Lyskatov I.V., Pilkevich S.V.
Saint-Petersburg, Mozhaisky Military Space Academy
The creation of media source protection model based on new methods of active search, unified investigation and cyber threat response. The process of detecting cyber threats based on methods of search forecasting, interlinked which the cyclic nature of the behavioral activity network resources users.
Keywords:cyber threats, anomaly, forecast, user behavior, intelligence system.
Lebedev I.V., Karpov I.A., Baranov B.E., Los V.P., Samoletova K.S.
This study describes a previously unknown model for describing the interests of the user has been presented on the sentiment analysis of texts, written by the user in the social network, and it has been applied to the research problem of forecasting the popularity of text messageson the basis of text message analysis, the author’s profile of the message and the analysed community.
Keywords:sentiment analysis, social networks, machine learning, popularity forecasting
FadeevaYu.A., Ponachugin A.V.
This article identifies the main problems associated with the loss of confidential company data. As a solution to the problem, it was suggested to conduct a comparative analysis of the current certified means of information protection from the state register of FSTEC of Russia. For this purpose, it is proposed to use the optimization method for determining the most effective system, to select the basic requirements imposed by consumers for Data Leak Prevention systems, to identify a system corresponding to the maximum set of possible requirements.
Keywords:informations security means, information security, information system, confidential information, Data Leak Prevention system, NSD, optimization task, comparative analysis
A.A. Grusho, N.A. Grusho, M.I. Zabezhailo, E.E. Timonina
The paper is devoted to discussion of a possibility of recovery of valuable information in conditions when the malefactor knows results of information transform and transformation itself within some information technology. The model of processed information in the form of the wood is constructed. Ways of protection of valuable information are investigated.
Keywords:information security, valuable information, security of information as a result of transformations
Demidov R.A., Zegzhda P.D., Kalinin M.O.
The paper deals with the problem of cybersecurity threats analysis of control mechanisms in dynamic communication networks (VANET, FANET, MARINET, MANET, WSN). The authors formulate the initial task in the form of neural network-made approximation of the system function of cyberthreat. The neural network model parameters are optimized according to the criterion of likelihood maximization on the training dataset. A hybrid neural network based on recurrent and graph convolutional networks is proposed as an appropriate computational architecture.
Keywords:cybersecurity analysis, deep learning, distributed representations, hybrid neural network, routing threats, dynamic network, VANET, MANET, MARINET, MANET, WSN
Usov E.S., Nikolsky A.V., Pavlenko E.Y., Zegzhda D.P.
The architecture of cloud storage with Intel SGX technology is proposed. This article presents an approach that allows to protect user data both on the cloud server from attacks from the provider, and on the client PC from various types of malicious software. The developed architecture supports group access to data for several users
Keywords:Intel SGX, enclave, encryption, cloud computing, file hosting service
Zegzhda P.D., Ivanov D.V., Moskvin D.A., Kubrin G.S.
In the paper, the threats of cybersecurity for Vehicular Ad-hoc Networks (VANET) are studied. The developed classification of those threats is present.
Keywords:Wireless self-organised networks; Vehicular ad hoc networks, VANET, self-similar graph; cybersecurity threats.
Zegzhda P.D., Lavrova D.S., Shtyrkina A.A.
Authors propose to use multifractal analysis for anomaly detection in traffic of backbone networks. As security metrics, multifractal spectrum characteristics are used. The effectiveness of proposed approach is confirmed by experimental results on detecting denial-of-service attacks
Keywords:backbone networks, multifractal analysis, attack detection, multifractal spectrum, DoS attack
Shterenberg S. I., Poltavtseva M. A.
Modern distributed information networks protection from external and internal intruders continues to be relevant in connection with the development of data communication and processing technologies. The article describes the model of data processing in a distributed intrusion detection system (DIDS) and the method of using hidden agents to protect against an internal attacker. The distribution of data processing functions between the local DIDS agent and the general data processing node is given. The authors describe the method of hiding the presence of the agent from the user while maintaining its control by the operator.
Keywords:distributed intrusion detection system, protection from internal intruder, hidden monitoring, big data
Mironkin V.O, Chukhno A.B.
In this paper a generalization of the classical birthday problem for the case of several independent samples of arbitrary power is considered. Exact and asymptotic expressions describing the probability of the intersection of these samples are obtained.
Keywords:THE BIRTHDAY PROBLEM, ORDERED SAMPLE, COLLISION
Zegzhda D.P, Moskvin D.A., Myasnikov A.V.
This article examines the architecture of modern systems of decentralized data storage and processing, the applicability of blockchain technology in these systems, the existing security threats in comparison with centralized systems and security methods that could eliminate these threats.
Keywords:distributed systems, secure data storage, secure data processing, blockchain
Aleksandrova E.B., Shtyrkina A.A.
Elliptic curve isogeny-based directed signature is proposed. Only recipient whose public key was used to generate signature can verify this signature. Both signer and verifier control delegating the right of signature verification.
Keywords:isogeny-based cryptography, elliptic curves, directed signature, id-based cryptography, bilinear map
A.A.Sikarev, I.A. Sikarev, A.V.Garanin
Parallel complex signals synthesized from segments of harmonics of multiple frequencies that initial phase takes from binary set G0,π and that have same amplitudes are considered. New quasioptimal phase codes for peak-factor minimization obtained. Code type of frequency and time characteristics dependency two-dimensional auto- and cross-correlation functions of such signals was investigated.
Keywords:phase codes, AIS, complex signals
I.E. Gorbachev, A.M. Suhov , M.A. Eremeev, S.I Smirnov
The article considers the system (complex) approach to the justification of design decisions on the creation of a proactive system of information security of critical information infrastructure. It is proposed that the appearance of the information security system at the stage of its system-aggregative (external) design methodology of the modern theory of the effectiveness of targeted processes.
Keywords:information security system, proactivity, quality score, design solutions.