Quarterly journal published in SPbPU
and edited by prof. Dmitry Zegzhda
Peter the Great St. Petersburg Polytechnic University
Institute of computer sciences and technologies
information security of computer systems
Information Security Problems. Computer Systems
Published since 1999.
ISSN 2071-8217
  • 2025 year
  • 2024 year
  • 2023 year
  • 2022 year
  • 2021 year
  • 2020 year
  • 2019 year
  • 2018 year
  • 2017 year
  • 2016 year
  • 2015 year
  • 2014 year
  • 2013 year
  • 2012 year
    • № 1 2012
      • INFORMATION SECURITY ASPECTS

        Azhmukhamedov I. M.

        Score damage security provide system based on fuzzy-cognitive approach

        Annotation:

        Structured fuzzy cognitive model and its proposed methodology for determining the degree of harm the security of systems and services for security of information systems.

        To quote:

        Azhmukhamedov I. M.

        Score damage security provide system based on fuzzy-cognitive approach // Information Security Problems. Computer Systems. 2012. № 1. Pp. 7-11. DOI:

        Keywords:

        Security of information systems, fuzzy cognitive model evaluation security.

        Pages:

        7-11

        Belim S. V., Bogachenko N. F., Firdman I. A.

        Inverse problem for the mandatory security policy

        Annotation:

        Possibility to construct a mandatory security policy on the basis of known access differentiation rules is considered in this article.

        To quote:

        Belim S. V., Bogachenko N. F., Firdman I. A.

        Inverse problem for the mandatory security policy // Information Security Problems. Computer Systems. 2012. № 1. Pp. 12-18. DOI:

        Keywords:

        Security police, mandatory access, security model.

        Pages:

        12-18
      • INFORMATION SECURITY APPLICATION

        Komashinskiy D. V., Kotenko I. V.

        Detecting malicious portable document format files with data mining techniques

        Annotation:

        The necessity to timely detect malicious documents which cause malicious code execution on users' computers due to exploitation of vulnerabilities is very actual issue of information security. At this time this threat is actively used in order to arrange creating botnets, stealing personal assets of users and other criminal acts with the help of so-called exploit kits and the threat seems to be used in future as well. The paper’s focus is on the issues of static structural analysis of malicious PDF (Portable Document Format) files and development of approach to detect such files by using Data Mining techniques.

        To quote:

        Komashinskiy D. V., Kotenko I. V.

        Detecting malicious portable document format files with data mining techniques // Information Security Problems. Computer Systems. 2012. № 1. Pp. 19-35. DOI:

        Keywords:

        Malicious portable document, exploit kits, data mining techniques.

        Pages:

        19-35
      • NETWORK AND TELECOMMUNICATION SECURITY

        Baranov V. A.

        (Russian) О доверительном интервале для момента вторжения

        Annotation:

        The opportunity to model an intrusion into a computer system using the imbalance of the observation process is considered in this article. Well-known estimates of trusted bracket for the intrusion time contain parameters depended on type of distributions before and after intrusion. Taking into account the lack of such information it is recommended to use algorithms barely depended on the distribution character and to research the efficiency of intrusion estimate using experimental methods.

        To quote:

        Baranov V. A.

        (Russian) О доверительном интервале для момента вторжения // Information Security Problems. Computer Systems. 2012. № 1. Pp. 36-43. DOI:

        Keywords:

        Trusted bracket, the intrusion moment, observation process.

        Pages:

        36-43
      • APPLIED CRYPTOGRAPHY

        Plastunov V. U.

        Introduction to the digital audio watermarking technology

        Annotation:

        In this paper we give an introduction to the digital audio watermarking (DWM) technology, a brief historical summary of DWM. The principle and the general scheme of embedding DWM are considered. The differences in the methods of implementing DWM and other steganography methods are described. DWM applications are given. А comparative analysis of audio signal integrity verification methods based on cryptography and DWM is carried out. The basic requirements for DWM and performance criteria embedding DWM are listed.

        To quote:

        Plastunov V. U.

        Introduction to the digital audio watermarking technology // Information Security Problems. Computer Systems. 2012. № 1. Pp. 44-54. DOI:

        Keywords:

        Watermark, DWM, audio signal, steganography.

        Pages:

        44-54

        Rostovtsev A. G., Mizyukin A. A.

