Quarterly journal published in SPbPU
and edited by prof. Peter Zegzhda
Peter the Great St. Petersburg Polytechnic University
Institute of computer sciences and technologies
information security of computer systems
Information Security Problems. Computer Systems
Published since 1999.
ISSN 2071-8217
  • 2020 year
  • 2019 year
    • №1 2019
      • NETWORK AND TELECOMMUNICATION SECURITY

        Malyshev E. V., Moskvin D. A., Zegzhda D. P.

        NEURAL NETWORK APPLIANCE FOR ATTACK DETECTION ON VANET-NETWORKS

        Annotation:

        This work contains results of artificial neural network development, with is designed for automatically attacks detection in VANET-networks. In the course of the thesis were used such research methods as analysis and modeling, they were applied to select the most prospective method of Gray Hole attack detection in VANET-networks. According to the results of experimental studies, there was evaluated an effectiveness of this method, a method was characterized as great.

        Keywords:

        VANET-networks
        Pages 11-17

        Lavrova D. S., Khushkeev A. A.

        DETECTION OF INFORMATION SECURITY BREACHES IN DISTRIBUTED CONTROL SYSTEMS BASED ON VALUES PREDICTION OF MULTIVARIATE TIME SERIES

        Annotation:

        Proposed an approach for information security breaches detection in distributed control systems based on prediction of multivariate time series formed of sensor and actuator data.

        Keywords:

        data prediction, multivariate time series, network attacks, convolutional neural networks.
        Pages 18-30
      • APPLIED CRYPTOGRAPHY

        Aleksandrova E.B., Shmatov V.S.

        Zero-knowledge protocol for control of products and services reviews

        Annotation:

        A control protocol in the systems for goods and services reviews, based on non-interactive zero-knowledge proof, is proposed. The user keys are stored as Merkle tree. The protocol ensures anonymity of the author of the reviews and does not allow one user to leave more than one review per product or service.

        Keywords:

        zero-knowledge, control of reviews, Merkle tree
        Pages 31-40

        Ivanov A.V.

        On goodness-of-fit test for testing pseudorandom binary sequences

        Annotation:

        In the article some properties of the «alternations» statistic are proved. For example, we investigate properties of the scheme when «alternations» are independent. This fact allows us to construct new goodness-of-fit test.

        Keywords:

        goodness-of-fit test, series, binary sequence
        Pages 41-44
      • ASPECTS OF INFORMATION SECURITY

        Vladimir I. Budzko, Dmitry A. Melnikov
        Victor S. Gorbatov
        Igor Y. Zhukov

        ON THE ISSUE OF THE BLOCKCHAIN UNIVERSALITY

        Annotation:

        Currently, there is a tendency to over-promote the phenomenon of blockchain technology (BC), which is supposedly universal and has all-pervasive possibilities for revolutionary transformation of the various areas of social activity, including business and state governance. As an example, the relatively successful development of the so-called cryptocurrencies, which have already won a certain share of public relations at both the national and global levels, is given. The presence of such mass statements is explained by the fact that the description of the obvious advantages of the BС is carried out without a detailed and comprehensive risk analysis of the practical implementation of its basic concepts, including information security of the appropriate applications. The proposed work shows methods for ensuring a consensus between fundamentally distrustful users, who ensure the relative stability of cryptocurrency systems even in the absence of a centralized (state and, moreover, international) level of regulation. An appropriate classification of systems based on the BC and their features are given. Along with this, this paper focuses on the need for a thorough and comprehensive analysis of the information security risks associated with the BC use. It is shown that at the present stage of the BC systems development, they do not provide reliable user authentication, reliable system management, guarantees of secure generation, distribution and storage of cryptographic keys, guaranteed possibility of returning the values stolen by hackers, and also do not implement the principle of non-repudiation. The conclusion is made about the expediency of its further comprehensive application, based on the fact that the BC unreasonable use can cause considerable damage at the level of the whole sector of the economy. This article is a continuation of publications about the properties and features of blockchain technology.

        Keywords:

        blockchain; cryptocurrency; digital wallet; digital signature; transaction; fork; smart contract; authentication; non-repudiation; information security
        Pages 45-54
      • EDUCATION PROBLEMS

        Kulik S. D.

        SPECIAL ELEMENTS OF SYSTEM ANALYSIS FOR STUDENTS OF THE INFORMATION SECURITY

        Annotation:

        The main purpose of the article is to present the necessary elements of system analysis necessary for training future university specialists in the field of information security for example, applied information (computer) technologies. The main focus is on the effectiveness of the system, which can be assessed using indicators expressed in posynomials. The indicator is represented by a posynomial. Then apply well-developed tools to minimize posynomial. We used the necessary principles and methods of system analysis, as well as geometric programming. In this case, geometric programming is considered as a tool for solving problems of system analysis in the field of information security. The result of the optimization of the information security effectiveness indicator is presented on a training example while minimizing the posynomial. The students learn the system analysis elements. Students solve optimization problems. Recommendations were developed for solving typical educational problems for students. In conclusion, it is concluded that it is necessary to pay more attention in the framework of the educational process to the elements of system analysis.

        Keywords:

        system analysis, system, indicator, criterion of effectiveness, geometric programming, information security.
        Pages 55-59
      • INFORMATION SECURITY CYBER-PHYSIC SYSTEMS

        Pavlenko E. Yu., Shtyrkina A. A., Zegzhda D. P.

        ESTIMATING THE CYBER-PHYSICAL SYSTEM SUSTAINABILITY BASED ON SPECTRAL GRAPH THEORY

        Annotation:

        Paper proposed an approach to estimating the sustainability of cyber-physical systems based on system state analysis. As a criterion, it is proposed to use the structural characteristic of the graph, which describes the CPS. For a numerical assessment of sustainability, authors propose to use properties of graph spectrum distribution – set of eigenvalues of adjacency matrix corresponding to the graph.

