Keywords

1 Introduction

The quick development of information technology (IT) made it necessary to pay due attention to ensuring information security (IS) of various objects of informatization (OIN). This solves the problem of ensuring compliance of the state of a specific IT with rapid changes in the landscape of information threats for OIN. This, in turn, reduces the likelihood of risks associated with information threats. In the formation of information security systems (ISS) in many companies, enterprises, and institutions, the greatest attention is paid, as a rule, to the fulfillment of the requirements of the regulatory and methodological framework in the field of information security (IS), defining these requirements as the fundamental basis for the formation of ISS. However, without a suitable degree of investment in the ISS of OIN, these activities, by themselves, do not yet create guarantees of a sufficient level of IP. Nevertheless, the question of the ratio of the costs of building an information security system (ISS) and possible losses from the implementation of information threats in the absence or insufficient reliability is still poorly studied. Taking this into account, the question of determining the amount of investment, that is advisable to invest in the information protection of OIN, should be recognized as still relevant.

An organization can allocate significant resources to ensure the stability and stability of the functioning of corporate information systems, but this does not guarantee the achievement even of the minimum level of security of information resources. The essence of the problem is that in the design and construction of information security systems, the main attention should be paid not to minimizing the impact of a certain list of typical information threats (which is often compiled for a certain imaginary environment for the OIN functioning) but to the search for optimal investment management strategies, including mutual strategies for different ratios of criteria of the investment procedure in the OIN in the context of fuzzy information about investors.

The provision of IS of OIN is possible only through the comprehensive and continuous application of organizational, legal, and technical protection methods at different levels of implementation. In order to develop common approaches in countering cyber threats, to consolidate efforts in the investigation and prevention of cybercrimes, to prevent the use of cyberspace for illegal and military purposes, many leading states [1, 2] have stepped up their participation in organizing joint international projects to build cyber potential, which in fact are examples mutual investment in the OIN.

In this context, Ukraine and Kazakhstan continue to apply European and international standards in the field of cybersecurity, develop the work of relevant bodies that are able to effectively interact with the relevant bodies of the EU and NATO. The experience of Ukraine and Kazakhstan allows them to be not only recipients of assistance from the EU and NATO states but also sources of new knowledge, skills and ways to counter modern cyber threats.

Many experts in the field of cybersecurity have noted that the use of intelligent information systems, which certainly include decision support systems or expert systems for finding the optimal strategy for investing in cybersecurity circuits, can be useful. This primarily concerns multilateral interstate projects. That is, such projects in which the optimal solution should take into account the balance of interests of many players in the investment market of information security systems and cybersecurity. An expert person, no matter how qualified he is, is unable to cover dozens of interrelated factors that can affect the success of investing in such a complex area as information security and cybersecurity [3, 4].

In its turn, the increasing complexity of the architecture of an intelligent system entails the need to apply more complex algorithms and corresponding mathematical models. In such problems, it is impossible to do with simple linear dependencies, which were used 10–15 years ago. Today, it is not enough just to calculate the payback period of investments in information security and cybersecurity projects. It is crucial to take into account dozens of external factors, and most importantly, to realize clearly that the procedure for investing in information protection and cybersecurity circuits takes place in conditions of constant confrontation with the attacker. Moreover, the attacking party of the defense is not bound by any ethical or legislative norms and is aimed at achieving his goals at any cost.

2 Literature Review and Problem

The economic efficiency of the information security system is an important and often a determining indicator of the effectiveness of such systems [3, 4]. A description of the investment model in information security systems and probabilistic models of losses from attacks are proposed in the work [5]. These models allow describing the mathematical expectation and variance of losses for the information security system in an analytical form. On this basis, a methodology has been developed for assessing the effectiveness of investments and economic risk for ISS [3, 4]. As a generalized indicator of investment efficiency, it is proposed to use the degree of risk for a random variable (R.V) of the net present value (NPV) of total costs for the ISS. This measure of risk is equal to the sum of the mathematical expectation of R.V. cost and its standard deviation multiplied by the coefficient k, but it is noted that a necessary condition for the adequate application of stochastic models is the mandatory availability of reliable statistical and expert data on attacks and security measures [4, 5]. And this is not always possible. Therefore, naturally, in relation to the models considered in [3, 5], the question arises about the influence of input data errors on the resulting indicators.