        On boolean ideals and varieties with application to algebraic attacks

        Annotation:

        Finding the key of symmetric cipher takes solving of polynomial equations. Complexity of solving process can be reduced if exact or approximate basis of ideal of substitution is defined by short polynomials. Accuracy of short basis can be increased using affine change of variables. Two methods for solving system of Boolean equations are proposed.

        To quote:

        Rostovtsev A. G., Mizyukin A. A.

        On boolean ideals and varieties with application to algebraic attacks // Information Security Problems. Computer Systems. 2012. № 1. Pp. 55-66. DOI:

        Keywords:

        Cipher, polynomial ring, ideal, variety, Groebner basis.

        Pages:

        55-66
      • SPECIAL IT

        Volkova T. A., Rudih S. D., Tihonenko A. M.

        Discrete-manipulated signals with discontinuous time structure in river automated identification systemschnology

        Annotation:

        The focus of the study is to analyze the main temporal, spectral, correlation, and other features and opportunities to apply complex discrete-manipulated signals (DMS) with discontinuous time structure in river automated identification systems (AIS).

        To quote:

        Volkova T. A., Rudih S. D., Tihonenko A. M.

        Discrete-manipulated signals with discontinuous time structure in river automated identification systemschnology // Information Security Problems. Computer Systems. 2012. № 1. Pp. 67-69. DOI:

        Keywords:

        Discrete-manipulated signals (DMS), discontinuous time signals, mutual interference, automated identification systems (AIS), coefficient of mutual difference (CMD).

        Pages:

        67-69
    • № 2 2012
      • INFORMATION SECURITY ASPECTS

        Kalinin M., Konoplev A.

        Formulizing the objectives of grid systems resources protection from unauthorized access

        Annotation:

        The paper reviews the problem of security provision for computing resources and user data in Grid systems. It discusses the security related characteristics of Grid system architecture and provides the threat model. It also considers the related methods aimed to improve security of Grid systems and discusses their disadvantages. There is proposed a Grid system specification based on Petri net which allow modeling of job requests distribution in accordance with the requirements of security policies and formulization of the objectives of Grid systems protection from unauthorized access.

        To quote:

        Kalinin M., Konoplev A.

        Formulizing the objectives of grid systems resources protection from unauthorized access // Information Security Problems. Computer Systems. 2012. № 2. Pp. 7-13. DOI:

        Keywords:

        Grid system, information security, access control, model, security policy, Petri net.

        Pages:

        7-13

        Kachko A. K.

        The formalized security model of data processing in the context of cloud computing

        Annotation:

        Use of cloud computing applications and services requires review and adaptation of existing formal models for computer security. It is necessary to consider the benefits of cloud deployment models and provide the procedure for allocating process among components of cloud computing environment for achieving confidentiality and data protection.

        To quote:

        Kachko A. K.

        The formalized security model of data processing in the context of cloud computing // Information Security Problems. Computer Systems. 2012. № 2. Pp. 14-20. DOI:

        Keywords:

        Security model, cloud computing, public cloud, private cloud, hybrid cloud, security requirements, theory of graphs, data confidentiality.

        Pages:

        14-20
      • INFORMATION SECURITY APPLICATION

        Zegzhda D. P., Stepanova T. V.

        Efficiency evaluation of botnets’ disinfection and removal

        Annotation:

        Nowadays there is lack of efficiency evaluation methods, which will allow to compare efficiency of defense and intrusion tools, in particular, botnets. Set of efficiency evaluation metrics is proposed. These metrics take into consideration network nature of modern defense and intrusion tools and allow to obtain a numerical estimate for factors, significant for defense or intrusion efficiency. Therefore, these metrics allow to make a conclusion about result of the battle between networks of benign and malignant agents, and conclusion about local or global area network protection.

        To quote:

        Zegzhda D. P., Stepanova T. V.

        Efficiency evaluation of botnets’ disinfection and removal // Information Security Problems. Computer Systems. 2012. № 2. Pp. 21-27. DOI:

        Keywords:

        Botnet, efficiency, disinfection, metric.

        Pages:

        21-27

        Pechenkin A. I.

