Quarterly journal published in SPbPU
and edited by prof. Peter Zegzhda
Peter the Great St. Petersburg Polytechnic University
Institute of computer sciences and technologies
information security of computer systems
Information Security Problems. Computer Systems
Published since 1999.
ISSN 2071-8217

№3

2018 year

NETWORK AND TELECOMMUNICATION SECURITY

Lyskatov I.V., Pilkevich S.V.

Saint-Petersburg, Mozhaisky Military Space Academy

DETECTING CYBER THREATS MODEL IN ONLINE MEDIA SOURCES

Annotation:

The creation of media source protection model based on new methods of active search, unified investigation and cyber threat response. The process of detecting cyber threats based on methods of search forecasting, interlinked which the cyclic nature of the behavioral activity network resources users.

Keywords:

cyber threats, anomaly, forecast, user behavior, intelligence system.
Pages 9-18

Lebedev I.V., Karpov I.A., Baranov B.E., Los V.P., Samoletova K.S.

PREDICTING NEWS POPULARITY IN ONLINE SOCIAL NETWORKS

Annotation:

This study describes a previously unknown model for describing the interests of the user has been presented on the sentiment analysis of texts, written by the user in the social network, and it has been applied to the research problem of forecasting the popularity of text messageson the basis of text message analysis, the author’s profile of the message and the analysed community.

Keywords:

sentiment analysis, social networks, machine learning, popularity forecasting
Pages 18-25

№2

2018 year

INFORMATION SECURITY APPLICATION

FadeevaYu.A., Ponachugin A.V.

IDENTIFYING AN EFFECTIVE SYSTEM FOR MONITORING THE LEAKAGE OF CONFIDENTIAL INFORMATION ON BASIS OF COMPARATIVE ANALYSIS

Annotation:

This article identifies the main problems associated with the loss of confidential company data. As a solution to the problem, it was suggested to conduct a comparative analysis of the current certified means of information protection from the state register of FSTEC of Russia. For this purpose, it is proposed to use the optimization method for determining the most effective system, to select the basic requirements imposed by consumers for Data Leak Prevention systems, to identify a system corresponding to the maximum set of possible requirements.

Keywords:

informations security means, information security, information system, confidential information, Data Leak Prevention system, NSD, optimization task, comparative analysis
Pages 16-21

A.A. Grusho, N.A. Grusho, M.I. Zabezhailo, E.E. Timonina

PROTECTION OF VALUABLE INFORMATION IN INFORMATION TECHNOLOGIES

Annotation:

The paper is devoted to discussion of a possibility of recovery of valuable information in conditions when the malefactor knows results of information transform and transformation itself within some information technology. The model of processed information in the form of the wood is constructed. Ways of protection of valuable information are investigated.

Keywords:

information security, valuable information, security of information as a result of transformations
Pages 22-26

Demidov R.A., Zegzhda P.D., Kalinin M.O.

CYBERSECURITY THREATS ANALYSIS FOR DYNAMIC COMMUNICATION NETWORKS USING THE HYBRID NEURAL NETWORK MODEL

Annotation:

The paper deals with the problem of cybersecurity threats analysis of control mechanisms in dynamic communication networks (VANET, FANET, MARINET, MANET, WSN). The authors formulate the initial task in the form of neural network-made approximation of the system function of cyberthreat. The neural network model parameters are optimized according to the criterion of likelihood maximization on the training dataset. A hybrid neural network based on recurrent and graph convolutional networks is proposed as an appropriate computational architecture.

Keywords:

cybersecurity analysis, deep learning, distributed representations, hybrid neural network, routing threats, dynamic network, VANET, MANET, MARINET, MANET, WSN
Pages 27-32
NETWORK AND TELECOMMUNICATION SECURITY

Usov E.S., Nikolsky A.V., Pavlenko E.Y., Zegzhda D.P.

ARCHITECTURE OF SECURE CLOUD STORAGE DATA USING INTEL SGX TECHNOLOGY

Annotation:

The architecture of cloud storage with Intel SGX technology is proposed. This article presents an approach that allows to protect user data both on the cloud server from attacks from the provider, and on the client PC from various types of malicious software. The developed architecture supports group access to data for several users

 

Keywords:

Intel SGX, enclave, encryption, cloud computing, file hosting service
Pages 34-40

Zegzhda P.D., Ivanov D.V., Moskvin D.A., Kubrin G.S.

VANET/MANET-NETWORKS CYBERSECURITY THREATS ANALYSIS

Annotation:

In the paper, the threats of cybersecurity for Vehicular Ad-hoc Networks (VANET) are studied. The developed classification of those threats is present.