        Keywords:

        sustainability; cyber sustainability; cyber resilience; cyber-physical system; information security; spectral graph theory
        Pages 60-67

        Poltavtseva M.A., Kalinin M.O.

        MODELING OF BIG DATA MANAGING SYSTEMS IN INFORMATION SECURITY

        Annotation:

        The article presents a model of Big data management system designed to solve the problems of information security (IS) systems of this class. The features of this class of systems are highlighted, the mathematical definition of the model and architecture of data processing in accordance with the concept of ANSI/SPARC and the principles of modeling information systems in is are given. The analysis of the model is carried out.

        Keywords:

        data management systems, Big data, information security, system modeling
        Pages 69-78

        Aleksandrova E. B., Lavrova D. S., Yarmak A. V.

        USING BENFORD’S LAW TO DETECT DOS-ATTACKS ON INDUSTRIAL SYSTEMS

        Annotation:

        Benford's law describes the frequency distribution of leading digits in numerical data taken from real processes. In particular, it is widely used to detect anomalies in financial data. The paper proposed applying Benford's law to detect DoS-attacks in components of large-scale industrial systems. The experimental results for the data generated by the system sensors from industrial Tennessee Eastman process are given.

        Keywords:

        information security, Benford’s law, time series, large-scale industrial systems
        Pages 79-88
      • SOFTWARE SECURITY

        E.V. Zhukovskiy, M.O. Kalinin, I.I. Marshev

        Detection of malicious executable files based on machine learning algorithms

        Annotation:

        Detection of malicious software is an essential part of the security of computer systems. This paper presents machine learning-based classifiers which are developed due to the analysis of main characteristics of executable files. The conducted research uses various classification algorithms like decision tree, adaptive and gradient boosting, random forest, Naive Bayes, k-nearest neighbors and neural networks.

        Keywords:

        computer security, malware detection, classification, machine learning, neural network, random forest, decision tree, static analysis.
        Pages 89-99

        Pavlenko E.Y., Suslov S.M.

        IDENTIFICATION OF MALICIOUS APPLICATIONS FOR ANDROID OPERATING SYSTEM USING THE CAPSULE NEURAL NETWORK

        Annotation:

        Proposed an approach to detecting malware for the Android operating system using a capsular neural network. The approach is to build a CMYK image, the pixels of which are formed based on the sequence of actions performed by the application under study. The results of experimental studies of the proposed campaign demonstrate its high efficiency for solving the problem of determining malicious Android applications.

        Keywords:

        malicious applications, malware detection, Android operating system, application security analysis, capsule neural network, Android security
        Pages 100-111

        E.V. Zhukovskiy

        DETECTION MALWARE WITH SELF-PROTECTION MECHANISM USING DEEP ANALYSIS OF SOFTWARE FUNCTIONALITY

        Annotation:

        he article describes an approach to identify malicious software based on the analysis of its functionality. To ensure the completeness of the analysis, it is proposed to use dynamic symbolic execution to determine the conditions for reaching the target program blocks. To optimize the process of searching for the ways of program execution leading to the execution of malicious operations, the methods reinforcement learning are used

        Keywords:

        computer security, malware detection, malicious activity, machine learning, symbolic execution, reinforcement learning, targeted attacks
        Pages 112-122
    • №2 2019
      • INFORMATION SECURITY APPLICATION

        Myasnikov A.V.

        APPLYING OF MACHINE LEARNING TECHNOLOGIES TO OPTIMIZE THE PENETRATION TESTING PROCESS

        Annotation:

        This article examines the existing systems that allow to partially or fully automate the penetration testing process using machine learning techniques. Their architecture and applied methods of machine learning are considered. On the basis of the analysis performed, solutions have been proposed for improving existing systems.

        Keywords:

        machine learning, penetration testing, vulnerability scan, exploitation of vulnerabilities, social engineering, spear-phishing, automation
        Pages 9-15

        Poltavtseva M.A., Zegzhda D.P., Kalinin M.O.

        MODEL OF THREATS TO THE BIG DATA MANAGING SYSTEMS SECURITY

        Annotation:

        The paper deals with the concept and features of big data management systems, their differences from traditional DBMS. The authors describe changes in the intruder's model and new vulnerabilities of data management systems. A new threat model is being developed. The article presents new problems of information security in a distributed Big data processing and storage systems.

        Keywords:

        Information security, Big data, vulnerability classification, intruder model, threat model
        Pages 16-28

        Poltavtseva M.A.

        Consistent approach to secure big data processing and storage systems development

        Annotation:

        The article considers the problem of secure Big data management systems development using a consistent approach. The author gives the features of Big data management systems, their differences from traditional DBMS. The paper presents the principles of a new, consistent approach to the secure Big data management systems development. The architecture of the security subsystem is proposed.

        Keywords:

        Information security, Big data, data architecture, security principles, data model, process model
        Pages 29-44
      • NETWORK AND TELECOMMUNICATION SECURITY

        N. A. Grusho

        METHOD OF INTEGRATION OF MULTI-AGENT INFORMATION SEARCH WITH SECURITY ANALYSIS TOOLS AND INFORMATION SERVICES FOR DIGITAL INFRASTRUCTURES

        Annotation:

        The paper reviews the multi-agent systems, their application, architectures, data storage methods. Different security analysis tools and information services are discussed with concern of automatic or automated data exchange. For modern digital infrastructures, the method of integration of multi-agent systems with security analysis tools (information services) has been proposed.