        Detection of unauthorized data transfer over the HTTP on hypervisor level

        Annotation:

        Malware often aims at breaking confidentiality. In this paper the authors proposed an approach to the detection of unauthorized data transfer, produced by malicious software from client computer over the HTTP. This approach is based on detection of inconsistency between network traffic and user actions.

        To quote:

        Pechenkin A. I.

        Detection of unauthorized data transfer over the HTTP on hypervisor level // Information Security Problems. Computer Systems. 2012. № 2. Pp. 28-33. DOI:

        Keywords:

        Firewall, network security, HTTP.

        Pages:

        28-33

        Platonov V. V., Tselov I. I.

        Inter-departmental document flow: Information security problems

        Annotation:

        The article deals with inter-departmental and inter-ministerial document flow protocol. Also there is investigation of implementation stage problems included. Main goal is to estimate these problems impact and to propose relevant solutions.

        To quote:

        Platonov V. V., Tselov I. I.

        Inter-departmental document flow: Information security problems // Information Security Problems. Computer Systems. 2012. № 2. Pp. 34-41. DOI:

        Keywords:

        Enterprise content management, document flow security, document flow relevance.

        Pages:

        34-41

        Sabanov A. G., Skiba V. U.

        Some aspects of protection of the electronic document exchange systems is design

        Annotation:

        Some aspects of protection of electronic flow of documents are investigated.

        To quote:

        Sabanov A. G., Skiba V. U.

        Some aspects of protection of the electronic document exchange systems is design // Information Security Problems. Computer Systems. 2012. № 2. Pp. 42-45. DOI:

        Keywords:

        Protected access to the systems of electronic document exchange, secure system of electronic document exchange.

        Pages:

        42-45
      • NETWORK AND TELECOMMUNICATION SECURITY

        Belim S. V., Belim S. Yu.

        Model of system with feedback for reaction on DOS-attack

        Annotation:

        The system of reaction on DOS-attacks with feedback are modeling.

        To quote:

        Belim S. V., Belim S. Yu.

        Model of system with feedback for reaction on DOS-attack // Information Security Problems. Computer Systems. 2012. № 2. Pp. 46-49. DOI:

        Keywords:

        DOS-attack, feedback.

        Pages:

        46-49

        Zegzhda D., Kalinin M., Konoplev A., Dzyoba A.

        The high-performance crypographic gateway for distributed systems of electronic services

        Annotation:

        The paper reviews the problem of performance degradation in distributed systems of electronic services using cryptographic algorithms. It discusses a model of network traffic flows classification. Based on that model, the high-performance gateway for providing network traffic security in distributed systems of electronic services is proposed.

        To quote:

        Zegzhda D., Kalinin M., Konoplev A., Dzyoba A.

        The high-performance crypographic gateway for distributed systems of electronic services // Information Security Problems. Computer Systems. 2012. № 2. Pp. 50-56. DOI:

        Keywords:

        Information security, cryptoalgorithm, gateway, flows classification, encryption, electronic services.

        Pages:

        50-56

        Kotenko I. V., Saenko I. B., Polubelova O. V., Chechulin A. A.

        Technologies of security information and event management for computer network protection

        Annotation:

        The paper considers the peculiarities of systems implementing security information and event management technology (SIEM systems). Description of known implementations of such systems is given. We discuss the main features of the MASSIF project of Seven-Framework Program of European Community, which is devoted to investigation of new generation SIEM systems. Issues of two key tasks of this project associated with the analysis of security events, based on the modeling of network attacks, and building the security information repository are also discussed.

        To quote:

        Kotenko I. V., Saenko I. B., Polubelova O. V., Chechulin A. A.

        Technologies of security information and event management for computer network protection // Information Security Problems. Computer Systems. 2012. № 2. Pp. 57-68. DOI:

        Keywords:

        Information security, security events, SIEM system, security monitoring, network attack modeling, repository.

        Pages:

        57-68

        Rudina E. A.

        Specification of the network protocols by the special declarative language

        Annotation:

        The paper considers the approach to the interactive specification of the client-server protocols by the special language based on the formal model of network activity.

        To quote:

        Rudina E. A.

        Specification of the network protocols by the special declarative language // Information Security Problems. Computer Systems. 2012. № 2. Pp. 69-75. DOI:

        Keywords:

        Network protocol, client-server interaction, language of protocol specification.

