Quarterly journal published in SPbPU
and edited by prof. Peter Zegzhda
Peter the Great St. Petersburg Polytechnic University
Institute of computer sciences and technologies
information security of computer systems
Information Security Problems. Computer Systems
Published since 1999.
ISSN 2071-8217
  • 2020 year
    • №1 2020
      • INFORMATION SECURITY ASPECTS

        P. D. Zegzhda, V. G.Anisimov, P.V. Semianov,
        E. G. Anisimov, T. N. Saurenko T. N..

        APPROACH TO EVALUATING THE EFFECTIVENESS OF INFORMATION PROTECTION IN CONTROL SYSTEMS

        Annotation:

        Methodological approach to evaluating the effectiveness of information protection in the information and control subsystem of a complex dynamic system is offered. As a performance indicator it is proposed to use the degree of opportunity implementation driven dynamic system in view of prevention of damage, expressed in the change life cycle management from destructive influences that violates the completeness, integrity, precision, reliability, accessibility and efficiency of processing required for managerial decision-making information.

        Keywords:

        Management of a Complex Dynamic System, Information and Control Subsystem, Information Protection, Efficiency.
        Pages 9-16
      • NETWORK AND TELECOMMUNICATION SECURITY

        D. S. Lavrova, N. N.Eliseev

        NETWORK ATTACKS DETECTION BASED ON TSETLIN MACHINE

        Annotation:

        An approach to detecting computer attacks is proposed, which consists in identifying abnormal network traffic using Tsetlin machine. Experimental studies conducted for various types of network attacks have demonstrated the effectiveness of the proposed approach.

        Keywords:

        Network Attacks, Network Traffic Classification, Tsetlin Machine, Tsetlin Automate.
        Pages 17-23

        I. V. Alekseev, P. D. Zegzhda

        CLASSIFICATION OF VULNERABILITIES OF NETWORK PROTOCOLS BASED ON SPECIFICATIONS

        Annotation:

        This paper provides an overview of network attacks and vulnerabilities of TCP / IP model. The purpose of this study is to identify the most common types of vulnerabilities for network protocols. So, for example, the ability to change the values of the IP address field to the victim's address is not vulnerability that is not accepted by the protocol specification, but the misuse of flags fragmentation – is a vulnerability.

        Keywords:

        Network Attacks, TCP/IP Model, Vulnerability Search, Network Security.
        Pages 24-32
      • APPLIED CRYPTOGRAPHY

        V. I. Korzhik, D. C.Nguyen, K. A. Akhrameeva

        CIPHER MODIFICATION AGAINST STEGANALYSIS BASED ON NIST TESTS

        Annotation:

        Two methods for cipher modification, which can be used to pre-embed messages are proposed. These modifications preserve the cryptographic resistance of the embedded messages, but violate the pseudo-randomness of cryptograms, which protects stegosystem from detection based on the use of NIST tests. The experimental results on the stegosystem detection efficiency after cipher modification and depending on the embedding rate are also presented.

        Keywords:

        Block Cipher, Stegosystem, Pseudo Randomness, NIST Tests, Deflate Compression Algorithm, Arithmetic Coding.
        Pages 33-43

        M. V. Shakurskiy

        TWO-COMPONENT STEGANOGRAPHIC SYSTEM BASED ON SUM OF LINEAR FUNCTIONS OF TWO SIGNALS WITH MULTIPLICATIVE CONSTRAINT OF EMBEDDED SIGNALS

        Annotation:

        Important task of designing a steganographic system is the selection of a key. The main requirement for the key is to ensure consistently high sensitivity of the system to the key variation and minimum change in this sensitivity during the formation of the container. The paper provides an analysis of the invariant two-component steganographic system in terms of sensitivity to variations in various parameters and values of embedded signals.

        Keywords:

        Two-Component Steganographic System, Invariance to Masking Signal, Steganographic Container, Key Coefficient.
        Pages 44-49

        E. B. Aleksandrova, I. S. Rekhviashvili, A. V. Yarmak

        LINKING-BASED REVOCATION IN LATTICE-BASED RING SIGNATURE FOR INDUSTRIAL INTERNET OF THINGS

        Annotation:

        A ring signature-based group authentication mechanism with linking-based revocation is proposed. The possibility of using this approach in Smart Grid as an example of industrial Internet of Things systems is discussed.

        Keywords:

        Authentication, Industrial Internet of Things, Ring Signature, Linking-Based Revocation, Lattices.
        Pages 50-57
      • SPECIAL IT

        Kostin V.N.