        Keywords:

        security analysis, security, integration, multi-agent system, digital infrastructure
        Pages 45-55

        A.M. Sukhov, S.U. Gerasimov, M.A. Eremeev, V.I. Yakunin

        MATHEMATICAL MODEL OF THE PROCESS OF FUNCTIONING OF DETECTION SYSTEM PREVENTION AND MITIGATION OF COMPUTER ATTACKS

        Annotation:

        The article discusses an integrated approach to the studu of the functioning of systems. The feature of the proposed method of modeling is a complex disci-those are all factors affecting the efficiency of the process under study.

        Keywords:

        detection system prevention and mitigation of computer attacks, the effectiveness of the targeted application, the intrusion, theory of the effectiveness of targeted processes
        Pages 87-101

        Ovasapyan T.D.

        USING FUZZY LOGIC TO BLOCK ATTACKS OF INTERNAL INTRUDERS IN WSN

        Annotation:

        he article considers the security of wireless sensor networks (WSN) against malicious nodes attacks. The authors of the article analyzed the threats of WSN and identified actual cyber-attacks. The proposed approach aimed at providing protection against malicious nodes using a fuzzy logic apparatus. As part of the proposed approach, nodes are able to change their behavior and maintain the stability of their operations in the context of cyber-attacks.

        Keywords:

        Wireless Sensor Network, WSN, cyber-physical system, adaptive control, fuzzy logic
        Pages 102-116

        Ivanov D.V., Moskvin D.A., Kubrin G.S.

        ULNERABILITIES DETECTION FOR DYNAMIC WEB-SITES

        Annotation:

        In the paper, the problem of vulnerability detection for modern web-sites that use asynchronous content loading techniques is studied. A method based on JavaScript interpretation is proposed for generating a list of input vectors for dynamic vulnerability analysis.

        Keywords:

        web-sites security; web-vulnerabilities; dynamic web-vulnerability scanners.
        Pages 117-128
      • APPLIED CRYPTOGRAPHY

        Aleksandrova E.B., Rekhviashvili I.S.

        REVOCATION MECHANISM FOR RING SIGNATURE

        Annotation:

        An approach is proposed to solve the problem of revoking the right to sign from a group member in ring signature schemes by adding a revocation center that checks the presence of a member certificate in the revocation list.

        Keywords:

        RING SIGNATURE, LINKING-BASED REVOCATION
        Pages 80-85
      • ASPECTS OF INFORMATION SECURITY

        Mashkina I. V., Belova Ye. P.

        Biometric image of a person, neural network database of biometric images, biometric parameter, frequency of the fourth formant of vowel sound, voice authentication.

        Annotation:

        he analysis of publications devoted to the study of the world market of biometric systems and their dynamics of development. The features of biometric identification and authentication systems are considered. It is proposed to use the frequency of the fourth formant of vowel sound as a biometric parameter. The architecture of an artificial neural network is developed - a database of biometric images of personality. An experiment was conducted to identify errors of the 1st and 2nd type.

        Keywords:

        Biometric image of a person, neural network database of biometric images, biometric parameter, frequency of the fourth formant of vowel sound, voice authentication.
        Pages 86-93

        Makarov A.S.

        MICROCONTROLLER SECURITY ARCHITECTURE

        Annotation:

        A hardware approach for building secure microcontrollers is proposed. In the framework of the proposed approach, additional modules are proposed for the microcontroller architecture.

        Keywords:

        Internet of things, embedded systems, microcontrollers, microcontroller architecture, security hardware.
        Pages 94-99

        Pavlenko E.Y., Lemets A.A.

        ETHERIUM SMART CONTRACTS SECURITY ANALYSIS

        Annotation:

        Proposed a fuzzing method for smart contracts of the Ethereum platform, based on the use of a bee colony algorithm for generating test data. Presented the main stages of the described method, and a method for applying the bee colony algorithm for generating test data. The results of the experimental evaluation of the effectiveness of the proposed method are presented, which demonstrate an increase in the coverage of the code of smart contracts during fuzzing, as well as a decrease in the number of errors of the first kind without a significant increase in errors of the second kind.

        Keywords:

        Ethereum, security of smart contracts, dynamic analysis of smart contracts, bees algorithm, fuzzing.
        Pages 100-106

        Ilchenko L.M., Gallyamova M.R., Yurin I.V., Zajcev S. I.

        DETERMINATION OF SIGNIFICANT OBJECTS OF CRITICAL INFORMATION INFRASTRUCTURE OF THE RUSSIAN FEDERATION ON THE EXAMPLE OF A TELECOMMUNICATION ENTERPRISE

        Annotation:

        The purpose of this work is to determine the category of significance of information objects of telecommunications enterprises as part of the critical information infrastructure of the Russian Federation in accordance with applicable law. To identify critical processes, the method of the mathematics by Thomas Saaty - “Analityc hierarchy process” (AHP) was used, which allowed to consider all the leading factors affecting the final result of the categorization.

        Keywords:

        Information security, critical information infrastructure, telecommunication enterprise.
        Pages 107-116
      • SPECIAL IT

        I.A. Sikarev, A.V.Garanin

        BASIC CONSTRUCTION PRINCIPLES OF A TRAFFIC MANAGEMENT SYSTEM OF A REMOTELY PILOTED SEA SHIP IN THE PORT AREA BY NMEA-2000 NETWORK PROTOCOL.

        Annotation:

        The article discusses the current state of the issue of the use of unmanned ships in the water transport field, as well as highlighted the most promising areas of application of remote piloting technology of ships. Details discussed the organization of information systems for data transmission, proposed protocols for use. Within the framework of the article, technical solutions for equipping specialized unmanned vehicles for wiring and mooring of heavy cargo ships are proposed.

