P. D. Zegzhda, V. G.Anisimov, P.V. Semianov,
E. G. Anisimov, T. N. Saurenko T. N..
Annotation:
Methodological approach to evaluating the effectiveness of information protection in the information and control subsystem of a complex dynamic system is offered. As a performance indicator it is proposed to use the degree of opportunity implementation driven dynamic system in view of prevention of damage, expressed in the change life cycle management from destructive influences that violates the completeness, integrity, precision, reliability, accessibility and efficiency of processing required for managerial decision-making information.Keywords:
Management of a Complex Dynamic System, Information and Control Subsystem, Information Protection, Efficiency.D. S. Lavrova, N. N.Eliseev
Annotation:
An approach to detecting computer attacks is proposed, which consists in identifying abnormal network traffic using Tsetlin machine. Experimental studies conducted for various types of network attacks have demonstrated the effectiveness of the proposed approach.Keywords:
Network Attacks, Network Traffic Classification, Tsetlin Machine, Tsetlin Automate.I. V. Alekseev, P. D. Zegzhda
Annotation:
This paper provides an overview of network attacks and vulnerabilities of TCP / IP model. The purpose of this study is to identify the most common types of vulnerabilities for network protocols. So, for example, the ability to change the values of the IP address field to the victim's address is not vulnerability that is not accepted by the protocol specification, but the misuse of flags fragmentation – is a vulnerability.Keywords:
Network Attacks, TCP/IP Model, Vulnerability Search, Network Security.V. I. Korzhik, D. C.Nguyen, K. A. Akhrameeva
Annotation:
Two methods for cipher modification, which can be used to pre-embed messages are proposed. These modifications preserve the cryptographic resistance of the embedded messages, but violate the pseudo-randomness of cryptograms, which protects stegosystem from detection based on the use of NIST tests. The experimental results on the stegosystem detection efficiency after cipher modification and depending on the embedding rate are also presented.Keywords:
Block Cipher, Stegosystem, Pseudo Randomness, NIST Tests, Deflate Compression Algorithm, Arithmetic Coding.M. V. Shakurskiy
Annotation:
Important task of designing a steganographic system is the selection of a key. The main requirement for the key is to ensure consistently high sensitivity of the system to the key variation and minimum change in this sensitivity during the formation of the container. The paper provides an analysis of the invariant two-component steganographic system in terms of sensitivity to variations in various parameters and values of embedded signals.Keywords:
Two-Component Steganographic System, Invariance to Masking Signal, Steganographic Container, Key Coefficient.E. B. Aleksandrova, I. S. Rekhviashvili, A. V. Yarmak
Annotation:
A ring signature-based group authentication mechanism with linking-based revocation is proposed. The possibility of using this approach in Smart Grid as an example of industrial Internet of Things systems is discussed.Keywords:
Authentication, Industrial Internet of Things, Ring Signature, Linking-Based Revocation, Lattices.Kostin V.N.
Annotation:
Task relevance of protecting critical facilities is determined. The technological process of designing physical protection systems for critical facilities is considered. For each stage of the design, solvable problems and problems are considered. Based on the analysis, possible directions for solving these problems are proposed.Keywords:
Design of Physical Protection Systems, Critically Important Object.I. A. Sikarev, V. V. Sakharov, A. V. Garanin
Annotation:
Types of electromagnetic interference affecting the communication channels of an unmanned vessel are described. The interference is classified according to their source, spectral and temporal characteristics. The approach to evaluating the noise immunity characteristics of transponders for unmanned vessels is described.Keywords:
Global Navigation Satellite System, Unmanned Navigation, Automated Vessel Traff Control Systems.M. A. Poltavtseva
Annotation:
Сyber-physical system is considered as an object of information security management. The corresponding threat model from the point of view of the automatic control theory is presented. The characteristics of security monitoring are proposed.Keywords:
Information Security, Cyber-Physical Systems, CFS, Threat Model, Monitoring, Security Management.V. M. Krundyshev
Annotation:
Use of modern artificial neural networks to detect cyber threats in the networks of the industrial Internet of Things is proposed. The modeling of the industrial system under the influence of cyberattacks has been carried out. As a result of the experiments, the optimal configuration parameters of a recurrent LSTM network with a confirmed number of layers and states were determined.Keywords:
Artificial Intelligence, Cyber Threats, Neural Networks, Industrial Systems, IIoT, LSTM.M. E. Sukhoparov, V. V. Semenov, K. I. Salakhutdinova, I. S. Lebedev
Annotation:
Problem of detecting the abnormal functioning of «Industry 4.0» devices based on behavioral patterns using acoustic channel information is explored. The possibility of using external systems for monitoring the status of objects under the influence of threats to information security breaches is considered. An experiment was conducted aimed at analyzing the status of «Industry 4.0» devices in normal and abnormal operating modes.Keywords:
