Quarterly journal published in SPbPU
and edited by prof. Peter Zegzhda
Peter the Great St. Petersburg Polytechnic University
Institute of computer sciences and technologies
information security of computer systems
Information Security Problems. Computer Systems
Published since 1999.
ISSN 2071-8217
  • 2020 year
    • №1 2020
      • INFORMATION SECURITY ASPECTS

        P. D. Zegzhda, V. G.Anisimov, P.V. Semianov,
        E. G. Anisimov, T. N. Saurenko T. N..

        APPROACH TO EVALUATING THE EFFECTIVENESS OF INFORMATION PROTECTION IN CONTROL SYSTEMS

        Annotation:

        Methodological approach to evaluating the effectiveness of information protection in the information and control subsystem of a complex dynamic system is offered. As a performance indicator it is proposed to use the degree of opportunity implementation driven dynamic system in view of prevention of damage, expressed in the change life cycle management from destructive influences that violates the completeness, integrity, precision, reliability, accessibility and efficiency of processing required for managerial decision-making information.

        Keywords:

        Management of a Complex Dynamic System, Information and Control Subsystem, Information Protection, Efficiency.
        Pages 9-16
      • NETWORK AND TELECOMMUNICATION SECURITY

        D. S. Lavrova, N. N.Eliseev

        NETWORK ATTACKS DETECTION BASED ON TSETLIN MACHINE

        Annotation:

        An approach to detecting computer attacks is proposed, which consists in identifying abnormal network traffic using Tsetlin machine. Experimental studies conducted for various types of network attacks have demonstrated the effectiveness of the proposed approach.

        Keywords:

        Network Attacks, Network Traffic Classification, Tsetlin Machine, Tsetlin Automate.
        Pages 17-23

        I. V. Alekseev, P. D. Zegzhda

        CLASSIFICATION OF VULNERABILITIES OF NETWORK PROTOCOLS BASED ON SPECIFICATIONS

        Annotation:

        This paper provides an overview of network attacks and vulnerabilities of TCP / IP model. The purpose of this study is to identify the most common types of vulnerabilities for network protocols. So, for example, the ability to change the values of the IP address field to the victim's address is not vulnerability that is not accepted by the protocol specification, but the misuse of flags fragmentation – is a vulnerability.

        Keywords:

        Network Attacks, TCP/IP Model, Vulnerability Search, Network Security.
        Pages 24-32
      • APPLIED CRYPTOGRAPHY

        V. I. Korzhik, D. C.Nguyen, K. A. Akhrameeva

        CIPHER MODIFICATION AGAINST STEGANALYSIS BASED ON NIST TESTS

        Annotation:

        Two methods for cipher modification, which can be used to pre-embed messages are proposed. These modifications preserve the cryptographic resistance of the embedded messages, but violate the pseudo-randomness of cryptograms, which protects stegosystem from detection based on the use of NIST tests. The experimental results on the stegosystem detection efficiency after cipher modification and depending on the embedding rate are also presented.

        Keywords:

        Block Cipher, Stegosystem, Pseudo Randomness, NIST Tests, Deflate Compression Algorithm, Arithmetic Coding.
        Pages 33-43

        M. V. Shakurskiy

        TWO-COMPONENT STEGANOGRAPHIC SYSTEM BASED ON SUM OF LINEAR FUNCTIONS OF TWO SIGNALS WITH MULTIPLICATIVE CONSTRAINT OF EMBEDDED SIGNALS

        Annotation:

        Important task of designing a steganographic system is the selection of a key. The main requirement for the key is to ensure consistently high sensitivity of the system to the key variation and minimum change in this sensitivity during the formation of the container. The paper provides an analysis of the invariant two-component steganographic system in terms of sensitivity to variations in various parameters and values of embedded signals.

