Malyshev E. V., Moskvin D. A., Zegzhda D. P.
Annotation:This work contains results of artificial neural network development, with is designed for automatically attacks detection in VANET-networks. In the course of the thesis were used such research methods as analysis and modeling, they were applied to select the most prospective method of Gray Hole attack detection in VANET-networks. According to the results of experimental studies, there was evaluated an effectiveness of this method, a method was characterized as great.
Lavrova D. S., Khushkeev A. A.
Annotation:Proposed an approach for information security breaches detection in distributed control systems based on prediction of multivariate time series formed of sensor and actuator data.
Keywords:data prediction, multivariate time series, network attacks, convolutional neural networks.
Aleksandrova E.B., Shmatov V.S.
Annotation:A control protocol in the systems for goods and services reviews, based on non-interactive zero-knowledge proof, is proposed. The user keys are stored as Merkle tree. The protocol ensures anonymity of the author of the reviews and does not allow one user to leave more than one review per product or service.
Keywords:zero-knowledge, control of reviews, Merkle tree
Annotation:In the article some properties of the «alternations» statistic are proved. For example, we investigate properties of the scheme when «alternations» are independent. This fact allows us to construct new goodness-of-fit test.
Keywords:goodness-of-fit test, series, binary sequence
Vladimir I. Budzko, Dmitry A. Melnikov
Victor S. Gorbatov
Igor Y. Zhukov
Annotation:Currently, there is a tendency to over-promote the phenomenon of blockchain technology (BC), which is supposedly universal and has all-pervasive possibilities for revolutionary transformation of the various areas of social activity, including business and state governance. As an example, the relatively successful development of the so-called cryptocurrencies, which have already won a certain share of public relations at both the national and global levels, is given. The presence of such mass statements is explained by the fact that the description of the obvious advantages of the BС is carried out without a detailed and comprehensive risk analysis of the practical implementation of its basic concepts, including information security of the appropriate applications. The proposed work shows methods for ensuring a consensus between fundamentally distrustful users, who ensure the relative stability of cryptocurrency systems even in the absence of a centralized (state and, moreover, international) level of regulation. An appropriate classification of systems based on the BC and their features are given. Along with this, this paper focuses on the need for a thorough and comprehensive analysis of the information security risks associated with the BC use. It is shown that at the present stage of the BC systems development, they do not provide reliable user authentication, reliable system management, guarantees of secure generation, distribution and storage of cryptographic keys, guaranteed possibility of returning the values stolen by hackers, and also do not implement the principle of non-repudiation. The conclusion is made about the expediency of its further comprehensive application, based on the fact that the BC unreasonable use can cause considerable damage at the level of the whole sector of the economy. This article is a continuation of publications about the properties and features of blockchain technology.
Keywords:blockchain; cryptocurrency; digital wallet; digital signature; transaction; fork; smart contract; authentication; non-repudiation; information security
Kulik S. D.
Annotation:The main purpose of the article is to present the necessary elements of system analysis necessary for training future university specialists in the field of information security for example, applied information (computer) technologies. The main focus is on the effectiveness of the system, which can be assessed using indicators expressed in posynomials. The indicator is represented by a posynomial. Then apply well-developed tools to minimize posynomial. We used the necessary principles and methods of system analysis, as well as geometric programming. In this case, geometric programming is considered as a tool for solving problems of system analysis in the field of information security. The result of the optimization of the information security effectiveness indicator is presented on a training example while minimizing the posynomial. The students learn the system analysis elements. Students solve optimization problems. Recommendations were developed for solving typical educational problems for students. In conclusion, it is concluded that it is necessary to pay more attention in the framework of the educational process to the elements of system analysis.
Keywords:system analysis, system, indicator, criterion of effectiveness, geometric programming, information security.
Pavlenko E. Yu., Shtyrkina A. A., Zegzhda D. P.
Annotation:Paper proposed an approach to estimating the sustainability of cyber-physical systems based on system state analysis. As a criterion, it is proposed to use the structural characteristic of the graph, which describes the CPS. For a numerical assessment of sustainability, authors propose to use properties of graph spectrum distribution – set of eigenvalues of adjacency matrix corresponding to the graph.
Keywords:sustainability; cyber sustainability; cyber resilience; cyber-physical system; information security; spectral graph theory
Poltavtseva M.A., Kalinin M.O.
Annotation:The article presents a model of Big data management system designed to solve the problems of information security (IS) systems of this class. The features of this class of systems are highlighted, the mathematical definition of the model and architecture of data processing in accordance with the concept of ANSI/SPARC and the principles of modeling information systems in is are given. The analysis of the model is carried out.
Keywords:data management systems, Big data, information security, system modeling
Aleksandrova E. B., Lavrova D. S., Yarmak A. V.
Annotation:Benford's law describes the frequency distribution of leading digits in numerical data taken from real processes. In particular, it is widely used to detect anomalies in financial data. The paper proposed applying Benford's law to detect DoS-attacks in components of large-scale industrial systems. The experimental results for the data generated by the system sensors from industrial Tennessee Eastman process are given.