Behavioral Patterns, Acoustic Channel, Industry 4.0 Devices, Information Security Monitoring Systems, Signal Analysis.E. A. Popova, V. V. Platonov
Annotation:
Analysis of feature selection methods of network traffic is provided. A prototype of an attack detection system with a module for network traffic feature selection is developed. The method of network traffic feature selection is proposed. The accuracy and time of detecting network attacks by proposed prototype was assessed.Keywords:
Intrusion Detection System, Networks Attacks Detection, Feature Selection of Network Traffic, Genetic Algorithm.K. V. Vasilieva, E. Yu. Pavlenko, P.V. Semianov
Annotation:
The paper reviews the main trends of modern cars’ infrastructure. It discusses modern attacks, which are possible now due to implementation of V2X and IVI technologies, and the main methods for their detection and prevention are analyzed. Considers their possibility and limitation of addressing the described problem. A set of requirements for the new information security method, suited for new-generation connected cars, is proposed.Keywords:
Vehicle Cyber Security, Mobility-as-a-Service, Automotive, Connected Cars, In-Vehicle Infotainment, Controller Area Network, Intrusion Detection System, Fingerprinting ECU.Zegzhda P. D., Anisimov V. G., Anisimov E. G., Saurenko T. N.
Annotation:
The article developed an optimization mathematical model and an algorithm for integrating information security measures. As an indicator of the effectiveness of integration in the model, the level of costs for fulfilling the tasks of ensuring information security of the protected object is adopted. In this case, the costs of the development (preparation) of these measures and the costs of their implementation by the information security system are separately taken into account. The optimization algorithm is based on the general principles of the branch and bound method. Its feature is the proposed method for estimating boundaries for alternative branches. The model is universal in nature and can be used to develop methods for supporting the adoption of appropriate management decisions to ensure information security for specific information infrastructures of organizational, technical, social, economic and other objects.Keywords:
information security, a set of measures to ensure information security, optimization, model, algorithmLavrova D.S., Solovey R.S.
Annotation:
The paper presents the concept of applying a game theory approach in infrastructure of wireless dynamic networks to counter computer attacks. The applying of this approach will allow to create mechanism for adaptive reconfiguration of network structure in the context of implementation various types of computer attacks and to provide continuous operation of network even in conditions of destructive information impacts.Keywords:
information security, wireless dynamic networks, game theory, network games, network reconfigurationI. T. Latypov, M. A. Eremeev
Annotation:
The article discusses approaches to the recognition of malicious activity in computer networks and the assessment of the security of information systems using attributive metagraphs. The proposed use of the matrix techniques, tactics and methods of computer attack for its modelingKeywords:
computer attack, security assessment, malware, metagraphM. E. Sukhoparov, V. V. Semenov, K. I. Salakhutdinova, I. S. Lebedev
Annotation:
Telecommunication devices are becoming one of the critical elements of industrial systems, which makes them an attractive target for potential attackers. A method for detecting anomalies based on local signal spectra using neural networks to evaluate is considered. An experiment was conducted based on the statistics of the loading of the computing device.Keywords:
syn spectra, Industry 4.0 devices, monitoring of telecommunication nodes, signal analysis.E.N. Shkorkina, E.B. Aleksandrova
Annotation:
A methodology for protecting a quantum-secure communication system based on the implementation of post-quantum cryptographic algorithms at all stages of its work is proposed. The use of authenticated encryption and signcryption schemes reduces the number of keys in quantum-secure system and increases the number of interacting devices.Keywords:
quantum key distribution, authentication encryption, signcryptionShakurskiy M.V.
Annotation:
The paper discusses an invariant two-component steganographic system based on linear mixing of two embedded signals with the sound signal of the container, which allows for effective protection of the hidden signal in real time.Keywords:
two-component steganographic system, invariance to masking signal, steganographic container, key coefficient.I.V. Alekseev
Annotation:
This paper proposes to use wavelet transform together with clustering of the obtained and converted coefficients for anomaly detection in traffic of backbone networks. The coefficients of the wavelet transform obtained from the parameters of the network packets are checked for the degree of multiple correlation which is used to calculate the mean-square deviation and clusterize the obtained coefficients for detecting the traffic anomalies. The effectiveness of the proposed method is demonstrated by the results of experiments to detect denial of service attacksKeywords:
backbone networks, wavelet-based analysis, multiple correlation, clustering, attack detection, DoS attack.Grechishnikov E.V., Belov A.S., Skubyev A.V., Trakhinin E.L.
