P. D. Zegzhda, V. G.Anisimov, P.V. Semianov,
E. G. Anisimov, T. N. Saurenko T. N..
Annotation:Methodological approach to evaluating the effectiveness of information protection in the information and control subsystem of a complex dynamic system is offered. As a performance indicator it is proposed to use the degree of opportunity implementation driven dynamic system in view of prevention of damage, expressed in the change life cycle management from destructive influences that violates the completeness, integrity, precision, reliability, accessibility and efficiency of processing required for managerial decision-making information.
Keywords:Management of a Complex Dynamic System, Information and Control Subsystem, Information Protection, Efficiency.
D. S. Lavrova, N. N.Eliseev
Annotation:An approach to detecting computer attacks is proposed, which consists in identifying abnormal network traffic using Tsetlin machine. Experimental studies conducted for various types of network attacks have demonstrated the effectiveness of the proposed approach.
Keywords:Network Attacks, Network Traffic Classification, Tsetlin Machine, Tsetlin Automate.
I. V. Alekseev, P. D. Zegzhda
Annotation:This paper provides an overview of network attacks and vulnerabilities of TCP / IP model. The purpose of this study is to identify the most common types of vulnerabilities for network protocols. So, for example, the ability to change the values of the IP address field to the victim's address is not vulnerability that is not accepted by the protocol specification, but the misuse of flags fragmentation – is a vulnerability.
Keywords:Network Attacks, TCP/IP Model, Vulnerability Search, Network Security.
V. I. Korzhik, D. C.Nguyen, K. A. Akhrameeva
Annotation:Two methods for cipher modification, which can be used to pre-embed messages are proposed. These modifications preserve the cryptographic resistance of the embedded messages, but violate the pseudo-randomness of cryptograms, which protects stegosystem from detection based on the use of NIST tests. The experimental results on the stegosystem detection efficiency after cipher modification and depending on the embedding rate are also presented.
Keywords:Block Cipher, Stegosystem, Pseudo Randomness, NIST Tests, Deflate Compression Algorithm, Arithmetic Coding.
M. V. Shakurskiy
Annotation:Important task of designing a steganographic system is the selection of a key. The main requirement for the key is to ensure consistently high sensitivity of the system to the key variation and minimum change in this sensitivity during the formation of the container. The paper provides an analysis of the invariant two-component steganographic system in terms of sensitivity to variations in various parameters and values of embedded signals.
Keywords:Two-Component Steganographic System, Invariance to Masking Signal, Steganographic Container, Key Coefficient.
E. B. Aleksandrova, I. S. Rekhviashvili, A. V. Yarmak
Annotation:A ring signature-based group authentication mechanism with linking-based revocation is proposed. The possibility of using this approach in Smart Grid as an example of industrial Internet of Things systems is discussed.
Keywords:Authentication, Industrial Internet of Things, Ring Signature, Linking-Based Revocation, Lattices.
Annotation:Task relevance of protecting critical facilities is determined. The technological process of designing physical protection systems for critical facilities is considered. For each stage of the design, solvable problems and problems are considered. Based on the analysis, possible directions for solving these problems are proposed.
Keywords:Design of Physical Protection Systems, Critically Important Object.
I. A. Sikarev, V. V. Sakharov, A. V. Garanin
Annotation:Types of electromagnetic interference affecting the communication channels of an unmanned vessel are described. The interference is classified according to their source, spectral and temporal characteristics. The approach to evaluating the noise immunity characteristics of transponders for unmanned vessels is described.
Keywords:Global Navigation Satellite System, Unmanned Navigation, Automated Vessel Traff Control Systems.
M. A. Poltavtseva
Annotation:Сyber-physical system is considered as an object of information security management. The corresponding threat model from the point of view of the automatic control theory is presented. The characteristics of security monitoring are proposed.
Keywords:Information Security, Cyber-Physical Systems, CFS, Threat Model, Monitoring, Security Management.
V. M. Krundyshev
Annotation:Use of modern artificial neural networks to detect cyber threats in the networks of the industrial Internet of Things is proposed. The modeling of the industrial system under the influence of cyberattacks has been carried out. As a result of the experiments, the optimal configuration parameters of a recurrent LSTM network with a confirmed number of layers and states were determined.
Keywords:Artificial Intelligence, Cyber Threats, Neural Networks, Industrial Systems, IIoT, LSTM.
M. E. Sukhoparov, V. V. Semenov, K. I. Salakhutdinova, I. S. Lebedev
Annotation:Problem of detecting the abnormal functioning of «Industry 4.0» devices based on behavioral patterns using acoustic channel information is explored. The possibility of using external systems for monitoring the status of objects under the influence of threats to information security breaches is considered. An experiment was conducted aimed at analyzing the status of «Industry 4.0» devices in normal and abnormal operating modes.
Keywords:Behavioral Patterns, Acoustic Channel, Industry 4.0 Devices, Information Security Monitoring Systems, Signal Analysis.
E. A. Popova, V. V. Platonov
Annotation:Analysis of feature selection methods of network traffic is provided. A prototype of an attack detection system with a module for network traffic feature selection is developed. The method of network traffic feature selection is proposed. The accuracy and time of detecting network attacks by proposed prototype was assessed.
Keywords:Intrusion Detection System, Networks Attacks Detection, Feature Selection of Network Traffic, Genetic Algorithm.
K. V. Vasilieva, E. Yu. Pavlenko, P.V. Semianov
Annotation:The paper reviews the main trends of modern cars’ infrastructure. It discusses modern attacks, which are possible now due to implementation of V2X and IVI technologies, and the main methods for their detection and prevention are analyzed. Considers their possibility and limitation of addressing the described problem. A set of requirements for the new information security method, suited for new-generation connected cars, is proposed.
Keywords:Vehicle Cyber Security, Mobility-as-a-Service, Automotive, Connected Cars, In-Vehicle Infotainment, Controller Area Network, Intrusion Detection System, Fingerprinting ECU.