        Keywords:

        Two-Component Steganographic System, Invariance to Masking Signal, Steganographic Container, Key Coefficient.
        Pages 44-49

        E. B. Aleksandrova, I. S. Rekhviashvili, A. V. Yarmak

        LINKING-BASED REVOCATION IN LATTICE-BASED RING SIGNATURE FOR INDUSTRIAL INTERNET OF THINGS

        Annotation:

        A ring signature-based group authentication mechanism with linking-based revocation is proposed. The possibility of using this approach in Smart Grid as an example of industrial Internet of Things systems is discussed.

        Keywords:

        Authentication, Industrial Internet of Things, Ring Signature, Linking-Based Revocation, Lattices.
        Pages 50-57
      • SPECIAL IT

        Kostin V.N.

        TASKS OF CONCEPTUAL DESIGN OF PHYSICAL PROTECTION OF CRITICALLY IMPORTANT OBJECTS

        Annotation:

        Task relevance of protecting critical facilities is determined. The technological process of designing physical protection systems for critical facilities is considered. For each stage of the design, solvable problems and problems are considered. Based on the analysis, possible directions for solving these problems are proposed.

        Keywords:

        Design of Physical Protection Systems, Critically Important Object.
        Pages 58-67

        I. A. Sikarev, V. V. Sakharov, A. V. Garanin

        ABOUT ENHANCING RELIABILITY AND INFORMATION SECURITY OF DATA TRANSMISSION SYSTEMS IN COMMUNICATION CHANNELS OF UNMANNED VESSEL

        Annotation:

        Types of electromagnetic interference affecting the communication channels of an unmanned vessel are described. The interference is classified according to their source, spectral and temporal characteristics. The approach to evaluating the noise immunity characteristics of transponders for unmanned vessels is described.

        Keywords:

        Global Navigation Satellite System, Unmanned Navigation, Automated Vessel Traff Control Systems.
        Pages 68-72
      • INFORMATION SECURITY CYBER-PHYSIC SYSTEMS

        M. A. Poltavtseva

        Characteristics of cyber-physical systems security monitoring

        Annotation:

        Сyber-physical system is considered as an object of information security management. The corresponding threat model from the point of view of the automatic control theory is presented. The characteristics of security monitoring are proposed.

        Keywords:

        Information Security, Cyber-Physical Systems, CFS, Threat Model, Monitoring, Security Management.
        Pages 73-88

        V. M. Krundyshev

        DETECTION OF CYBER THREATS IN INDUSTRIAL SYSTEMS BASED ON NEURAL NETWORK METHODS USING MEMORY

        Annotation:

        Use of modern artificial neural networks to detect cyber threats in the networks of the industrial Internet of Things is proposed. The modeling of the industrial system under the influence of cyberattacks has been carried out. As a result of the experiments, the optimal configuration parameters of a recurrent LSTM network with a confirmed number of layers and states were determined.

        Keywords:

        Artificial Intelligence, Cyber Threats, Neural Networks, Industrial Systems, IIoT, LSTM.
        Pages 89-95

        M. E. Sukhoparov, V. V. Semenov, K. I. Salakhutdinova, I. S. Lebedev

        IDENTIFICATION OF ANOMALOUS FUNCTIONING OF INDUSTRY 4.0 DEVICES BASED ON BEHAVIORAL PATTERNS

        Annotation:

        Problem of detecting the abnormal functioning of «Industry 4.0» devices based on behavioral patterns using acoustic channel information is explored. The possibility of using external systems for monitoring the status of objects under the influence of threats to information security breaches is considered. An experiment was conducted aimed at analyzing the status of «Industry 4.0» devices in normal and abnormal operating modes.

        Keywords:

        Behavioral Patterns, Acoustic Channel, Industry 4.0 Devices, Information Security Monitoring Systems, Signal Analysis.
        Pages 96-102

        E. A. Popova, V. V. Platonov

        ANALYZED FEATURE SELECTION IN INTRUSION DETECTION SYSTEMS

        Annotation:

        Analysis of feature selection methods of network traffic is provided. A prototype of an attack detection system with a module for network traffic feature selection is developed. The method of network traffic feature selection is proposed. The accuracy and time of detecting network attacks by proposed prototype was assessed.