        Keywords:

        unmanned transport, remote control, NMEA-2000, AIS
        Pages 117-123
      • SOFTWARE SECURITY

        R.A. Ognev, E.V. Zhukovskiy, D.P. Zegzhda

        кластеризация, вредоносное программное обеспечение, вредоносное поведение, машинное обучение, поведенческий анализ, динамический анализ, компьютерная безопасность.

        Annotation:

        The article describes a malware clustering approach based on the analysis of WinAPI-function call traces. The conducted research uses various clustering algorithms like k-nearest neighbors, EM (Expectation-Maximization) algorithm, hierarchical clustering and affinity propagation. Evaluation of the quality of clustering was carried out using metrics like Silhouette, Calinski–Harabasz index, Davies–Bouldin index.

        Keywords:

        The article describes a malware clustering approach based on the analysis of WinAPI-function call traces. The conducted research uses various clustering algorithms like k-nearest neighbors, EM (Expectation-Maximization) algorithm, hierarchical clustering and affinity propagation. Evaluation of the quality of clustering was carried out using metrics like Silhouette, Calinski–Harabasz index, Davies–Bouldin index.
        Pages 124-135
      • INFORMATION SECURITY CYBER-PHYSIC SYSTEMS

        Zaitceva E.A., Zegzhda D.P., Poltavtseva M.A.

        APPLYING OF GRAPH REPRESENTATION AND CASE-BASED REASONING FOR SECURITY EVALUATION OF COMPUTER SYSTEMS

        Annotation:

        In this work, a case-based reasoning approach to security evaluation of computer systems is proposed. To implement case-based reasoning it was proposed to use a graph representation in combination with the improved bag-of-objects method. The results of experimental studies confirming the effectiveness of the approach are presented.

        Keywords:

        information security, case-based reasoning, graph theory, security evaluation.
        Pages 219-237

        Dakhnovich A.D., Moskvin D.A., Zegzhda D.P.

        APPROACH FOR RESILIENT Industrial Internet of Things ARCHITECTURE

        Annotation:

        In the paper, specifics of providing cybersecurity of Industrial Internet of Things in contrast of Industrial Control Systems “Defense-in-Depth” approach. Threat taxonomy classes are also provided. Based on the cybersecurity threats analysis the requirements for Industrial Internet of Things resilience against network threats are described, as well as and approach for architecting industrial systems networks with cybersecurity by design.

        Keywords:

        internet of things, digital manufacturing, cybersecurity, industry 4.0, cyber-physical systems.
        Pages 238-249

        D. Zegzhda, E. Pavlenko, D. Lavrova, A. Shtyrkina

        DEVELOPMENT OF A SUSTAINABLE FUNCTIONING CRITERION OF CYBER-PHYSICAL SYSTEMS

        Annotation:

        The article proposes a sustainability criterion for cyber-physical systems, which is the number of routes of a certain quality, which allow to perform the objective function. Routes are built on a graph that simulates the system. Attacking impacts and system restoration measures that prove the applicability of the criterion for assessing the sustainability of cyber-physical systems are considered.

        Keywords:

        sustainability, cyber sustainability, cyber resilience, cyber-physical system, information security, graph theory.
        Pages 250-264

        D.P. Zegzhda, D.S. Lavrova, A.V. Yarmak

        PREDICTING CYBER ATTACKS ON INDUSTRIAL SYSTEMS USING THE KALMAN FILTER

        Annotation:

        Kalman filter is an efficient data processing algorithm that removes noise and unnecessary information, and also performs system state prediction. This paper proposes the use of a Kalman filter to solve the problem of forecasting time series describing the gasoil heating loop process. The limitations associated with this approach are described, as well as the advantages compared to other predictive models

        Keywords:

        cybersecurity, Kalman filter, time series, time series analysis, time series forecasting.
        Pages 265-276

        Zaitceva E.A., Zegzhda D.P., Poltavtseva M.A.

        APPLYING OF GRAPH REPRESENTATION AND CASE-BASED REASONING FOR SECURITY EVALUATION OF COMPUTER SYSTEMS

        Annotation:

        APPLYING OF GRAPH REPRESENTATION AND CASE-BASED REASONING FOR SECURITY EVALUATION OF COMPUTER SYSTEMS

        Keywords:

        information security, case-based reasoning, graph theory, security evaluation.
        Pages 136-148
    • №3 2019
      • INFORMATION SECURITY APPLICATION

        M. L. Gluharev, M. F. Solomatova

        DIFFERENTIATION OF ACCESS IN UNIVERSAL OBJECT-ORIENTED DATABASES BASED ON THE EXPANDED OBJECT-ORIENTED MODEL OF HARRISON — RUZZO — ULMAN

        Annotation:

        This paper is devoted to the problem of access control in universal object-oriented databases. It considers the aspects of data processing and access control in databases.

        Keywords:

        Object-Oriented Databases; Information Safety, Access Control, Database Control Systems
        Pages 9-16

        V. N. Kostin

        DETERMINATION OF THE SIGNIFICANT VALUE OF EXTRAORDINARY SITUATIONS ON THE BASIS OF THE INFORMATION – PROBABILITY METHOD

        Annotation:

        The paper discusses one of the approaches to the estimation of hazards emergency situation, using information and a probability method. Based on guidance documents rapid emergency assessment and formed a whole series of typical disaster with the corresponding characteristics. The scale of the disaster describes the magnitude of the potential danger in the form of a portion of entropy. Formed nonlinear number of emergencies on the degree of danger.