The model proposed in [6] uses optimization methods to analyze the investment levels in cybersecurity measures and insurance for owners of critical infrastructure facilities. This model can be used to develop strategies to minimize cybersecurity risks. However, the authors do not provide a software solution.

In recent years, many researchers have increased interest in the scientific substantiation of the solution to the problem of defining optimal methods for investing in information security systems. Particularly, such fundamental research can be mentioned in [4, 7].

It is shown in [8] that it is possible to achieve a given level of IS of the OIN only by comprehensively solving financial, design, production, organizational, research and other interrelated tasks. Consistency has undoubtedly become an advantage of this approach. However, in the work, the authors did not provide an assessment of the potential for using the DSS in such complex tasks to assure the information security of the OIN.

The model proposed in [3, 4, 9] (hereinafter referred to as the GL model) has become one of the most popular for practical assessment of investment strategies in the IS of the OIN. However, this model, and its numerous modifications [10, 11], do not take into account the real mechanisms of return on investment to investors. This led to the limitations of the practical aspects of the application of this model.

The development of intelligent computing [12] gave a powerful impetus to such an independent direction of applied research as the development of intelligent DSS in the process of choosing optimal strategies for investing in ISS. It should be noted that the results of this research, and particular works [12,13,14], showed that often the proposed ones do not allow generating real recommendations for investors in the information security system. This is especially manifested in situations where there is no clear information about the aspects of investment, for example, the maximum amount of resources allocated for investment projects to create information security information objects of informatization. As the authors admit in [14, 15], the proposed models lack the properties of adaptability. That is, it is necessary to make adjustments to them even with a slight change in the initial parameters and boundary conditions in the process of analyzing investment strategies in projects related to IS and ISS.

In [16, 17], the authors showed that investing in information security should be considered comprehensively from the point of view of various tasks arising in the course of providing information security for the OIN. Investment areas include: anti-virus software (software), firewalls, cryptographic systems, intrusion detection systems; automated backup systems, etc.

The aforementioned necessitated the development of new adaptive models for the DSS [18] in terms of determining optimal strategies for mutual financial investment in ISS projects.

As shown in [19], hackers are often more motivated to achieve their goals, while the defense side is often satisfied only with the return on investment in the information security system. While the defense side can spend huge sums of money on the cybersecurity of OIN, hackers may have to invest only a small portion of their financial resources in the attack, for example, by bribing an unscrupulous employee who is willing to “help” to overcome OIN security perimeters.

Taking into consideration the results presented in [20, 21], it can be stated that the use of intelligent information systems can give a new impetus to seek for solutions in the problems of optimizing investment strategies in information security and cybersecurity systems of complex multi-circuit distributed information systems. Moreover, nowadays such distributed systems often form the basis of the business processes of many companies and organizations around the world. Consequently, the search for mathematical models of the computing core for such intelligent systems is still relevant. And the game theory acts, namely its subsection concerning the description of the quality games procedure as a variant of the solution that has confirmed its functionality.

3 Purpose and Objectives of the Research

The purpose of the work is to develop a model for the module of a computer support system of decision making in the course of discrete mutual investment in ISS on condition of fuzzy information about investors. To achieve the goal, the following tasks are solved:

  • the optimal strategies of investors have been determined for a situation when there is unclear information from the defense party;

  • simulation modeling is performed in the MATLAB environment using the developed online DSS platform for various strategies for investing in information security systems in a fuzzy formulation.

4 Models and Methods

The landscape and scale of cyberattacks force the OIN defense side to prioritize defensive methods and techniques. This means that an organization or an enterprise must take into account the full range of information security threats to which they are exposed. The risks of losing information resources as a result of an attack must also be considered, and actions must be taken to minimize the vulnerabilities that are identified. All of the above tasks are quite difficult. In doing so, bear in mind that: (1) often information security administrators and ISU management do not always have a clear budget for ISS; (2) do not have clear information on the ratio of cost of attack/size of losses; (3) the pans for financing the information security system in the short term is not always defined.

Despite the fact that investments in information security are constantly being given great attention by practitioners and the academic community, the number of cyber incidents, violations of the information security perimeter, and unauthorized intrusions into information systems is steadily increasing.

