Methods of profiling the behavior of dynamic objects of a critically important information infrastructureстатья