        Keywords:

        Estimation of Danger of an Emergency Situation; Information and Probabilistic Method; Entropy
        Pages 17-23

        T. N. Saurenko, V. G. Anisimov, E. G. Anisimov, V. V. Kasatkin, A. F. Suprun

        PREDICTION OF INFORMATION SECURITY INCIDENTS

        Annotation:

        Methodical approaches to the construction of conditionally deterministic and stochastic models for predicting damage during information security incidents in information systems for various purposes are proposed. The initial information for the simulation is a priori data on the possible nature of the predicted processes, obtained on the basis of operating experience of similar information systems and expert assessments, as well as statistical data on the temporal and volumetric characteristics of damages during information security incidents in the system under study. Integration of data is based on the principle of maximum uncertainty.

        Keywords:

        Information Systems, Information Security Incidents, Damage Prediction Mmodels
        Pages 24-28
      • APPLIED CRYPTOGRAPHY

        S. V. Belim, N. F. Bogachenko

        THE HIERARCHICAL SECRET SHARING SCHEME BASED ON COMPUTABLE ACCESS LABELS

        Annotation:

        A threshold secret sharing scheme which distributes the secret between the nodes of a treelike graph is proposed. Nodes, the descendants of which cover all set of leaf nodes, can reconstruct the secret. Otherwise nodes do not obtain any information on a secret. The scheme is based on the construction of a polynomial. Coefficients of а polynomial are defined by the structure of the graph.

        Keywords:

        Secret Sharing, Hierarchy of Users, Binary Tree, Polynomial.
        Pages 29-34

        A. P. Baranov, P.A. Baranov

        CRC ERROR PROBABILITY IN MESSAGE WITH POSSIBLE DISTORTION

        Annotation:

        Control sum mechanism efficiency research aimed at distortion revealing in a message being transmitted is a relevant task that is solved using different possible information transfer operation condition models. In this paper distortions are modelled as an overlay of noise component with low signal/noise ratio , which poses most practical interest. Considered class of control sums is related to message consistency control mechanisms which are implemented, in particular, in TCP protocol. Functional dependency of control sum error probability from value is acquired for latter’s low value.

        Keywords:

        Information Security, TCP, CRC, Control Sum, Error Probability, Distortion Model.
        Pages 35-40
      • ASPECTS OF INFORMATION SECURITY

        V. I. Doroshenko, A. N. Pivovarov, Y. G. Ksenofontov

        STRENGTHEN INFORMATION SECURITY OF MONITORING CHANNELS IN THE ARCTIC RUSSIAN METEOR COMMUNICATION NETWORKS

        Annotation:

        A methodology for quantifying the security of monitoring the operability of technical equipment in the system for controlling the movement of vessels along the Northern Sea Route using meteor communication networks of the Russian Arctic is described.

        Keywords:

        Meteor Communication Network, Monitoring, Meteor Trail, Network Topology, Fragmentation, Defragmentation.
        Pages 41-48
      • SPECIAL IT

        I. A. Sikarev, A. V.Garanin

        BASIC PRINCIPLES OF BUILDING THE CONTROL ALGORITHMS OF THE REMOTELY PILOTED SEA SHIP TO INCREASE INFORMATION SECURITY OF STRONGLY DISTURBED DATA TRANSMISSION

        Annotation:

        The principle and structure of the creation of a control and monitoring algorithm for a remotely controlled sea vessel are described. Movement modes of the controlled towing vessel are considered in detail, subject to the influence of the typical for the port disturbances. The characteristics and methods for calculating the influence of interference to ensure the information security of communication channels of unmanned vessels are provided.

        Keywords:

        global navigation satellite system, unmanned navigation, automated ship traffic control systems.
        Pages 49-55

        A. Yu. Garkushev, A. V. Kurilov, A. F. Suprun, D. P. Gasyuk

        METHODOLOGY FOR ASSESSING THE QUALITY INDICATORS OF INFORMATION SYSTEMS

        Annotation:

        Paper is devoted to development of the technique allowing to estimate reasonably quality of an information system in the conditions of purposeful malefaction counteraction who apply modern means of distortion, substitution of information and failure of information exchange. The scientific basis of the offered technique is made by composition of the scientific device of decision-making in the conditions of uncertainty and the theory of mass service information security.

        Keywords:

        Quality of Information, Information Counteraction, Integrity of Information Content, Protection of Information.
        Pages 56-61
      • SOFTWARE SECURITY

        M. E. Sukhoparov, I. S. Lebedev, K. I. Salakhutdinova

        SOFTWARE IDENTIFICATION USING STANDARD MACHINE TRAINING FACILITIES

        Annotation:

        The means software control installed on personal computers of automated systems users were considered. The shortcomings of such software solutions are substantiated and the approach to the use of executable files using the machine learning algorithm, gradient boosting decision trees, based on the XGBoost, LightGBM, CatBoost libraries is presented. Program identification performed by using XGBoost, LightGBM. A comparison of the experimental results with previous studies by other authors. The obtained results show that the developed approach allows revealing established security policy violations when processing information in automated systems.

        Keywords:

        Information Security, Program Identification, Machine Learning, Gradient Boosting Decision Trees
        Pages 62-67
      • INFORMATION SECURITY CYBER-PHYSIC SYSTEMS

        E. Y. Pavlenko, M. D. Stepanov

        COUNTERING CYBER ATTACKS ON INTELLIGENT BIO-INSPIRED SYSTEMS BASED ON FANET

        Annotation:

        Using the bee colony algorithm for modeling intelligent systems based on self-organizing FANET networks (Flying Ad Hoc Networks) is proposed. A mathematical model of an intelligent fire extinguishing system has been developed, and possible cyberattacks on it have been described and modeled. For each cyberattack scenario, a counter-scenario has been developed with a strict mathematical description.