        Pages:

        69-75
      • APPLIED CRYPTOGRAPHY

        Nesterenko A.Y.

        New protocols for remote management

        Annotation:

        In this work we present two new protocols for secure management of remote objects. These protocols are released in group of points of elliptic curve, defined over finite field, with usage of russian cryptography standards.

        To quote:

        Nesterenko A.Y.

        New protocols for remote management // Information Security Problems. Computer Systems. 2012. № 2. Pp. 76-82. DOI:

        Keywords:

        Key transport protocol, data transport protocol, elliptic curves, public key infrastructure, hybrid epcryption sheme.

        Pages:

        76-82

        Semyanov P. V.

        The practical vulnerability of AES block padding in password vefication algorithms

        Annotation:

        Standard AES padding schemes could insert some regurality into random data. The exploiting of such vulnerability is shown in password verification algorithms of some applications. The use of random AES padding is proposed.

        To quote:

        Semyanov P. V.

        The practical vulnerability of AES block padding in password vefication algorithms // Information Security Problems. Computer Systems. 2012. № 2. Pp. 83-85. DOI:

        Keywords:

        AES padding, random data sequence, password verification.

        Pages:

        83-85
      • SPECIAL IT

        Zegzhda D. P., Moskvin D. A., Bosov Y. O.

        A face recognition using fractal compression method

        Annotation:

        The main problem of the automatic recognition of people's faces is the speed of the existing methods and algorithms. In this paper the authors propose a new method to increase the speed of face recognition by using fractal compression algorithms.

        To quote:

        Zegzhda D. P., Moskvin D. A., Bosov Y. O.

        A face recognition using fractal compression method // Information Security Problems. Computer Systems. 2012. № 2. Pp. 86-90. DOI:

        Keywords:

        Face recognition, identification, fractal.

        Pages:

        86-90
    • № 3 2012
      • INFORMATION SECURITY ASPECTS

        Belim S. V., Bogachenko N. F., Firdman I. A.

        Investigation of seepage inthe role based access control

        Annotation:

        In this article the elementary operators are building. Tranformation of roles tree are Investigated.

        To quote:

        Belim S. V., Bogachenko N. F., Firdman I. A.

        Investigation of seepage inthe role based access control // Information Security Problems. Computer Systems. 2012. № 3. Pp. 7-13. DOI:

        Keywords:

        Security police, RBAC, security model.

        Pages:

        7-13

        Khomonenko A. D., Krasnov S. A., Eremin A. S.

        Assessment of efficiency of the automatic rubrication of documents by means of model of non-stationary system of service with erlangovsky distribution of duration of intervals between requests

        Annotation:

        Influence of coefficient of a variation of distribution of duration of intervals between the moments of arrival of requests for efficiency of functioning of client server system of an automatic rubrication of documents in electronic document management system of a higher educational institution is researched. The model with erlangovsky distribution of duration of intervals between requests and exponential distribution of dlitelnosty processing of document packages is used.

        To quote:

        Khomonenko A. D., Krasnov S. A., Eremin A. S.

        Assessment of efficiency of the automatic rubrication of documents by means of model of non-stationary system of service with erlangovsky distribution of duration of intervals between requests // Information Security Problems. Computer Systems. 2012. № 3. Pp. 14-21. DOI:

        Keywords:

        Automatic rubrication, electronic document management system , non-markov system, erlangovsky distribution.

        Pages:

        14-21
      • INFORMATION SECURITY APPLICATION

        Danilenko A. Yu.

        Problems of the development and implementation of protected electronic document management systems

        Annotation:

        Deals with the problems that arise when designing and implementing electronic document management systems designed to work with confidential information.

        To quote:

        Danilenko A. Yu.

        Problems of the development and implementation of protected electronic document management systems // Information Security Problems. Computer Systems. 2012. № 3. Pp. 22-28. DOI:

        Keywords:

        Information security, electronic document management, automated information systems.

        Pages:

        22-28

        Kornev P. A., Malysh V. N.

        Technique of fuzzy neural network categorization of personal data in information systems

        Annotation:

        In this article approaches to realization of a categorization of personal data in in-formation systems with application of technologies of artificial intelligence are considered. The technique, allowing to execute a categorization on the basis of fuzzy sets and artificial neural networks, is offered.

        To quote:

        Kornev P. A., Malysh V. N.

