd><kwd>machine learning</kwd><kwd>key information infrastructure systems</kwd><kwd>conditions for ensuring the required level (class) of protection</kwd><kwd>algorithms for simulation modeling of information procedures and procedures for technical protection of information</kwd></kwd-group><kwd-group xml:lang="en"><kwd>information security system</kwd><kwd>optimization of the volume of technical means</kwd><kwd>machine learning</kwd><kwd>key information infrastructure systems</kwd><kwd>conditions for ensuring the required level (class) of protection</kwd><kwd>algorithms for simulation modeling of information procedures and procedures for technical protection of information</kwd></kwd-group></article-meta></front><back><ref-list><title>Список литературы</title><ref id="B1"><mixed-citation>1. Federal Law No. 149-FZ of July 27, 2006 &amp;laquo;On Information, Information Technologies and Information Protection&amp;raquo;.</mixed-citation></ref><ref id="B2"><mixed-citation>2. Federal Law No. 187-FZ of July 27, 2006 &amp;laquo;On the security of the critical information infrastructure of the Russian Federation&amp;raquo;.</mixed-citation></ref><ref id="B3"><mixed-citation>3. Decree of the Government of the Russian Federation of February 08, 2018 No. 127 &amp;laquo;On approval of the Rules for categorizing objects of critical information infrastructure of the Russian Federation and the list of indicators of criteria for the significance of objects of critical information infrastructure of the Russian Federation and their values&amp;raquo;.</mixed-citation></ref><ref id="B4"><mixed-citation>4. Order No. 21 &amp;laquo;On approval of the composition and content of organizational and technical measures to ensure the security of personal data during their processing in personal data information systems&amp;raquo;. Approved by FSTEC of Russia of 18.02.2013.</mixed-citation></ref><ref id="B5"><mixed-citation>5. Order No. 239 &amp;laquo;On approval of the Requirements for ensuring the security of significant objects of critical information infrastructure of the Russian Federation&amp;raquo;. Approved by FSTEC of Russia of 25.12.2017.</mixed-citation></ref><ref id="B6"><mixed-citation>6. Ponomarenko S.V., Prokushev Ya.Е., Ponomarenko S.A. Information security of critical information infrastructure systems. Monography. Belgorod: BUKEP, 2021. &amp;ndash; 133 p.</mixed-citation></ref><ref id="B7"><mixed-citation>7. Prokushev Ya.Е., Ponomarenko S.V., Ponomarenko S.A. The modeling of information security system design processes in state information systems. Computational Nanotechnology. &amp;ndash; 2021. &amp;ndash; Vol. 8. &amp;ndash; No. 1. &amp;ndash; Pp. 26&amp;ndash;37. (in Russian)</mixed-citation></ref><ref id="B8"><mixed-citation>8. Prokushev Ya.Е., Ponomarenko S.V., Shishov N.V. The modeling of processes of design of information protection systems in critical information infrastructures. Computational Nanotechnology. &amp;ndash; 2022. &amp;ndash; Vol. 9. &amp;ndash; No. 2. &amp;ndash; Pp. 45&amp;ndash;55. (in Russian)</mixed-citation></ref><ref id="B9"><mixed-citation>9. Biryukov M.V., Klimova N.A., Gostishcheva T.V. Cost estimate on implementation of measures, ensuring information security in consumer cooperation organizations // Economics. Information technologies. &amp;ndash; 2020. &amp;ndash; Vol. 47. &amp;ndash; № 1. &amp;ndash; P. 101-109.</mixed-citation></ref><ref id="B10"><mixed-citation>10. Biryukov M.V., Klimova N.A., Gostishcheva T.V. About self-learning machine systems in the process of authorization of users of ATMs // Economics. Information technologies. &amp;ndash; 2020. &amp;ndash; Vol. 47. &amp;ndash; № 2. &amp;ndash; P. 354-361.</mixed-citation></ref><ref id="B11"><mixed-citation>11. Lomazov V.A., Ponomarev D.V., Ponomarenko S.V. Evolutionary synthesis of the hierarchy of estimated indicators of the project in the field of information security // Global scientific potential. &amp;ndash; 2017. &amp;ndash; № 11 (80). &amp;ndash; P.82-85.</mixed-citation></ref><ref id="B12"><mixed-citation>12. Ponomarenko S.V., Biryukov M.V., Klimova N.A. Economic prospects for the use of remote banking technology // Bulletin of the Belgorod University of Cooperation, Economics and Law. Belgorod: BUKEP Publishing House. &amp;ndash; Issue 1 (68) &amp;ndash; 2018.</mixed-citation></ref><ref id="B13"><mixed-citation>13. Prokushev Ya.E., Ponomarenko S.V. Comparative analysis of software and hardware protection of information used in information systems of personal data. Information and Security. &amp;ndash; 2012. &amp;ndash; Vol. 15. &amp;ndash; №. 1. &amp;ndash; Pp.&amp;nbsp;31&amp;ndash;36. (in Russian)</mixed-citation></ref><ref id="B14"><mixed-citation>14. Prokusheva A.P., Prokushev Ya.E. Modeling and optimization of the choice of software and hardware protection of information from the point of view of economic and technical expediency. Information and Security. 2012. &amp;ndash; Vol. 15. &amp;ndash; No. 1. &amp;ndash; Pp. 55&amp;ndash;60. (in Russian)</mixed-citation></ref><ref id="B15"><mixed-citation>15. Mattord H., Whitman M. Management of information security. 6th ed. Cengage Learning, 2019. &amp;ndash; 752 p.</mixed-citation></ref><ref id="B16"><mixed-citation>16. Rohit Tanwar. Information security and optimization. CRC Press, 2021. &amp;ndash; 224 p.</mixed-citation></ref><ref id="B17"><mixed-citation>17. Whitman M.E. et al. PRSCIiples of information security. 6th ed. Cengage Learning, 2017. &amp;ndash; 656 p.</mixed-citation></ref></ref-list></back></article>