Keywords:information security, Benford’s law, time series, large-scale industrial systems
E.V. Zhukovskiy, M.O. Kalinin, I.I. Marshev
Annotation:Detection of malicious software is an essential part of the security of computer systems. This paper presents machine learning-based classifiers which are developed due to the analysis of main characteristics of executable files. The conducted research uses various classification algorithms like decision tree, adaptive and gradient boosting, random forest, Naive Bayes, k-nearest neighbors and neural networks.
Keywords:computer security, malware detection, classification, machine learning, neural network, random forest, decision tree, static analysis.
Pavlenko E.Y., Suslov S.M.
Annotation:Proposed an approach to detecting malware for the Android operating system using a capsular neural network. The approach is to build a CMYK image, the pixels of which are formed based on the sequence of actions performed by the application under study. The results of experimental studies of the proposed campaign demonstrate its high efficiency for solving the problem of determining malicious Android applications.
Keywords:malicious applications, malware detection, Android operating system, application security analysis, capsule neural network, Android security
Annotation:he article describes an approach to identify malicious software based on the analysis of its functionality. To ensure the completeness of the analysis, it is proposed to use dynamic symbolic execution to determine the conditions for reaching the target program blocks. To optimize the process of searching for the ways of program execution leading to the execution of malicious operations, the methods reinforcement learning are used
Keywords:computer security, malware detection, malicious activity, machine learning, symbolic execution, reinforcement learning, targeted attacks
Annotation:This article examines the existing systems that allow to partially or fully automate the penetration testing process using machine learning techniques. Their architecture and applied methods of machine learning are considered. On the basis of the analysis performed, solutions have been proposed for improving existing systems.
Keywords:machine learning, penetration testing, vulnerability scan, exploitation of vulnerabilities, social engineering, spear-phishing, automation
Poltavtseva M.A., Zegzhda D.P., Kalinin M.O.
Annotation:The paper deals with the concept and features of big data management systems, their differences from traditional DBMS. The authors describe changes in the intruder's model and new vulnerabilities of data management systems. A new threat model is being developed. The article presents new problems of information security in a distributed Big data processing and storage systems.
Keywords:Information security, Big data, vulnerability classification, intruder model, threat model
Annotation:The article considers the problem of secure Big data management systems development using a consistent approach. The author gives the features of Big data management systems, their differences from traditional DBMS. The paper presents the principles of a new, consistent approach to the secure Big data management systems development. The architecture of the security subsystem is proposed.
Keywords:Information security, Big data, data architecture, security principles, data model, process model
N. A. Grusho
Annotation:The paper reviews the multi-agent systems, their application, architectures, data storage methods. Different security analysis tools and information services are discussed with concern of automatic or automated data exchange. For modern digital infrastructures, the method of integration of multi-agent systems with security analysis tools (information services) has been proposed.
Keywords:security analysis, security, integration, multi-agent system, digital infrastructure
A.M. Sukhov, S.U. Gerasimov, M.A. Eremeev, V.I. Yakunin
Annotation:The article discusses an integrated approach to the studu of the functioning of systems. The feature of the proposed method of modeling is a complex disci-those are all factors affecting the efficiency of the process under study.
Keywords:detection system prevention and mitigation of computer attacks, the effectiveness of the targeted application, the intrusion, theory of the effectiveness of targeted processes
Annotation:he article considers the security of wireless sensor networks (WSN) against malicious nodes attacks. The authors of the article analyzed the threats of WSN and identified actual cyber-attacks. The proposed approach aimed at providing protection against malicious nodes using a fuzzy logic apparatus. As part of the proposed approach, nodes are able to change their behavior and maintain the stability of their operations in the context of cyber-attacks.
Keywords:Wireless Sensor Network, WSN, cyber-physical system, adaptive control, fuzzy logic
Ivanov D.V., Moskvin D.A., Kubrin G.S.
Keywords:web-sites security; web-vulnerabilities; dynamic web-vulnerability scanners.
Aleksandrova E.B., Rekhviashvili I.S.
Annotation:An approach is proposed to solve the problem of revoking the right to sign from a group member in ring signature schemes by adding a revocation center that checks the presence of a member certificate in the revocation list.
Keywords:RING SIGNATURE, LINKING-BASED REVOCATION
Mashkina I. V., Belova Ye. P.
Annotation:he analysis of publications devoted to the study of the world market of biometric systems and their dynamics of development. The features of biometric identification and authentication systems are considered. It is proposed to use the frequency of the fourth formant of vowel sound as a biometric parameter. The architecture of an artificial neural network is developed - a database of biometric images of personality. An experiment was conducted to identify errors of the 1st and 2nd type.
Keywords:Biometric image of a person, neural network database of biometric images, biometric parameter, frequency of the fourth formant of vowel sound, voice authentication.