In most cases, this is due to a lack of understanding of investment strategies in the information security of OIN. And this, in turn, leads to the adoption of erroneous decisions. Such solutions will not be viable in terms of cost/benefit ratio. This is due to the fact that attempts to correct potential vulnerabilities of OIN information systems in “manual mode” in order to avoid information security violations often leads to excessive investments in information security systems.

Let us consider this situation. An investor (player 1 or RG1) in the field of information security (IS) from a state where a stronger currency (VL1) is used in monetary circulation, having free financial resources (hereinafter FRE), strives to accept the most desirable options for its placement in information protection technology, for example, for a national cyber monitoring center in another country. To do this, he must choose a counterparty (player 2 or RG2). The counterparty uses a weaker currency by default −VL2. This situation is typical, for example, when investing in projects to create national information security centers in developing countries.

Investors need to assess the priority of investing their financial resources in such areas of development and relevant technologies that provide IS of OIN (for example, an information security situation center or a monitoring center) as: (1) ensuring the cybernetic stability of OIN; (2) innovative technologies in the tasks of monitoring the risk indicators of the implementation of information threats and ensuring the required level of information security; (3) culture of information security at OIN; (4) information security of the network infrastructure; (5) security of software (software); (6) security of data processing technologies; (7) and others.

The problem of studying strategies for investing in the ISS of OIN can have many different, nonequivalent mathematical formulations. Depending on the setting of the task and the mathematical apparatus used for their analysis, various approaches can be used. This proves the importance of a flexible approach to the mathematical formulation of the problem.

Based on the analysis of the attractiveness of investment strategies for different investors representing different states, as indicated above, the mathematical apparatus of game theory was used.

Conceptually, the interaction of players (hereinafter denoted as \(RG1\) and \(RG2\)) will be described this way: \(RG1\), having some free financial resources (FRE), increases them at time g1 (g1 is the rate of growth of resources RG1). Further, for example, using the DSS, it is decided what part of these resources will be directed to active operations to create a national center for monitoring information security and cyber threats. These operations involve the allocation of resources \(RG1\) in investment projects as a part of building an information security system for OIN. The part of the resource is used to pay off the debt that exists at RG1 in this period of time. We believe that it does the same with respect to RG2. In the proposed model, the following assumptions are made:

  1. (a)

    \(RG1\) FiR \(h\) valued at \(VL1\) (currency 1);

  2. (b)

    \(RG2\) controls the FIR of \(q\) valued at \(VL2\) (currency 2);

  3. (c)

    throughout the interaction, the ratio of \(VL1\) to \(VL2\) (the exchange rate) \(k_{d}\) remains constant; player \(RG1\) has no idea of the financial resources of \(RG2\). He has only information that they belong to the fuzzy set \(\left\{ {X,m\left( . \right)} \right\}.{ }\) Here \(X\) is a subset \(R_{ + } m\left( . \right) -\) function of the second investor's FiR \(q\left( 0 \right)\) value belonging to the set \(X,m\left( {q\left( 0 \right)} \right) \in \left[ {0,1} \right]\) for \(q\left( 0 \right) \in X.\) In addition, at each moment \(t\;\left( {t \in \left[ {0,T} \right]} \right)\) his states are known \(h\left( \tau \right)\) for \(\tau \le t.\) The following conditions are satisfied: \(h\left( \tau \right) > 0\) when condition \(h\left( \tau \right) \succ 0\) is satisfied with reliability \(\ge p_{0} \left( {0 \le p_{0} \le 1} \right)\) and \(h\left( \tau \right) \prec 0\) when condition \(h\left( \tau \right) \prec 0\) is satisfied with reliability \(\prec p_{0}\), and the values of realizations of strategy \(u\left( \tau \right)\left( {\tau \le t} \right),\) allocated for interaction with \(RG2\) are also known.