        Keywords:

        Bee Colony Algorithm, Cyberattack, FANET, Mathematical Model.
        Pages 68-74

        D. S. Lavrova, P. A. Averyanova

        EARLY DETECTION OF CYBER ATTACKS ON INDUSTRIAL SYSTEMS BASED ON ADAPTIVE FORECASTING AND MACHINE LEARNING

        Annotation:

        An approach to the early detection of cyberattacks on industrial systems is proposed, based on a predictive analysis of the time series of system components using the Kalman filter and the Random Forest machine learning algorithm to automatically classify predicted values into normal and abnormal.

        Keywords:

        Cyberattack, Kalman Filter, Adaptive Forecasting, Time Series Analysis, Machine Learning, Random Forest Algorithm.
        Pages 75-84

        V. M. Krundyshev

        CYBERSECURITY OF DIGITAL MANUFACTURING USING MODERN NEURAL NETWORK METHODS

        Annotation:

        The transition from the information economy to the digital presents new challenges to the community related to the development of breakthrough technologies, a network of cyber-physical systems, artificial intelligence, and big data. When creating digital platforms, a number of difficulties arise: the large dimension of the digital infrastructure and its heterogeneity, poorly established information interaction between the segments, the lack of a common approach to ensuring cybersecurity and high dependence on personnel qualification and reliability of equipment. The introduction of the digital economy leads to an increase in the risk of cyber threats associated with problems of access control between systems, regulation of information and control flows. For solving cyber threat detection tasks it is proposed to use generative adversarial neural networks. Training and testing algorithms of the neural network are provided. The experimental results demonstrated that the proposed solution is highly accurate in detecting cyberattacks.

        Keywords:

        Artificial Intelligence, Cybersecurity, Digital Manufacturing, Generative Aadversarial Networks, Neural Networks, GAN, IIoT
        Pages 85-92

        E. Y. Pavlenko, K. V. Kudinov

        ENSURING CYBER RESILIENCE OF A LARGE-SCALE DISTRIBUTED NETWORK INFRASTRUCTURE USING THE ANT ALGORITHM

        Annotation:

        The paper discusses the application of the ant algorithm to ensure the cyber resilience of a distributed network under various types of cyberattacks. The principle of the ant algorithm operation is described, a mathematical model of the network infrastructure is developed, and possible types of cyberattacks are identified within the model. The results of experimental studies have demonstrated the applicability of the ant algorithm to ensure the cyber resilience of large-scale distributed networks.

        Keywords:

        Cyber Resilience, Ant Algorithm, Cyberattack, Mathematical Model, Pheromone
        Pages 93-103

        E. B. Aleksandrova, A. A. Shtyrkina, A. V. Yarmak

        ISOGENY-BASED CRYPTOGRAPHIC ACCESS CONTROL SCHEME

        Annotation:

        Cryptographic access control is a relatively new concept that implements the rules for restricting the access of some entities to an object using cryptographic primitives. With the advent of a quantum computer, the discrete logarithm and factorization problems, which are used in public key cryptosystems, can be solved in polynomial time. In this regard, there is a need to search for new mathematical problems that are resistant to attacks on both classical and quantum computers. One of the promising problems is to compute the isogeny of supersingular elliptic curves. The article proposed cryptographic access control scheme based on isogeny, an analysis of protocol security and the results of practical implementation in SAGE.

        Keywords:

        Cryptography, Post-Quantum Cryptography, Cryptographic Access Control, Elliptic Curves, Isogeny of Elliptic Curves
        Pages 104-114

        E. A. Zaitceva, D. S. Lavrova

        USING THE GENOME ASSEMBLY PRINCIPLES FOR SELF-REGULATION OF CYBER-PHYSICAL SYSTEMS NETWORK INFRASTRUCTURE

        Annotation:

        An approach for self-regulation of the cyberphysical systems network infrastructure using the mathematical apparatus of de Bruijn graphs and intersection graphs used in the bioinformatic problem of genome assembly is proposed. This approach reduces the time of system reconfiguration due to faster “adhesion” of the restored sections of the target function.

        Keywords:

        self-regulation, graph model, cyber-physical system, informational security, de Bruijn graph, intersection graph
        Pages 115-124

        M. O. Kalinin

        APPLICATION OF NEURO-FUZZY REASONING FOR NETWORK SCANNING DETECTION

        Annotation:

        The paper reviews a neuro-fuzzy system, the hybrid soft computing structures that integrate elements of artificial neural networks and fuzzy logic. Modern neuro-fuzzy systems are investigated, neuro-fuzzy tools for detecting the scanning of computer network nodes using a neuro-fuzzy approach are proposed, and the effectiveness of this technology is analyzed. The applicability of a hybrid neuro-fuzzy system that combines the direct signal propagation neural network and the Takagi — Sugeno fuzzy basis is substantiated and confirmed.

        Keywords:

        Security, Artificial Intelligence, Neuro-Fuzzy Reasoning, Neural Network, Fuzzy Logic, Network Scanning, Takagi — Sugeno, ANFIS, Soft Computing.
        Pages 125-136
    • №4 2019
      • INFORMATION SECURITY ASPECTS

        Chizhikov E. N., Gorbunov A. A., Belov A. S., Trakhinin E. L., Stavitsky D. V.

        THEORETICAL APPROACH TO EVALUATION OF CONNECTIVITY OF DISTRIBUTED SYSTEMS AND TELECOMMUNICATIONS FOR DIGITAL ECONOMY

        Annotation:

        The article considered a theoretical approach, the application of which would make it possible to formulate a reasonable version of the construction of distributed systems and telecommunications for the benefit of the digital economy under conditions of external special software and technical impacts and taking into account the effective restoration of elements of distributed systems and telecommunications.

