Systems and Means of Informatics
2024, Volume 34, Issue 3, pp 3-13
FUNCTIONAL SAFETY MONITORING OF LARGE SERVICE SYSTEMS
- A. A. Grusho
- N. A. Grusho
- M. I. Zabezhailo
- A. A. Zatsarinny
- D. V. Smirnov
- E. E. Timonina
Abstract
The functional purpose of information support of the organization’s activities can be described in the form of a set of business processes. The article deals with monitoring the sustainability of the implementation on one platform of a large number of business processes for servicing a large number of customers, requesting a large number of different services at the same time, and requiring partial modification of business functions in real time. The consequence of these conditions is a significant number of conflicts, errors, and failures at different levels of implementation of the same services under time constraints. Business process monitoring is designed to identify and classify conflicts, errors, and failures for further management decision-making. In the article, the collection of functional, behavioral, structural, and information models of all business processes of the organization together with models and models of connected support is called organization metadata. Metadata are the basis for organizing current management and future development. The tasks of dividing the system into subsystems for organizing monitoring of functional security and using monitoring data to determine the root cause of the failure have been solved.
[+] References (15)
- GOST R 59504-2021/IEC TR 61511-4:2020. 2021. Bezopasnost’ funktsional’naya. Sistemy bezopasnosti pribornye dlya promyshlennykh protsessov. Chast’ 4. Poyasnenie i obosnovanie izmeneniy, vnesennykh v MEK 61511-1 iz izdaniya 1 v izdanie 2 [Functional safety. Safety instrumented systems for the process industry sector. Part 4. Explanation and rationale for changes in IEC 61511-1 from Edition 1 to Edition 2]. Moscow: Standardinform Publs. 41 p.
- GOST R ISO 22301-2014. 2015. Sistemy menedzhmenta nepreryvnosti biznesa. Obshchie trebovaniya [Business continuity management systems. Requirements]. Moscow: Standardinform Publs. 38 p.
- Belous, A. I., and V.A. Solodukha. 2021. Osnovy kiberbezopasnosti. Standarty, kontseptsii, metody i sredstva obespecheniya [Fundamentals of cybersecurity. Standards, concepts, methods, and means of support]. Moscow: Tekhnosfera. 482 p.
- Grusho, A., E. Timonina, and S. Shorgin. 2017. Security models based on stochastic meta data. Analytical and computational methods in probability theory. Eds. V.V. Rykov, N. D. Singpurwalla, and A. M. Zubkov. Lecture notes in computer science ser. Cham: Springer. 10684:388-400. doi: 10.1007/978-3-319-71504-9-32.
- Grusho, A. A., M.I. Zabezhailo, N. A. Grusho, and E.E. Timonina. 2018. Informatsionnaya bezopasnost’ na osnove metadannykh v komponentno-integratsionnykh arkhitekturakh informatsionnykh sistem [Information security on the basis of meta data in enterprise application integration architecture of information systems]. Siste- my i Sredstva Informatiki — Systems and Means of Informatics 28(2):34-41. doi: 10.14357/08696527180203. EDN: XNXXIL.
- Samuylov, K.E., A. V. Chukarin, and N. V. Yarkina. 2009. Biznes-protsessy i informatsionnye tekhnologii v upravlenii telekommunikatsionnymi kompaniyami [Business processes and information technologies in management of the telecommunication companies]. Moscow: Alpina Pabls. 442 p.
- Raciti, M., and S. Nadjm-Tehrani. 2013. Embedded cyber-physical anomaly detection in smart meters. Critical information infrastructures security. Eds. B. M. Hammerli, N. Kalstad Svendsen, and J. Lopez. Lecture notes in computer science ser. Cham: Springer. 7722:34-45. doi: 10.1007/978-3-642-41485-5_4.
- Tpndel, I. A., M. G. Jaatun, and M.B. Line. 2013. Threat modeling of AMI. Critical information infrastructures security. Eds. B. M. Hammerli, N. Kalstad Svendsen, and J. Lopez. Lecture notes in computer science ser. Cham: Springer. 7722:264-275. doi: 10.1007/978-3-642-41485-5-23.
- Grusho, A. A., N. A. Grusho, M. I. Zabezhailo, and E. E. Timonina. 2021. Udalennyy monitoring rabochikh protsessov [Remote monitoring of workflows]. Informatika i ee Primeneniya — Inform. Appl. 15(3):2-8. doi: 10.14357/19922264210301. EDN: VWANOS.
- Grusho, A., N. Grusho, M. Zabezhailo, E. Timonina, and V. Senchilo. 2021. Metadata for root cause analysis. Communications ECMS 35(1):267-271. doi: 10.7148/2021 - 0267.
- Nan, C., and I. Eusgeld. 2011. Exploring impacts of single failure propagation between SCADA and SUC. Conference (International) on Industrial Engineering and Engineering Management Proceedings. Piscataway, NJ: IEEE. 1564-1568. doi: 10.1109/IEEM.2011.6118180.
- Grusho, A. A., M.I. Zabezhailo, A. A. Zatsarinny, A. V. Nikolaev, V. O. Piskovski, and E. E. Timonina. 2017. Klassifikatsiya oshibochnykh sostoyaniy v raspredelennykh vychislitel’nykh sistemakh i istochniki ikh vozniknoveniya [Erroneous states classification in dictributed computing systems and sources of their occurrence]. Sistemy i Sredstva Informatiki — Systems and Means of Informatics 27(2):29-40. doi: 10.14357/08696527170203. EDN: YPJBAP.
- Agrawal, R., D. Gunopulos, and F. Leymann. 1998. Mining process models from workflow logs. Advances in database technology. Eds. H. J. Schek, G. Alonso, F. Saltor, and I. Ramos. Lecture notes in computer science ser. Berlin, Heidelberg: Springer. 1337:467-483. doi: 10.1007/BFb0101003.
- Grusho, A. A., E. E. Timonina, N. A. Grusho, and I. Yu. Teryokhina. 2020. Vyyavlenie anomaliy s pomoshch’yu metadannykh [Identifying anomalies using metadata]. Informatika i ee Primeneniya — Inform. Appl. 14(3):76-80. doi: 10.14357/ 19922264200311. EDN: BGYULM.
- Banerjee, J., A. Sen, and C. Zhou. 2017. On auxiliary entity allocation problem in multi-layered interdependent critical infrastructures. Critical information infrastructures security. Eds. G. Havarneanu, R. Setola, H. Nassopoulos, and S. Wolthusen. Lecture notes in computer science ser. Cham: Springer. 10242:25^7. doi: 10.1007/978- 3-319-71368-7_3.
[+] About this article
Title
FUNCTIONAL SAFETY MONITORING OF LARGE SERVICE SYSTEMS
Journal
Systems and Means of Informatics
Volume 34, Issue 3, pp 3-13
Cover Date
2024-10-30
DOI
10.14357/08696527240301
Print ISSN
0869-6527
Publisher
Institute of Informatics Problems, Russian Academy of Sciences
Additional Links
Key words
information support of business processes; functional safety monitoring; large service systems; metadata
Authors
A. A. Grusho , N. A. Grusho , M. I. Zabezhailo , A. A. Zatsarinny , D. V. Smirnov , and E. E. Timonina
Author Affiliations
Federal Research Center "Computer Science and Control", Russian Academy of Sciences, 44-2 Vavilov Str., Moscow 119333, Russian Federation
Sberbank of Russia, 19 Vavilov Str., Moscow 117999, Russian Federation
|