4.1 A Model Describing Player Interactions

Further in the text of the paper, we will assume, respectively, that the players are designated as RG1 and RG2. The players have their own resources, which they are ready to invest either permanently or for a certain period of time in the information security or cybersecurity systems of the company. Players can have active operations. For example, at certain moments of investment, resources must be directed to active operations. As an example of such an active operation from the point of view of the classical approach of the interacting parties of the investment process, one can point to the mutual repayment of debts that accumulate among the parties during the implementation of information protection projects. The interactions between players and their resources are described by the following system of equations:

$$ \begin{aligned} dh\left( t \right)/dt & = - h^{ + } \left( t \right) + g_{1} \cdot h^{ + } \left( t \right) \\ & \quad + \left[ {\left( {1 - f_{1} \left( t \right)} \right) \cdot \left( {m_{1} \left( t \right) + p_{1} \left( t \right)} \right) - 1} \right] \cdot u\left( t \right) \cdot g_{1} \left( t \right) \cdot h^{ + } \left( t \right) \\ & \quad + \left[ {1 - \left( {m_{2} \left( t \right) + p_{2} \left( t \right)} \right) \cdot \left( {1 - f_{2} \left( t \right)} \right)} \right] \cdot v\left( t \right) \cdot g_{2} \left( t \right) \cdot \frac{{q^{ + } \left( t \right)}}{{k_{d} }}; \\ \end{aligned} $$
(1)
$$ \begin{aligned} dq\left( t \right)/d & t = - q^{ + } \left( t \right) + g_{2} \cdot q^{ + } \left( t \right) \\ & \quad + \left[ {\left( {1 - f_{2} \left( t \right)} \right) \cdot \left( {m_{2} \left( t \right) + p_{2} \left( t \right)} \right) - 1} \right] \cdot v\left( t \right)\left( t \right) \cdot q^{ + } \left( t \right) \\ & \quad + \left[ {1 - \left( {m_{1} \left( t \right) + p_{1} \left( t \right)} \right) \cdot \left( {1 - f_{1} \left( t \right)} \right)} \right] \cdot u\left( t \right) \cdot g_{1} \left( t \right) \cdot h^{ + } \left( t \right) \cdot k_{d} . \\ \end{aligned} $$
(2)

and

$$ h^{ + } = \left\{ {\begin{array}{*{20}c} {h,h \ge 0} \\ {0,h \prec 0} \\ \end{array} } \right\}.,q^{ + } = \left\{ {\begin{array}{*{20}c} {q,q \ge 0} \\ {0,q \prec 0} \\ \end{array} } \right\}. $$

Thus, at time \(t\), the value of \(dh\left( t \right)/dtRG1\) (in \(VL1\)) is equal to:

\(g_{1} \left( t \right) \cdot h^{ + } \left( t \right),\) the amount of interest \(m_{1} \left( t \right) \cdot \left( {1 - f_{1} \left( t \right)} \right) \cdot u\left( t \right) \cdot g_{1} \left( t \right) \cdot h^{ + } \left( t \right)\) for the invested FiR \(RG1\);

\(\left( {1 - f_{1} \left( t \right)} \right) \cdot u\left( t \right) \cdot g_{1} \left( t \right) \cdot h^{ + } \left( t \right)\)—the size of the invested FiR of \(RG1\);

\(p_{1} \left( t \right) \cdot \left( {1 - f_{1} \left( t \right)} \right) \cdot u\left( t \right) \cdot g_{1} \left( t \right) \cdot h^{ + } \left( t \right)\)—the value, which characterizes the share of the “returned” investment resource (hereinafter InR) \(RG1\);

\(\left( {1 - f_{1} \left( t \right)} \right) \cdot u\left( t \right) \cdot g_{1} \left( t \right) \cdot h^{ + } \left( t \right)\)—R \(RG1\) for ISS;

\(\left[ {\left\{ {\left( {1 - p_{2} \left( t \right)} \right) \cdot \left( {1 - \left( {f_{2} \left( t \right)/k_{d} } \right)} \right)} \right\} \cdot v\left( t \right) \cdot g_{2} \left( t \right) \cdot q^{ + } \left( t \right)} \right]\)—the value of the “unrecovered” asset (investment) \(RG2\) (in \(VL1\));

\(\left[ {\left\{ {f_{2} \left( t \right)/k_{d} } \right\} \cdot v\left( t \right) \cdot g_{2} \left( t \right) \cdot q^{ + } \left( t \right)} \right]\)—resources to repay the debt \(RG2\) to \(RG1\).;

\(u\left( t \right) \cdot f_{1} \left( t \right) \cdot g_{1} \left( t \right) \cdot h^{ + } \left( t \right)\)—the resource allocated to pay off the debts incurred by \(RG1\) at time \(t\) to \(RG2\);