Annotation:
The article considers a theoretical approach, the application of which will allow to assess the vitality of the version of construction of a distributed communication network in conditions of external destructive impacts, taking into account the effective functioning of the management system for the elimination of the consequences of these impacts.Keywords:
Vitality, the distributed communication network, management system.A.P. Nyrkov, S.S. Sokolov, O.M. Alimov, S.G. Chernyi, V.A. Dorovskoy
Annotation:
Protecting the water area of port or other important maritime facilities is quite an urgent task. The widespread introduction of uninhabited underwater vehicles for these purposes has become possible due to the fact that they withstand harsh climatic conditions and special loads.The article presented the methods of optimization and identification of optical images in the recognition objects by uninhabited underwater vehicles. A control scheme for the compensation of the input image signal is proposed for optimal identification with communication loops, that allow digital elements to withstand external objects.Keywords:
optimal identification, optical images, recognition problems, underwater vehicles, mathematical modelI. A. Sikarevi, G. B. Chistyakov, A. V. Garanin
Annotation:
The article describes promising methods for the application of unmanned technologies for the development of water transport on the inland waterways of the Russian Federation, as well as information processing methods to increase the information security of the transmission of navigation dataBelova Ye. P., Mashkina I. V.
Annotation:
The work proposes an authentication / authorization system for users with administrative privileges. A mechanism is proposed for enhanced authentication and delegation of authority, which allows the superuser to be excluded by creating separate roles: network administrator, security administrator, virtual infrastructure administrator, process control administrator (automated process control system). The user authentication / authorization system is based on the characteristics of the fourth formant and the frequency of the leading formant of vowels.Keywords:
Biometric image of a person, neural network database of biometric images, characteristics of the fourth formant of the vowel sound, frequency of the leading spectral characteristic formants.K. Vasilieva, E. Pavlenko
Annotation:
The paper reviews the prospects of using domain architecture as a basis for implementing the car network security mechanism, based on the ECU authentication. It contains the analysis of the existing methods of domain formation and proposes a method for a comprehensive assessment of the security classes of car’s components, taking into account, in addition to the functional purpose of the ECU, a list of its interfaces, interaction with other ECUs, the difference between integrity levels of slave devices. Also it proffers a network clustering approach based on combining elements of the one security class into a domain .Keywords:
vehicle cyber security, connected cars, сontroller area network, domain architecture, cluster-tree, integrity level, fingerprinting ECUM. A. Poltavtseva, D. P. Zegzhda
Annotation:
The paper comprises problem of data processing for cyberphysical systems security monitoring. It shows the method of modeling and evaluating the system for security monitoring data processing and the principles of an adaptive solution development. An example of an adaptive system for CPS monitoring development and optimization is given.Keywords:
information security, cyberphysical systems, CPS, security monitoring, security management, data processing, Big data.Lavrova D.S., Shtyrkina A.A.
Annotation:
In this paper, we investigated the problem of revealing the unknown structure of artificial neural networks (ANNs) using graph theory. The basic concepts of ANN, typical architectures and the differences between them were considered. In the work, the rationale for the use of the graph theory apparatus for solving the problem of revealing the structure of ANNs was given. Examples of comparing various ANN architectures and types of graphs was given. It is proposed to use the methods of spectral graph theory and graph signal processing as mechanisms for analyzing unknown structure of ANNs.Keywords:
artificial neural network, reverse-engineering of ANNs, deep learning, graph theory, spectral graph theory, signal graphs.A. D. Fatin, E. Pavlenko
Annotation:
This article provides a detailed review with a deep comparison of existing models of information security of cyberphysical systems in the field of the industrial Internet of things, followed by an analysis of ways to solve problems. Alternative approaches to the construction of models and solutions in this area are proposed. The purpose of this study is to systematize, generalize and supplement existing experience in the field of description and solution of information security problems of cyber-physical systems; creation of a unified information base for the subsequent implementation of our own approach to building a model and solving problems in the field of the industrial Internet of things.Keywords:
industrial Internet of things, IIoT, information security models, cyberphysical systems.