        Technique of fuzzy neural network categorization of personal data in information systems // Information Security Problems. Computer Systems. 2012. № 3. Pp. 29-34. DOI:

        Keywords:

        Personal data, information security, fuzzy sets, fuzzification, neural network.

        Pages:

        29-34
      • NETWORK AND TELECOMMUNICATION SECURITY

        Azhmukhamedov I. M., Marenkov A. N.

        Anomaly detection in public computer networks on the basis of forecasting volume of network traffic

        Annotation:

        The method for automation of search and an assessment of anomalies of volume of network traffic is offered. Research of the effectiveness of the proposed method is performed.

        To quote:

        Azhmukhamedov I. M., Marenkov A. N.

        Anomaly detection in public computer networks on the basis of forecasting volume of network traffic // Information Security Problems. Computer Systems. 2012. № 3. Pp. 35-39. DOI:

        Keywords:

        Сomputer networks, prediction of network traffic, search traffic anomalies.

        Pages:

        35-39

        Platonov V. V., Semenov P. O.

        Dimension reduction in network attacks detection systems

        Annotation:

        The possibility of usage dimension reduction techniques to generate a list of most significant parameters for detecting network attacks is analyzed. In this paper is proposed the model of intrusion detection system with modular architecture, which allows classifying packets by different support vector machines.

        To quote:

        Platonov V. V., Semenov P. O.

        Dimension reduction in network attacks detection systems // Information Security Problems. Computer Systems. 2012. № 3. Pp. 40-45. DOI:

        Keywords:

        Intrusion detection system, support vector machine, dimension reduction, principal component analysis.

        Pages:

        40-45

        Stepanova T. V.

        Finite-state model of adaptive behavior of multi-agent system, countering distributed computer threats in internet

        Annotation:

        Nowadays multi-agent systems, used either for implementing distributed security threats, or for protecting computer systems against distributed threats in Internet, maintain agents’ graph connectivity by maintaining excessive number of links, or don’t maintain connectivity in aggressive environment at all. Finite-state model of multi-agent system adaptive behavior is proposed. Proposed model is based on using d-regular graph of agents in connection with methods for maintaining network connectivity, which allow to provide functional efficiency of the system in aggressive environment.

        To quote:

        Stepanova T. V.

        Finite-state model of adaptive behavior of multi-agent system, countering distributed computer threats in internet // Information Security Problems. Computer Systems. 2012. № 3. Pp. 46-52. DOI:

        Keywords:

        Multi-agent system, functional efficiency, adaptive behavior, random regular graph.

        Pages:

        46-52
      • APPLIED CRYPTOGRAPHY

        Korzhik V., Tikhonov S.

        About a possibility of a hardware implemented GOST cipher breaking

        Annotation:

        We prove that there is a possibility to find the secret key from tamper resistant chip that provides encryption by algorithm GOST-28147-89. In order to solve this problem it is performed a side attack on power consumption. In a comparison with a simple power analysis it is performed the so called differential power analysis (DPA) that is tolerant to such protection technique as noising and shielding. We present an algorithm of key calculation given cipher text and estimate the number of operations needed to break all cipher. We remark that GOST cipher is more easy breakable by this attack rather than DES cipher. This means that module 232 addition that is implemented by GOST gives nothing advantages against DPA in comparison with a module 2 addition implemented by DES.

        To quote:

        Korzhik V., Tikhonov S.

        About a possibility of a hardware implemented GOST cipher breaking // Information Security Problems. Computer Systems. 2012. № 3. Pp. 53-62. DOI:

        Keywords:

        Secret key, algorithm GOST-28147-89, attack, DES code.

        Pages:

        53-62
      • TECHNICAL SOLUTION

        Bundin G. G., Polyakov V. B., Pomozova T. G.

        Hardware implementation methods of ensuring information security of preprocessing of information in modern radar station

        Annotation:

        In this article information security is considered as a condition of security of the SoC information environment of DSP Radar station devices which is reached at the expense of use of the corresponding methods of processing of information, protecting process of processing of information from unauthorized and inadvertent impacts on processed information and a course of computing process.

        To quote:

        Bundin G. G., Polyakov V. B., Pomozova T. G.