\(u\left( t \right) \cdot \left( {1 - f_{1} \left( t \right)} \right) \cdot g_{1} \left( t \right) \cdot h^{ + } \left( t \right)\)—the resource allocated to carry out the investment in ISS OIN at time t;

\(\left\{ {g_{2} \left( t \right) \cdot \left( {1 - \left( {f_{2} \left( t \right)/k_{d} } \right)} \right)} \right\} \cdot v\left( t \right) \cdot g_{2} \left( t \right) \cdot q^{ + } \left( t \right)\)—interest charge for the InR \(of RG2\);

\(\left\{ {\left( {1 - \left( {f_{2} \left( t \right)/k_{d} } \right)} \right)} \right\} \cdot v\left( t \right) \cdot g_{2} \left( t \right) \cdot q^{ + } \left( t \right)\)—InR \(of RG2\).

\(h^{ + } \left( t \right)\) is the value subtracted from this sum.

Similar terms will be for expression (2). Thus, the value of \(dq\left( t \right)/dt\) (in \(VL2\)) at time \(t\) is equal to the sum of such terms:

\(g_{2} \left( t \right) \cdot q^{ + } \left( t \right),\) values of interest \(m_{2} \left( t \right) \cdot \left( {1 - f_{2} \left( t \right)} \right) \cdot v\left( t \right) \cdot g_{2} \left( t \right) \cdot q^{ + } \left( t \right)\) for invested FiR \(RG2\);

\(\left( {1 - f_{2} \left( t \right)} \right) \cdot v\left( t \right) \cdot g_{2} \left( t \right) \cdot q^{ + } \left( t \right)\)—the size of InR \(of RG2\);

\(p_{2} \left( t \right) \cdot \left( {1 - f_{2} \left( t \right)} \right) \cdot v\left( t \right) \cdot g_{2} \left( t \right) \cdot q^{ + } \left( t \right)\)—the value characterizing the share of the “returned” InR \(RG1\) to \(RG2\);

\(\left( {1 - f_{2} \left( t \right)} \right) \cdot v\left( t \right) \cdot g_{2} \left( t \right) \cdot q^{ + } \left( t \right)\)—InR \(RG2\) on ISS;

\(\left( {1 - p_{1} \left( t \right)} \right) \cdot \left( {1 - f_{1} \left( t \right)} \right) \cdot u\left( t \right) \cdot k_{d} \left( t \right) \cdot g_{1} \left( t \right) \cdot h^{ + } \left( t \right)\)—is the value of the “unreturned” asset (investment) in \(RG1\) by player \(RG2\);

\(u\left( t \right) \cdot f_{1} \left( t \right) \cdot k_{d} \left( t \right) \cdot g_{1} \left( t \right) \cdot h^{ + } \left( t \right)\)—is the value characterizing the repayment of \(RG1\) debt to \(RG2\);

\(v\left( t \right) \cdot f_{2} \left( t \right) \cdot g_{2} \left( t \right) \cdot q^{ + } \left( t \right)\)—is the amount allocated to \(RG2\) to repay the debt it has owed to \(RG1\) at time \(t\);

\(\left( {1 - f_{2} \left( t \right)} \right) \cdot v\left( t \right) \cdot g_{2} \left( t \right) \cdot q^{ + } \left( t \right)\)—the value allocated by \(RG2\) to make investments in ISS at time \(t\);

\(m_{1} \left( t \right) \cdot \left( {1 - f_{1} \left( t \right)} \right) \cdot k_{d} \left( t \right) \cdot u\left( t \right) \cdot g_{1} \left( t \right) \cdot h^{ + } \left( t \right)\)—is the percentage charge for the InR \(RG1\);

\(\left( {1 - f_{1} \left( t \right)} \right) \cdot u\left( t \right) \cdot g_{1} \left( t \right) \cdot h^{ + } \left( t \right)\)—InR \(of RG1\).