        Keywords:

        Connectivity, distributed system, efficient recovery.
        Pages 9-12

        Garkushev A. U., Larionova E. V., Kirsanov V. I.

        USE NANO BAR CODES TO IMPROVE INFORMATION SECURITY

        Annotation:

        The article is devoted to the study of fundamentally new methods of encryption of information by means of coding means in the form of pictures with high density of data placement inside standard frame images. Combining traditional cryptographic techniques with information-based nano bar code technologies provides more durable ways to prevent unauthorized access to information resources.

        Keywords:

        bar code, frame, information protection.
        Pages 13-19

        Poltavtsev A.A., Habarov A.R., Selyankin A.O.

        LOGIC INFERENCE ATTACKS AND INFORMATION PROTECTION IN DATABASES

        Annotation:

        The article analyzes the security of modern data architectures implemented in relational DBMSs. The authors focus on attacks that use inference methods, which traditional access control methods do not protect against. Examples of such attacks are given and fundamental approaches to defending against them are analyzed. It is proposed as a protective measure the development of special software built and functioning according to the principles of intelligent analysis.

        Keywords:

        information security, data architecture, data storage security, data processing security, intelligent analysis
        Pages 20-25
      • INFORMATION SECURITY APPLICATION

        M.E. Sukhoparov, I.S. Lebedev, V.V. Semenov

        МODEL OF BEHAVIOR FOR CLASSIFICATION OF THE CONDITION OF INFORMATION SECURITY OF AUTONOMOUS OBJECT

        Annotation:

        The issues of ensuring the information security of autonomous objects are considered. The prerequisites for the use of additional independent methods for assessing the state of autonomous objects are determined. Side channels are described with which it becomes possible to monitor the states of individual intelligent agents. An experiment was conducted, which consisted in the accumulation of statistical information on various types of maneuvers of an unmanned object using two audio recording devices. The behavior model of an autonomous object can be used as an additional element to determine the state of information security of autonomous objects. Using a segmented model, it was possible to improve the accuracy of determining the state of information security.
        Pages 26-34

        Makarov A.S.

        ARDUINO HARDWARE PLATFORM SECURITY ANALYSIS FOR IOT DESIGN

        Annotation:

        The principles of the functioning of the Arduino hardware platform are investigated. The security problems that may arise when using this hardware platform are analyzed.

        Keywords:

        Internet of things, embedded systems, Arduino, AVR, microcontrollers, security hardware.
        Pages 35-39

        Andrushkevich D.V., Fomenko K.E., Timashov P.V.

        MAINTAINING THE REQUIRED SECURITY LEVEL OF THE ELEMENTS OF CRITICAL INFORMATION INFRASTRUCTURE BASED ON THE QUALIMETRIC APPROACH

        Annotation:

        Criteria of priority of processes occurring on the elements of critical information infrastructure (CII) to maintain the required level of security are considered. The following are selected as indicators of the priority criteria of processes: importance and problematic. It is proposed to evaluate the priority of processes by the integrated indicator «Process Priority Index», comparing the processes with each other and setting them in a ranked list by priority of maintaining the required level of protection of KII, based on a qualification approach. The characteristics of the rating scales for assessing the criteria for the priority of processes determined by the expert method taking into account the competence of experts are proposed. Calculation of the proposed criteria and the process priority index allows to obtain a numerical integral assessment of the process priority.

        Keywords:

        process, priority, priority criteria, qualimetric approach.
        Pages 40-44

        Zegzhda P. D., Suprun A. F., Anisimov V. G., Tebekin A. V., Anisimov E. G.

        METHODICAL APPROACH TO CONSTRUCTION OF MODELS OF FORECASTING OF INDICATORS OF PROPERTIES OF INFORMATION SECURITY SYSTEMS

        Annotation:

        A methodological approach to the construction of models for predicting the properties of information security systems at the evolutionary stages of development is proposed. The approach is based on the representation of the development of information security systems as a process of change in the permissible range of indicators characterizing their properties. It is assumed that the amount of resources spent on improving each property, the greater the closer the current value of the indicator characterizing this property to the maximum possible value for the considered information security system. This circumstance is taken into account by reducing the relative rates of improvement of indicators as they approach their values to the maximum possible.

        Keywords:

        information security system, system properties, property indicators, development forecasting, model.
        Pages 45-49

        Eremeev M.A., Zakharchuk I.I.

        PRACTICAL THREAT MODELLING METHOD FOR INFORMATION SYSTEM AUDIT QUALITY ENHANCEMENT

        Annotation:

        The article proposes method for audit quality enhancement while performing corporate network practical threat modelling by increasing stealth of presence inside by outgoing network link quantity minimization.

        Keywords:

        cyberthreat modelling, information security audit, pentest, penetration testing, routing
        Pages 50-55
      • APPLIED CRYPTOGRAPHY

        Belim S.V., Belim S.Yu.

        THE GENERALIZED KEYS PRE-DISTRIBUTION SCHEME

        Annotation:

        In article the generalized keys pre-distribution scheme is suggested. Calculations are carried out in the any vector space. Key materials are formed based on elements of a vector space and the symmetric operator over a vector space. Two special cases for implementation of the suggested scheme are considered.

        Keywords:

        keys pre-distribution scheme, vector space, symmetric encryption.
        Pages 56-60

        Petr Baranov

        COMPARISON OF FOUR TRANSMITTED MESSAGE BLOCKS INTEGRITY CHECKING METHODS

        Annotation:

        The paper considers value which is error probability in every of four message block integrity checking methods: digital signature, cyclical redundant code, control sums in vector space over a field of two elements and control sums in a ring of integers , where is the checking code length. Comparison of asymptotic representations for with small , which is distortion of transmitted binary signal and for large which is transmitted block’s volume is presented in the paper. Values of main members for asymptotic decomposition for value with , are obtained for the integrity checking methods noted. These values are calculated as an example for parameters of TCP protocol segments.