        Keywords:

        Intrusion Detection System, Networks Attacks Detection, Feature Selection of Network Traffic, Genetic Algorithm.
        Pages 103-110

        K. V. Vasilieva, E. Yu. Pavlenko, P.V. Semianov

        ANALYSIS OF CYBERSECURITY METHODS FOR CONNECTED CARS

        Annotation:

        The paper reviews the main trends of modern cars’ infrastructure. It discusses modern attacks, which are possible now due to implementation of V2X and IVI technologies, and the main methods for their detection and prevention are analyzed. Considers their possibility and limitation of addressing the described problem. A set of requirements for the new information security method, suited for new-generation connected cars, is proposed.

        Keywords:

        Vehicle Cyber Security, Mobility-as-a-Service, Automotive, Connected Cars, In-Vehicle Infotainment, Controller Area Network, Intrusion Detection System, Fingerprinting ECU.
        Pages 111-119
    • №2 2020
      • INFORMATION SECURITY APPLICATION

        Zegzhda P. D., Anisimov V. G., Anisimov E. G., Saurenko T. N.

        THE MODEL OF OPTIMAL INTEGRATION OF INFORMATION SECURITY MEASURES

        Annotation:

        The article developed an optimization mathematical model and an algorithm for integrating information security measures. As an indicator of the effectiveness of integration in the model, the level of costs for fulfilling the tasks of ensuring information security of the protected object is adopted. In this case, the costs of the development (preparation) of these measures and the costs of their implementation by the information security system are separately taken into account. The optimization algorithm is based on the general principles of the branch and bound method. Its feature is the proposed method for estimating boundaries for alternative branches. The model is universal in nature and can be used to develop methods for supporting the adoption of appropriate management decisions to ensure information security for specific information infrastructures of organizational, technical, social, economic and other objects.

        Keywords:

        information security, a set of measures to ensure information security, optimization, model, algorithm
        Pages 9-15

        Lavrova D.S., Solovey R.S.

        ENSURING INFORMATION SECURITY OF WIRELESS DYNAMIC NETWORKS BASED ON GAME THEORY APPROACH

        Annotation:

        The paper presents the concept of applying a game theory approach in infrastructure of wireless dynamic networks to counter computer attacks. The applying of this approach will allow to create mechanism for adaptive reconfiguration of network structure in the context of implementation various types of computer attacks and to provide continuous operation of network even in conditions of destructive information impacts.

        Keywords:

        information security, wireless dynamic networks, game theory, network games, network reconfiguration
        Pages 16-22
      • NETWORK AND TELECOMMUNICATION SECURITY

        I. T. Latypov, M. A. Eremeev

        MULTILEVEL MODEL OF COMPUTER ATTACK BASED ON ATTRIBUTIVE METAGRAPHS

        Annotation:

        The article discusses approaches to the recognition of malicious activity in computer networks and the assessment of the security of information systems using attributive metagraphs. The proposed use of the matrix techniques, tactics and methods of computer attack for its modeling

        Keywords:

        computer attack, security assessment, malware, metagraph
        Pages 23-28

        M. E. Sukhoparov, V. V. Semenov, K. I. Salakhutdinova, I. S. Lebedev

        DETECTION OF ANOMALIES OF FUNCTIONING OF TELECOMMUNICATIONS DEVICES BASED ON LOCAL SIGNAL SPECTRA

        Annotation:

        Telecommunication devices are becoming one of the critical elements of industrial systems, which makes them an attractive target for potential attackers. A method for detecting anomalies based on local signal spectra using neural networks to evaluate is considered. An experiment was conducted based on the statistics of the loading of the computing device.

        Keywords:

        syn spectra, Industry 4.0 devices, monitoring of telecommunication nodes, signal analysis.
        Pages 29-34
      • APPLIED CRYPTOGRAPHY

        E.N. Shkorkina, E.B. Aleksandrova

        ENSURING THE POST-QUANTUM STABILITY LEVEL OF QUANTUM-SECURE COMMUNICATION SYSTEMS

        Annotation:

        A methodology for protecting a quantum-secure communication system based on the implementation of post-quantum cryptographic algorithms at all stages of its work is proposed. The use of authenticated encryption and signcryption schemes reduces the number of keys in quantum-secure system and increases the number of interacting devices.