The value of \(q^{ + } \left( t \right)\) is subtracted from this amount;

The interaction ends when the conditions are met:

$$ \begin{aligned} \left( {h\left( t \right),q\left( t \right)} \right) \in S_{0} & = \left\{ {\left( {(h\left( t \right),\;q\left( t \right) \in S_{0}^{*} ,{\text{with reliability}}} \right.} \right. \\ & \quad \left. { \ge p_{0} ,{ }\left( {h\left( t \right),q\left( t \right)} \right) \in S_{1}^{*} ,{\text{with reliability}} \ge p_{0} } \right\} \\ \end{aligned} $$
(3)
$$ \begin{aligned} \left( {h\left( t \right),q\left( t \right)} \right) \in F_{0} & = \left\{ {\left( {\left( {(h\left( t \right),\;q\left( t \right)} \right) \in S_{0}^{*} ,{\text{with reliability}} \prec p_{0} ,} \right.} \right. \\ & \quad \left. {{ }\left( {h\left( t \right),q\left( t \right)} \right) \in S_{1}^{*} ,{\text{with reliability}} \prec p_{0} } \right\} \\ \end{aligned} $$
(4)

where

$$ \begin{aligned} S_{0}^{*} & = \left\{ {\left( {h,q} \right):\left( {h,q} \right) \in R_{ + }^{2} ,h > 0} \right\}, \\ S_{1}^{*} & = \left\{ {\left( {h,q} \right):\left( {h,q} \right) \in R_{ + }^{2} ,q = 0} \right\}, \\ \end{aligned} $$

If it turns out that condition (Eq 3) is fulfilled, then we will say that in the process of investing in the ISS of OIN has achieved the desired result with confidence \( p \ge p_{0}\) and the procedure is completed.

If it turns out that the condition (Eq 4) is fulfilled, then we will say that in the procedure of investing in the SPI, the SPI has achieved the desired result with confidence \(p \succ 1 - p_{0}\) and the process is completed.

If both condition (Eq 3) and condition (Eq 4) are not carried out, then the process of investing in ISS of OIN continues further.

Define the function \(F\left( . \right):X \to R_{ + } ,_{{}} F\left( x \right) = \left\{ {\sup_{{}} m\left( y \right){\text{ for }}y \le x} \right\}\).

Denote by \(\Phi\) the set of such functions, by \(T^{*} = \left[ {0,T} \right],\)—the time segment.

Strategy of \(RG1\) is the rule that allows him to determine the amount of FiR based on the available information, that \(RG1\) allocates to invest in ISS of OIN.

The second player \(RG2\) chooses his plan \(v\left( . \right)\) on the base of any information that is available.

The first player RG1 tries to figure out the set of his initial states. The set of such states and the preference set of the first player \(W_{1}\) are presented [21]. Then, the plans of the first player will be called as his optimal plans. The goal of the first player is \(RG1{ }\) to find the preference set and to find his strategies. Applying them he will obtain the fulfillment of condition (3).

The formulated game model corresponds to the classification of the decision making theory and the problem of decision making in terms of fuzzy information. In order to describe the preference sets of \(RG1\) it is crucial to include the value:

$$ \begin{aligned} & \phi \left( 0 \right) = \inf \{ \phi^{\prime}\} , \\ & F\left( {\phi^{\prime}} \right) \ge p_{0} . \\ \end{aligned} $$

Further, the solutions are made, i.e., “preference” sets \(Z_{1}\) and optimal strategies \(u_{*} \left( . \right)\) with all game parameter ratios. It is the set of such initial states \(\left( {h\left( 0 \right),\phi \left( 0 \right)} \right).{\text{I}}\) If the game starts from them, there exists a plan of \(RG1\), which, for any realizations of plan \(RG2\), “leads” at time \(t\) of the system state \(\left( {h\left( 0 \right),\phi \left( 0 \right)} \right)\) in which condition (3) will be accomplished. In that case, \(RG2\) is lack of the strategy that can “lead” to the fulfillment of condition (4), at one of the previous times.

The paper touches on the following issue. How to determine the time of possible loss of capitals (i.e., INR) with a given degree of confidence using information about the initial FiR(capitals), the exchange rate, the growth rate of resources of RG1 and RG2, percentage rates on allocated capitals, levels of payable and receivable debts, fuzzy information on FiR of the second player related to the use of new information security technologies, and cybersecurity?