Annotation:A hardware approach for building secure microcontrollers is proposed. In the framework of the proposed approach, additional modules are proposed for the microcontroller architecture.
Keywords:Internet of things, embedded systems, microcontrollers, microcontroller architecture, security hardware.
Pavlenko E.Y., Lemets A.A.
Annotation:Proposed a fuzzing method for smart contracts of the Ethereum platform, based on the use of a bee colony algorithm for generating test data. Presented the main stages of the described method, and a method for applying the bee colony algorithm for generating test data. The results of the experimental evaluation of the effectiveness of the proposed method are presented, which demonstrate an increase in the coverage of the code of smart contracts during fuzzing, as well as a decrease in the number of errors of the first kind without a significant increase in errors of the second kind.
Keywords:Ethereum, security of smart contracts, dynamic analysis of smart contracts, bees algorithm, fuzzing.
Ilchenko L.M., Gallyamova M.R., Yurin I.V., Zajcev S. I.
Annotation:The purpose of this work is to determine the category of significance of information objects of telecommunications enterprises as part of the critical information infrastructure of the Russian Federation in accordance with applicable law. To identify critical processes, the method of the mathematics by Thomas Saaty - “Analityc hierarchy process” (AHP) was used, which allowed to consider all the leading factors affecting the final result of the categorization.
Keywords:Information security, critical information infrastructure, telecommunication enterprise.
I.A. Sikarev, A.V.Garanin
Annotation:The article discusses the current state of the issue of the use of unmanned ships in the water transport field, as well as highlighted the most promising areas of application of remote piloting technology of ships. Details discussed the organization of information systems for data transmission, proposed protocols for use. Within the framework of the article, technical solutions for equipping specialized unmanned vehicles for wiring and mooring of heavy cargo ships are proposed.
Keywords:unmanned transport, remote control, NMEA-2000, AIS
R.A. Ognev, E.V. Zhukovskiy, D.P. Zegzhda
Annotation:The article describes a malware clustering approach based on the analysis of WinAPI-function call traces. The conducted research uses various clustering algorithms like k-nearest neighbors, EM (Expectation-Maximization) algorithm, hierarchical clustering and affinity propagation. Evaluation of the quality of clustering was carried out using metrics like Silhouette, Calinski–Harabasz index, Davies–Bouldin index.
Keywords:The article describes a malware clustering approach based on the analysis of WinAPI-function call traces. The conducted research uses various clustering algorithms like k-nearest neighbors, EM (Expectation-Maximization) algorithm, hierarchical clustering and affinity propagation. Evaluation of the quality of clustering was carried out using metrics like Silhouette, Calinski–Harabasz index, Davies–Bouldin index.
Zaitceva E.A., Zegzhda D.P., Poltavtseva M.A.
Annotation:In this work, a case-based reasoning approach to security evaluation of computer systems is proposed. To implement case-based reasoning it was proposed to use a graph representation in combination with the improved bag-of-objects method. The results of experimental studies confirming the effectiveness of the approach are presented.
Keywords:information security, case-based reasoning, graph theory, security evaluation.
Dakhnovich A.D., Moskvin D.A., Zegzhda D.P.
Annotation:In the paper, specifics of providing cybersecurity of Industrial Internet of Things in contrast of Industrial Control Systems “Defense-in-Depth” approach. Threat taxonomy classes are also provided. Based on the cybersecurity threats analysis the requirements for Industrial Internet of Things resilience against network threats are described, as well as and approach for architecting industrial systems networks with cybersecurity by design.
Keywords:internet of things, digital manufacturing, cybersecurity, industry 4.0, cyber-physical systems.
D. Zegzhda, E. Pavlenko, D. Lavrova, A. Shtyrkina
Annotation:The article proposes a sustainability criterion for cyber-physical systems, which is the number of routes of a certain quality, which allow to perform the objective function. Routes are built on a graph that simulates the system. Attacking impacts and system restoration measures that prove the applicability of the criterion for assessing the sustainability of cyber-physical systems are considered.
Keywords:sustainability, cyber sustainability, cyber resilience, cyber-physical system, information security, graph theory.
D.P. Zegzhda, D.S. Lavrova, A.V. Yarmak
Annotation:Kalman filter is an efficient data processing algorithm that removes noise and unnecessary information, and also performs system state prediction. This paper proposes the use of a Kalman filter to solve the problem of forecasting time series describing the gasoil heating loop process. The limitations associated with this approach are described, as well as the advantages compared to other predictive models
Keywords:cybersecurity, Kalman filter, time series, time series analysis, time series forecasting.
Zaitceva E.A., Zegzhda D.P., Poltavtseva M.A.
Annotation:APPLYING OF GRAPH REPRESENTATION AND CASE-BASED REASONING FOR SECURITY EVALUATION OF COMPUTER SYSTEMS
Keywords:information security, case-based reasoning, graph theory, security evaluation.