        Keywords:

        quantum key distribution, authentication encryption, signcryption
        Pages 35-39

        Shakurskiy M.V.

        TWO-COMPONENT REAL-TIME STEANOGRAPHIC SYSTEM OF INFORMATION EMBEDDING IN THE AUDIO SIGNAL

        Annotation:

        The paper discusses an invariant two-component steganographic system based on linear mixing of two embedded signals with the sound signal of the container, which allows for effective protection of the hidden signal in real time.

        Keywords:

        two-component steganographic system, invariance to masking signal, steganographic container, key coefficient.
        Pages 40-45
      • THE CIRCULAR

        I.V. Alekseev

        DETECTION OF DDOS ATTACKS IN LARGE-SCALE NETWORKS BASED ON MATHEMATICAL STATISTICS AND ARTIFICIAL INTELLIGENCE METHODS

        Annotation:

        This paper proposes to use wavelet transform together with clustering of the obtained and converted coefficients for anomaly detection in traffic of backbone networks. The coefficients of the wavelet transform obtained from the parameters of the network packets are checked for the degree of multiple correlation which is used to calculate the mean-square deviation and clusterize the obtained coefficients for detecting the traffic anomalies. The effectiveness of the proposed method is demonstrated by the results of experiments to detect denial of service attacks

        Keywords:

        backbone networks, wavelet-based analysis, multiple correlation, clustering, attack detection, DoS attack.
        Pages 46-52

        Grechishnikov E.V., Belov A.S., Skubyev A.V., Trakhinin E.L.

        FORMALIZED MODEL FOR EVALUATION OF Vitality OF DISTRIBUTED COMMUNICATION NETWORK IN CONDITIONS DESTRUCTIVE INFLUENCES

        Annotation:

        The article considers a theoretical approach, the application of which will allow to assess the vitality of the version of construction of a distributed communication network in conditions of external destructive impacts, taking into account the effective functioning of the management system for the elimination of the consequences of these impacts.

        Keywords:

        Vitality, the distributed communication network, management system.
        Pages 53-57
      • SPECIAL IT

        A.P. Nyrkov, S.S. Sokolov, O.M. Alimov, S.G. Chernyi, V.A. Dorovskoy

        OPTIMAL IDENTIFICATION OF OBJECTS IN RECOGNITION TASKS BY UNINHABITED underwater vehicles

        Annotation:

        Protecting the water area of port or other important maritime facilities is quite an urgent task. The widespread introduction of uninhabited underwater vehicles for these purposes has become possible due to the fact that they withstand harsh climatic conditions and special loads.The article presented the methods of optimization and identification of optical images in the recognition objects by uninhabited underwater vehicles. A control scheme for the compensation of the input image signal is proposed for optimal identification with communication loops, that allow digital elements to withstand external objects.

        Keywords:

        optimal identification, optical images, recognition problems, underwater vehicles, mathematical model
        Pages 58-64

        I. A. Sikarevi, G. B. Chistyakov, A. V. Garanin

        ALGORITHMS FOR ENHANCING INFORMATION SECURITY WHEN PROCESSING NAVIGATION DATA OF UNMANNED TECHNICAL FLEET VESSELS ON THE INLAND WATERWAYS OF THE RUSSIAN FEDERATION.

        Annotation:

        The article describes promising methods for the application of unmanned technologies for the development of water transport on the inland waterways of the Russian Federation, as well as information processing methods to increase the information security of the transmission of navigation data
        Pages 65-69

        Belova Ye. P., Mashkina I. V.