        Keywords:

        information security, TCP, CRC, control sum, error probability, distortion model, digital signature, comparison, integrity.
        Pages 61-66
      • SPECIAL IT

        D. S. Lavrova

        MAINTAINING CYBER SUSTAINABILITY IN INDUSTRIAL SYSTEMS BASED ON THE CONCEPT OF MOLECULAR-GENETIC CONTROL SYSTEMS

        Annotation:

        The author proposes an approach to provide cyber sustainability of complex industrial systems, which consists in the ability of the system to function correctly under cyber attacks. The proposed approach is based on the principles of molecular-genetic control systems and self-regulation of living tissue.

        Keywords:

        cyber sustainability, self-regulation, cyberphysical systems, molecular-genetic control system.
        Pages 67-71

        E. Yu. Pavlenko

        Model of Cyberattacks on Digital Production Systems

        Annotation:

        The model of cyberattacks on digital production systems is presented. The examples of the most significant information security incidents in this type of systems are considered in full detail. Possible approaches to ensuring the cybersecurity of digital production systems are described.

        Keywords:

        information security, cyberattack, cyber security, digital production.
        Pages 72-75

        V. M. Krundyshev

        Identifying Cyberthreats in Modern Industrial Systems by Means of Deep Learning Networks

        Annotation:

        This article presents an approach to building a system for identifying cyberthreats in modern industrial systems (IIoT, VANET, WSN) by means of artificial intelligence and deep learning. The results of the tests conducted to assess the suggested approach for efficiency based on deep learning networks are provided.

        Keywords:

        cybersecurity, cyberphysical infrastructure, industrial systems, artificial intelligence, machine learning, deep learning networks, IIoT, WSN, VANET.
        Pages 76-83

        Ovasapyan T.D., Knyazev P.V.

        USING TAINT ANALYSIS TO RESEARCH THE SECURITY OF ARM ARCHITECTURE SOFTWARE

        Annotation:

        The article considers the usage of taint-analysis for improving the security exploration efficiency of the software running on ARM architecture. The comparative analysis of existent dynamic binary instrumentation frameworks is performed and the most acceptable one is chosen to satisfy requirements of the task. The modification of its functionality is finished in order to improve the analysis efficiency of input data influence on explored program operation.

        Keywords:

        Taint analysis, The Internet of Things (IoT), cyber-physical system, vulnerability
        Pages 84-91

        Dakhnovich A.D.

        Cybersecurity in brownfield industrial internet of things deployment

        Annotation:

        In the paper, a step-by-step Industrial Internet of Things deployment in brownfield environment is described. Also key features of each step are provided. Threat taxonomy classes are provided while digitalization process. Based on the cybersecurity threats analysis the requirements for Industrial Internet of Things resilience against network threats are described, as well as and approach for architecting industrial systems networks with cybersecurity by design.

        Keywords:

        digital manufacturing, cybersecurity, industry 4.0, industrial internet of things, critical information infrastructure.
        Pages 92-100

        D. S. Lavrova

        FORECASTING THE STATE OF COMPONENTS OF SMART GRIDS FOR EARLY DETECTION OF CYBERATTACKS

        Annotation:

        The author proposes an approach for predicting the state of smart grid components, which is based on a combination of the mathematical techniques of the Kalman filter and machine learning. Prediction of the state will make it possible to detect cyberattacks implemented against a smart grid at an early stage.

        Keywords:

        smart grid, cyber-attack prediction, Kalman filter.
        Pages 101-104

        E. Yu. Pavlenko

        DETECTION OF INFORMATION SECURITY BREACHES IN A DIGITAL PRODUCTION SYSTEM BASED ON THE COMPONENT INTERACTION MODEL

        Annotation:

        The paper offers an approach to detecting information security breaches in digital production systems using a graph representation of the component interaction.

        Keywords:

        information security, breach detection, cybersecurity, digital production.
        Pages 105-107

        V. M. Krundyshev

        PREPARING DATASETS FOR TRAINIG IN A NEURAL NETWORK SYSTEM OF INTRUSION DETECTION IN INDUSTRIAL SYSTEMS

        Annotation:

        One of the commonly known approaches to network security is the intrusion detection system (IDS) that analyzes the behavior of traffic and hosts in the network. This article presents a technique for generating datasets for the IDS and provides their characteristics as well as defines the features of typical attacks against industrial systems. The results can be used for training the AI IDS in detecting security threats to modern industrial systems.

        Keywords:

        dynamic networks, artificial intelligence, cybersecurity, computerized learning, dataset preparation, industrial systems, IDS.
        Pages 108-114

        Busygin A. G.

        Blockchain Based System Model for Assessment of Security against Threats Caused by Uneven Distribution of Computational Power

        Annotation:

        The paper considers blockchain based systems threats caused by uneven distribution of computational power. The blockchain based system model allowing to assess security against the specified threats is proposed.

        Keywords:

        Blockchain, 51% attack, security assessment.
        Pages 114-117
  • 2018 year
  • 2017 year
  • 2016 year
  • 2015 year
  • 2014 year
  • 2013 year
  • 2012 year
  • 2011 year
  • 2010 year
  • 2009 year
  • 2008 year
  • 2007 year
  • 2006 year
  • 2005 year
  • 2004 year
  • 2003 year
  • 2002 year
  • 2001 year
  • 2000 year
  • 1999 year