We have used the apparatus of the theory of multistep quality games as a toolkit to find out the problem [21, 22]. This method allows determining the areas of possible initial states of resources (capitals) of parties. Therefore, we assume that the objects have the following property: if the interaction begins from these states, then the loss of capital is possible at time t either by one side of the party or by the other, and it gives the answer to the given question. A multistep quality game with two quality surfaces has been defined in order to find such areas. The solution involves the determination of the preferences of the parties. Furthermore, the optimal strategies of the parties have been revealed while investing in the OIN information security system (using the example of an international situational center on information security).

Within the framework of the research, we have made an attempt to consider a plain option for interaction allowing us to draw qualitative conclusions about the financial condition of the subjects. And it can also be quite easily applied algorithmically in any high-level programming language.

4.2 The Solution of the Problem

The solution of the problem consists of finding the preference set and its optimal strategies (the problem from the first ally player’s point of view [21, 23]). Similarly, the problem is set from the point of view of the second ally player. Due to the symmetry of the problem statement, it is sufficient to solve the problem from the viewpoint of the first allied player. Solving the problem from the second allied player’s point of view is similar.

The solution to Problem 1 is found using the toolkit of the theory of multistage games with complete information [24], which allows finding the solution to the game for various ratios of the game parameters. Let us give the solution to the game, i.e., sets of preferences and optimal strategies \(RG1\).

Suppose that the conditions are carried out at any time \(t\):

$$ \begin{aligned} g_{1} \left( t \right) & = g_{1} ;\quad g_{2} \left( t \right) = g_{2} ; \\ &f_{1} \left( t \right) = f_{1} ;\quad f_{2} \left( t \right) = f_{2} ;\quad p_{1} \left( t \right) = p_{1} ;\quad p_{2} \left( t \right) = p_{2} . \\ \end{aligned} $$

Denote through \( z_{1} \;\& \;z_{2}\) the following quantities:

$$ z_{1} = \left( {1 - f_{1} } \right) \cdot \left( {m_{1} + p_{1} } \right) - 1,{ }z_{2} = \left( {1 - f_{2} } \right) \cdot \left( {m_{2} + p_{2} } \right) - 1. $$

There are four possible cases:

$$ \begin{aligned} & a)\quad z_{1} \ge 0;\quad z_{2} \ge 0;\quad b)\quad z_{1} \prec 0;\quad z_{2} \prec 0; \\ & c)\quad z_{1} \succ 0;\quad z_{2} \le 0;\quad d)\quad z_{1} \le 0;\quad z_{2} \succ 0. \\ \end{aligned} $$

Let us give the solution to the game, i.e., a set of preferences \(W_{1}\) and optimal strategies of the first player.

For the case a) we have:

$$ W_{1} = \left\{ {\left( {h\left( 0 \right),\phi \left( 0 \right)} \right):\left( {h,\phi } \right) \in {\text{int}}\,R_{ + }^{2} ,\;\phi \left( 0 \right) < w^{*} \cdot h\left( 0 \right)} \right\} $$
(5)

for

$$ w^{*} = \left\{ {\begin{array}{*{20}c} { - \left[ {z_{2} \cdot g_{2} + g_{2} - z_{1} \cdot g_{1} - g_{1} } \right]/\left[ {2z_{2} \cdot g_{2} } \right] + } \\ {\sqrt[2]{{\left\{ {\left\{ {\left[ {z_{2} \cdot g_{2} + g_{2} - z_{1} \cdot g_{1} - g_{1} } \right]/2z_{2} \cdot g_{2} } \right\}^{2} + \left( {z_{1} \cdot g_{1} } \right)/\left( {z_{2} \cdot g_{2} } \right)} \right\}}}} \\ \end{array} } \right\}; $$
(6)

\(u_{*} \left( {h,\phi } \right) = \left\{ {1,\;\phi < w \cdot h,\;\left( {h,\phi } \right) \in {\text{int}} R_{ + }^{2} } \right\}\) is not defined, else}.

In case (b) and (c) the quantity of \(W_{1}\) is empty.