        ARCHITECTURE AND WORK ALGORITHM OF THE BIOMETRIC AUTHENTICATION SYSTEM BY VOICE

        Annotation:

        The work proposes an authentication / authorization system for users with administrative privileges. A mechanism is proposed for enhanced authentication and delegation of authority, which allows the superuser to be excluded by creating separate roles: network administrator, security administrator, virtual infrastructure administrator, process control administrator (automated process control system). The user authentication / authorization system is based on the characteristics of the fourth formant and the frequency of the leading formant of vowels.

        Keywords:

        Biometric image of a person, neural network database of biometric images, characteristics of the fourth formant of the vowel sound, frequency of the leading spectral characteristic formants.
        Pages 70-78
      • INFORMATION SECURITY CYBER-PHYSIC SYSTEMS

        K. Vasilieva, E. Pavlenko

        LOCAL NETWORK CLASTERISATION FOR CONNECTED CARS

        Annotation:

        The paper reviews the prospects of using domain architecture as a basis for implementing the car network security mechanism, based on the ECU authentication. It contains the analysis of the existing methods of domain formation and proposes a method for a comprehensive assessment of the security classes of car’s components, taking into account, in addition to the functional purpose of the ECU, a list of its interfaces, interaction with other ECUs, the difference between integrity levels of slave devices. Also it proffers a network clustering approach based on combining elements of the one security class into a domain .

        Keywords:

        vehicle cyber security, connected cars, сontroller area network, domain architecture, cluster-tree, integrity level, fingerprinting ECU
        Pages 79-91

        M. A. Poltavtseva, D. P. Zegzhda

        AN ADAPTIVE DATA PROCESSING SYSTEM DEVELOPMENT FOR CPS SECURITY MONITORING

        Annotation:

        The paper comprises problem of data processing for cyberphysical systems security monitoring. It shows the method of modeling and evaluating the system for security monitoring data processing and the principles of an adaptive solution development. An example of an adaptive system for CPS monitoring development and optimization is given.

        Keywords:

        information security, cyberphysical systems, CPS, security monitoring, security management, data processing, Big data.
        Pages 92-101

        Lavrova D.S., Shtyrkina A.A.

        GRAPH-BASED ANALYSIS OF THE POSSIBILITIES OF RESTORING THE ARTIFICIAL NEURAL NETWORK STRUCTURE

        Annotation:

        In this paper, we investigated the problem of revealing the unknown structure of artificial neural networks (ANNs) using graph theory. The basic concepts of ANN, typical architectures and the differences between them were considered. In the work, the rationale for the use of the graph theory apparatus for solving the problem of revealing the structure of ANNs was given. Examples of comparing various ANN architectures and types of graphs was given. It is proposed to use the methods of spectral graph theory and graph signal processing as mechanisms for analyzing unknown structure of ANNs.

        Keywords:

        artificial neural network, reverse-engineering of ANNs, deep learning, graph theory, spectral graph theory, signal graphs.
        Pages 102-108

        A. D. Fatin, E. Pavlenko

        ANALYSIS OF MODELS OF REPRESENTATION OF CYBERPHYSICAL SYSTEMS IN PROBLEMS OF ENSURING INFORMATION SECURITY

        Annotation:

        This article provides a detailed review with a deep comparison of existing models of information security of cyberphysical systems in the field of the industrial Internet of things, followed by an analysis of ways to solve problems. Alternative approaches to the construction of models and solutions in this area are proposed. The purpose of this study is to systematize, generalize and supplement existing experience in the field of description and solution of information security problems of cyber-physical systems; creation of a unified information base for the subsequent implementation of our own approach to building a model and solving problems in the field of the industrial Internet of things.

        Keywords:

        industrial Internet of things, IIoT, information security models, cyberphysical systems.
        Pages 109-121
  • 2019 year
  • 2018 year
  • 2017 year
  • 2016 year
  • 2015 year
  • 2014 year
  • 2013 year
  • 2012 year
  • 2011 year
  • 2010 year
  • 2009 year
  • 2008 year
  • 2007 year
  • 2006 year
  • 2005 year
  • 2004 year
  • 2003 year
  • 2002 year
  • 2001 year
  • 2000 year
  • 1999 year