        Hardware implementation methods of ensuring information security of preprocessing of information in modern radar station // Information Security Problems. Computer Systems. 2012. № 3. Pp. 63-67. DOI:

        Keywords:

        System-on-a-chip, protection of process of processing of information, internal parallelism of a task, arithmetic device, method of processing of information.

        Pages:

        63-67
      • СОВРЕМЕННОЕ СОСТОЯНИЕ ИНФОРМАЦИОННОЙ БЕЗОПАСНОСТИ КОМПЬЮТЕРНЫХ СИСТЕМ

        Platonov V. V., Shchelovanov N. V.

        Security issues of the SS7 network

        Annotation:

        The article describes some aspects of SS7 network information security. The main SS7 protocols which are exposed the threat of integrity and the possible implications of these threats are described. The concept of SS7 protection is proposed.

        To quote:

        Platonov V. V., Shchelovanov N. V.

        Security issues of the SS7 network // Information Security Problems. Computer Systems. 2012. № 3. Pp. 68-73. DOI:

        Keywords:

        SS7 protocols, threat of integrity, traffic screening and monitoring.

        Pages:

        68-73
      • SPECIAL IT

        Khomonenko A. D., Danilov A. A., Danilov A. I.

        Analisys of multichannel information system of critical appointment with general servises distribution law and unreliable elements

        Annotation:

        An iterative algorithm for calculation of stationary distribution in MGn queueuing system with non reliable restored devices is proposed. The above model is very nice describe an behavior of information system of critical appointment with general services distribution law and unreliable elements. The approach for calculation of probability and time characteristics of service of demands is shown, results of numerical experiment are discussed.

        To quote:

        Khomonenko A. D., Danilov A. A., Danilov A. I.

        Analisys of multichannel information system of critical appointment with general servises distribution law and unreliable elements // Information Security Problems. Computer Systems. 2012. № 3. Pp. 74-82. DOI:

        Keywords:

        Iterative algorithm, demand, results of numerical experiment unreliable elements.

        Pages:

        74-82
    • № 4 2012
      • INFORMATION SECURITY ASPECTS

        Baranov A. P.

        Robustness property of chi-squared test in modes of computers systems behavior

        Annotation:

        In this article given proof of opportunity of using the chi-squared test with deviation from standard fixed model of independent observation. It is showed in the article, that with breaches of classical conditions using the test is brought to comparison of two large, but different values, opposite to standard hypothesizes, where large and medium values of statistics are compared.

        To quote:

        Baranov A. P.

        Robustness property of chi-squared test in modes of computers systems behavior // Information Security Problems. Computer Systems. 2012. № 4. Pp. 7-12. DOI:

        Keywords:

        Criterion chi-squared, independent observation, values of statistics.

        Pages:

        7-12

        Gaydamakin N. A., Leontyev S. V.

        Probabilistic attributes of computer system security class evaluation process according to common standards and requirements

        Annotation:

        In this paper we propose the method for analyzing probabilistic attributes of computer system security class evaluation process according to the set of rules declared in common standards. Entire event group used in computer system security class determination is introduced. Probability calculation results of correct/incorrect estimation for given conditions are proposed.

        To quote:

        Gaydamakin N. A., Leontyev S. V.

        Probabilistic attributes of computer system security class evaluation process according to common standards and requirements // Information Security Problems. Computer Systems. 2012. № 4. Pp. 13-20. DOI:

        Keywords:

        Protection class of computer systems, protection level certification, trusted computer system, information security.

        Pages:

        13-20
      • INFORMATION SECURITY APPLICATION

        Azhmuhamedov I. M., Pereverzeva R. Y.

        Systematic approach to ensure confidentiality of data stored on electronic media

        Annotation:

        Based on the systematic approach developed using cryptographic mechanisms and block access to the file, allowing synergies to increase the reliability of the protection of information stored on your computer.

        To quote:

        Azhmuhamedov I. M., Pereverzeva R. Y.

        Systematic approach to ensure confidentiality of data stored on electronic media // Information Security Problems. Computer Systems. 2012. № 4. Pp. 21-24. DOI:

        Keywords:

        A systematic approach, the synergies, the confidentiality of information, cryptographic protection, blocking access to the file.

        Pages:

        21-24
      • SECURE OPERATING SYSTEMS AND TRUSTED ENVIRONMENT

        Baklanov V., Knyazeva N., Khorkov D.