        TASKS OF CONCEPTUAL DESIGN OF PHYSICAL PROTECTION OF CRITICALLY IMPORTANT OBJECTS

        Annotation:

        Task relevance of protecting critical facilities is determined. The technological process of designing physical protection systems for critical facilities is considered. For each stage of the design, solvable problems and problems are considered. Based on the analysis, possible directions for solving these problems are proposed.

        Keywords:

        Design of Physical Protection Systems, Critically Important Object.
        Pages 58-67

        I. A. Sikarev, V. V. Sakharov, A. V. Garanin

        ABOUT ENHANCING RELIABILITY AND INFORMATION SECURITY OF DATA TRANSMISSION SYSTEMS IN COMMUNICATION CHANNELS OF UNMANNED VESSEL

        Annotation:

        Types of electromagnetic interference affecting the communication channels of an unmanned vessel are described. The interference is classified according to their source, spectral and temporal characteristics. The approach to evaluating the noise immunity characteristics of transponders for unmanned vessels is described.

        Keywords:

        Global Navigation Satellite System, Unmanned Navigation, Automated Vessel Traff Control Systems.
        Pages 68-72
      • INFORMATION SECURITY CYBER-PHYSIC SYSTEMS

        M. A. Poltavtseva

        Characteristics of cyber-physical systems security monitoring

        Annotation:

        Сyber-physical system is considered as an object of information security management. The corresponding threat model from the point of view of the automatic control theory is presented. The characteristics of security monitoring are proposed.

        Keywords:

        Information Security, Cyber-Physical Systems, CFS, Threat Model, Monitoring, Security Management.
        Pages 73-88

        V. M. Krundyshev

        DETECTION OF CYBER THREATS IN INDUSTRIAL SYSTEMS BASED ON NEURAL NETWORK METHODS USING MEMORY

        Annotation:

        Use of modern artificial neural networks to detect cyber threats in the networks of the industrial Internet of Things is proposed. The modeling of the industrial system under the influence of cyberattacks has been carried out. As a result of the experiments, the optimal configuration parameters of a recurrent LSTM network with a confirmed number of layers and states were determined.

        Keywords:

        Artificial Intelligence, Cyber Threats, Neural Networks, Industrial Systems, IIoT, LSTM.
        Pages 89-95

        M. E. Sukhoparov, V. V. Semenov, K. I. Salakhutdinova, I. S. Lebedev

        IDENTIFICATION OF ANOMALOUS FUNCTIONING OF INDUSTRY 4.0 DEVICES BASED ON BEHAVIORAL PATTERNS

        Annotation:

        Problem of detecting the abnormal functioning of «Industry 4.0» devices based on behavioral patterns using acoustic channel information is explored. The possibility of using external systems for monitoring the status of objects under the influence of threats to information security breaches is considered. An experiment was conducted aimed at analyzing the status of «Industry 4.0» devices in normal and abnormal operating modes.

        Keywords:

        Behavioral Patterns, Acoustic Channel, Industry 4.0 Devices, Information Security Monitoring Systems, Signal Analysis.
        Pages 96-102

        E. A. Popova, V. V. Platonov

        ANALYZED FEATURE SELECTION IN INTRUSION DETECTION SYSTEMS

        Annotation:

        Analysis of feature selection methods of network traffic is provided. A prototype of an attack detection system with a module for network traffic feature selection is developed. The method of network traffic feature selection is proposed. The accuracy and time of detecting network attacks by proposed prototype was assessed.

        Keywords:

        Intrusion Detection System, Networks Attacks Detection, Feature Selection of Network Traffic, Genetic Algorithm.
        Pages 103-110

        K. V. Vasilieva, E. Yu. Pavlenko, P.V. Semianov

        ANALYSIS OF CYBERSECURITY METHODS FOR CONNECTED CARS

        Annotation:

        The paper reviews the main trends of modern cars’ infrastructure. It discusses modern attacks, which are possible now due to implementation of V2X and IVI technologies, and the main methods for their detection and prevention are analyzed. Considers their possibility and limitation of addressing the described problem. A set of requirements for the new information security method, suited for new-generation connected cars, is proposed.

        Keywords:

        Vehicle Cyber Security, Mobility-as-a-Service, Automotive, Connected Cars, In-Vehicle Infotainment, Controller Area Network, Intrusion Detection System, Fingerprinting ECU.
        Pages 111-119
  • 2019 year
  • 2018 year
  • 2017 year
  • 2016 year
  • 2015 year
  • 2014 year
  • 2013 year
  • 2012 year
  • 2011 year
  • 2010 year
  • 2009 year
  • 2008 year
  • 2007 year
  • 2006 year
  • 2005 year
  • 2004 year
  • 2003 year
  • 2002 year
  • 2001 year
  • 2000 year
  • 1999 year