In case (c) and \(g_{2} > g_{1} + z_{1} \cdot g_{1}\) we get

$$ W_{1} = \left\{ {\left( {h\left( 0 \right),\phi \left( 0 \right)} \right):\left( {h\left( 0 \right),\phi \left( 0 \right)} \right) \in {\text{int}} R_{ + }^{2} ,\;\phi \left( 0 \right) < \delta \cdot h\left( 0 \right)} \right\}. $$
(7)

For \(\delta = \left( {z_{1} \cdot g_{1} } \right)/\left( {g_{2} - z_{1} \cdot g_{1} - g_{1} } \right);\) \(u_{*} \left( {h,\phi } \right) = \left\{ {1,\phi < \delta \cdot h,\;\left( {h,\phi } \right) \in {\text{int}} R_{ + }^{2} } \right\}\), is not defined, else

In case c) and \(g_{2} \le g_{1} + z_{1} \cdot g_{1}\) we have:

$$ W_{1} = {\text{int}} R_{ + }^{2} ,\;u_{*} \left( {h,\phi } \right) = \left\{ {1,\left( {h,\phi } \right) \in {\text{int}} R_{ + }^{2} } \right\}, $$
(8)

is not defined, else.

Problem 2 is defined symmetrically (from the second ally player’s standpoint).

5 Imitation (Simulation) Experiment

In order to illustrate the results of the calculation, they are carried out for the data that are adopted for the information protection and cybersecurity systems of the situation center of the Ministry of Transport of Kazakhstan. This center is a vivid example of investment interaction in the field of information protection and cybersecurity of many states, including Kazakhstan, China, countries of the European Union, etc. Simulation modeling is performed in the MATLAB package. Some of the outcomes obtained during the simulation are illustrated in Figs. 1 and 2.

Fig. 1
figure 1

Computational experiment No.1

Fig. 2
figure 2

Computational experiment No.2

In the graphs Figs. 1 and 2, h-axis means “million” $ (in our case VL1). In Fig. 1, the tangent of the angle is equal to “2.” In Fig. 2, the tangent of the angle is “3.” Axis \(\phi\) means million in local currency (e.g., Kazakhstan tenge or Ukraine hryvnia). In Figs. 1 and 2, the trajectories of investors are illustrated. In Fig. 1, the trajectory is in the preference area of the second investor and shown by a green dashed line with round green markers (line number 1). In Fig. 2, the trajectory of investors follows the ray of balance, which is the boundary of the preference area of the first investor, shown by a blue dotted line with markers in the form of rhombuses (line number 1). The balance beams are shown in Figs. 1 and 2 in red solid line with red round markers.

Figure 3 describes an example of the implementation of the proposed model on the online DSS platform.

Fig. 3
figure 3

General view of the DSS

Figure 3a shows an example of a solution describing the ratio of players’ resources for a situation in which the trajectory (shown by the yellow line) of the first investor’s movement is located in his area of preference.

Figure 3b shows histograms of step-by-step changes in the size of the FiR of the players for the first investor in red for the second in green.

6 Discussion

Thus, a new model is presented that describes the investment process in information security and cybersecurity systems of an informatization object. The model is based on the apparatus of game theory. The graphs in Figs. 1 and 2 are the results demonstrating the effectiveness and functionality of the game model. The graphs in Fig. 1 correspond to simulation experiment number 1. For this experiment, a result was obtained that would be typical for situations when RG2 player used the non-optimal behavior of RG1 at the initial time. If the trajectory moves under the balance beam (red line), then on the contrary, RG1 used the non-optimal behavior of RG2. Such a graph is not shown in the paper. But a situation is possible when the actions of the players and their investment strategies satisfy both parties. It will be a balanced investment strategy for both parties. In the case of a balanced strategy, both players and their investment trajectories will coincide with the balance beam.

To confirm the functionality of the proposed model, the obtained results were compared with other approaches that various authors proposed [6, 8,9,10, 25]. The outcomes achieved by us were close enough. However, the complexity of calculations is less in accordance with our model. It has taken 11–14% of less time to obtain data than, for example, the models described in the works [8,9,10].

7 Conclusions

As part of the study, the following tasks have been solved:

A model of the process of continuous mutual investment of projects in the sphere of information security and information protection within the framework of a scheme with fuzzy information has been developed. The model has served as the core of the computing module of the intelligent support system in the analysis of various investment strategies in information protection systems of information objects. The model is based on the application of the tools of a quality game surfaces in case when the information support of investors is given by means of fuzzy sets;

Simulation experiments have been carried out in the MATLAB simulation environment;

The online platform of the decision making support system for investors is described while choosing a strategy of investing in ISS of OIN.