        NTFS timestamp analysis in Microsoft Windows XP operating system

        Annotation:

        This paper presents some experimental results of the research on the process of creation and renewal of file timestamps during common file operations in the NTFS file system. A thorough analysis of these results may be promising from the angle of information security and computer forensics.

        To quote:

        Baklanov V., Knyazeva N., Khorkov D.

        NTFS timestamp analysis in Microsoft Windows XP operating system // Information Security Problems. Computer Systems. 2012. № 4. Pp. 25-32. DOI:

        Keywords:

        Timestamp, forensic analysis, file operations, NTFS, file attributes.

        Pages:

        25-32
      • NETWORK AND TELECOMMUNICATION SECURITY

        Pechenkin A. I., Lavrova D. S.

        Modeling of high-speed parallel network traffic processing on a multiprocessor clusteraffic

        Annotation:

        Nowadays systems of and network traffic analysis have to process large volumes of traffic, it requires substantial computing resources. Proposed model of high-speed parallel network traffic processing on a multiprocessor cluster mathematically describes processes of load-balancing on clusters, network traffic classification and evaluation of its characteristics, which allows to increase in efficiency of network traffic's data processing.

        To quote:

        Pechenkin A. I., Lavrova D. S.

        Modeling of high-speed parallel network traffic processing on a multiprocessor clusteraffic // Information Security Problems. Computer Systems. 2012. № 4. Pp. 33-39. DOI:

        Keywords:

        Network traffic, multiprocessor cluster, load-balancing, network traffic classification.

        Pages:

        33-39
      • APPLIED CRYPTOGRAPHY

        Kuzmina N. G., Makhovenko E. B.

        Analysis of hidden field equations cryptosystem over the odd-characteristic fields

        Annotation:

        Some results on cryptanalysis of Hidden Field Equations (HFE) cryptosystem over the odd-characteristic fields are presented. Using of odd-char HFE schemes reduces key generation, encryption and decryption time. Possible attacks are analyzed. Recommendations for HFE parameters choice are provided.

        To quote:

        Kuzmina N. G., Makhovenko E. B.

        Analysis of hidden field equations cryptosystem over the odd-characteristic fields // Information Security Problems. Computer Systems. 2012. № 4. Pp. 40-46. DOI:

        Keywords:

        Postquantum cryptography, MPKS, HFE, odd-char fields.

        Pages:

        40-46
      • SPECIAL IT

        Kalinichenko S. V., Khomonenko A. D.

        Approach to search and elimination of duplicated inconsistent information at integration of data in the distributed automated systems of critical appointment

        Annotation:

        The procedures eliminating possible ambiguity, inconsistency and discrepancy of data in the distributed automated systems of critical appointment are considered and are mathematically proved. The method and a technique of control and search of the duplicated data for relational model are described respectively. Application of potential key attributes for an assessment of identity of objects in the distributed information automated system is offered. Values of a resultant matrix of similarity of potential key attributes are thus used.

        To quote:

        Kalinichenko S. V., Khomonenko A. D.

        Approach to search and elimination of duplicated inconsistent information at integration of data in the distributed automated systems of critical appointment // Information Security Problems. Computer Systems. 2012. № 4. Pp. 47-60. DOI:

        Keywords:

        Integration of data, relational model, key attributes, elimination of contradictions of data.

        Pages:

        47-60

        Sorokin A. V.

        On differentiation of clusters belonging to JPEG files from clusters belonging to other format files

        Annotation:

        An approach to differentiation of clusters belonging to jpeg files from other clusters on the digital media is described in the following work. The approach is based on building of signatures for former search in clusters in question. Possible applications of described method are discussed.

        To quote:

        Sorokin A. V.

        On differentiation of clusters belonging to JPEG files from clusters belonging to other format files // Information Security Problems. Computer Systems. 2012. № 4. Pp. 61-67. DOI:

        Keywords:

        Data recovery, JPEG, differentiation of clusters by the search of signatures.

        Pages:

        61-67
  • 2011 year
  • 2010 year
  • 2009 year
  • 2008 year
  • 2007 year
  • 2006 year
  • 2005 year
  • 2004 year
  • 2003 year
  • 2002 year
  • 2001 year
  • 2000 year
  • 1999 year