Keywords:

Wireless self-organised networks; Vehicular ad hoc networks, VANET, self-similar graph; cybersecurity threats.
Pages 41-47

Zegzhda P.D., Lavrova D.S., Shtyrkina A.A.

MULTIFRACTAL ANALYSIS OF BACKBONE NETWORK TRAFFIC FOR DENIAL-OF-SERVICE ATTACKS DETECTION

Annotation:

Authors propose to use multifractal analysis for anomaly detection in traffic of backbone networks. As security metrics, multifractal spectrum characteristics are used. The effectiveness of proposed approach is confirmed by experimental results on detecting denial-of-service attacks

Keywords:

backbone networks, multifractal analysis, attack detection, multifractal spectrum, DoS attack
Pages 48-58

Shterenberg S. I., Poltavtseva M. A.

DISTRIBUTED INTRUSION DETECTION SYSTEM WITH PROTECTION AGAINST INTERNAL INTRUDER

Annotation:

Modern distributed information networks protection from external and internal intruders continues to be relevant in connection with the development of data communication and processing technologies. The article describes the model of data processing in a distributed intrusion detection system (DIDS) and the method of using hidden agents to protect against an internal attacker. The distribution of data processing functions between the local DIDS agent and the general data processing node is given. The authors describe the method of hiding the presence of the agent from the user while maintaining its control by the operator.

Keywords:

distributed intrusion detection system, protection from internal intruder, hidden monitoring, big data
Pages 59-68
APPLIED CRYPTOGRAPHY

Mironkin V.O, Chukhno A.B.

ON ONE GENERALIZATION OF THE BIRTHDAY PROBLEM

Annotation:

In this paper a generalization of the classical birthday problem for the case of several independent samples of arbitrary power is considered. Exact and asymptotic expressions describing the probability of the intersection of these samples are obtained.

Keywords:

THE BIRTHDAY PROBLEM, ORDERED SAMPLE, COLLISION
Pages 69-73

Zegzhda D.P, Moskvin D.A., Myasnikov A.V.

CYBER RESILIENCE OF DISTRIBUTED STORAGE PROCESSING SYSTEMS WITH APPLICATION OF BLOCKCHAIN TECHNOLOGY

Annotation:

This article examines the architecture of modern systems of decentralized data storage and processing, the applicability of blockchain technology in these systems, the existing security threats in comparison with centralized systems and security methods that could eliminate these threats.

Keywords:

distributed systems, secure data storage, secure data processing, blockchain
Pages 74-79

Aleksandrova E.B., Shtyrkina A.A.

ELLIPTIC CURVE ISOGENY-BASED DIRECTED SIGNATURE

Annotation:

Elliptic curve isogeny-based directed signature is proposed. Only recipient whose public key was used to generate signature can verify this signature. Both signer and verifier control delegating the right of signature verification.

Keywords:

isogeny-based cryptography, elliptic curves, directed signature, id-based cryptography, bilinear map
Pages 80-85
TECHNICAL SOLUTION

A.A.Sikarev, I.A. Sikarev, A.V.Garanin

TIME-AND-FREQUENCY AND CORRELATION CHARACTERISTICS OF THE FINITE PARALLEL COMPLEX SIGNALS OF AUTOMATED INFORMATION SYSTEMS (AIS) ON THE INLAND WATERWAYS OF THE RUSSIAN FEDERATION

Annotation:

Parallel complex signals synthesized from segments of harmonics of multiple frequencies that initial phase takes from binary set G0,π and that have same amplitudes are considered. New quasioptimal phase codes for peak-factor minimization obtained. Code type of frequency and time characteristics dependency two-dimensional auto- and cross-correlation functions of such signals was investigated.

Keywords:

phase codes, AIS, complex signals
Pages 86-92
SPECIAL IT

I.E. Gorbachev, A.M. Suhov , M.A. Eremeev, S.I Smirnov

THE IMPLEMENTATION OF A SYSTEMATIC APPROACH IN CREATION OF SYSTEM OF INFORMATION SECURITY OF CRITICAL INFORMATION INFRASTRUCTURE TAKING INTO ACCOUNT ECONOMIC FEASIBILITY

Annotation:

The article considers the system (complex) approach to the justification of design decisions on the creation of a proactive system of information security of critical information infrastructure. It is proposed that the appearance of the information security system at the stage of its system-aggregative (external) design methodology of the modern theory of the effectiveness of targeted processes.

Keywords:

information security system, proactivity, quality score, design solutions.
Pages 93-110