Quarterly journal published in SPbPU
and edited by prof. Dmitry Zegzhda
Peter the Great St. Petersburg Polytechnic University
Institute of computer sciences and technologies
information security of computer systems
Information Security Problems. Computer Systems
Published since 1999.
ISSN 2071-8217
  • 2025 year
  • 2024 year
  • 2023 year
  • 2022 year
  • 2021 year
  • 2020 year
  • 2019 year
  • 2018 year
  • 2017 year
  • 2016 year
    • №1 2016
      • APPLIED CRYPTOGRAPHY

        Babash A.V.

        ACHIEVABLE UPPER BOUND FOR THE DEGREE OF DISTINCTNESS OF A CONNECTED PERMUTATION AUTOMATON

        Annotation:

        Given an achievable upper bound for the degree of distinctness of a connected permutation automaton with a given diameter.

        To quote:

        Babash A.V.

        ACHIEVABLE UPPER BOUND FOR THE DEGREE OF DISTINCTNESS OF A CONNECTED PERMUTATION AUTOMATON // Information Security Problems. Computer Systems. 2016. №1. Pp. 61-69. DOI:

        Keywords:

        STATE MACHINE, THE DEGREE OF DISTINCTIVENESS, THE DIAMETER OF THE MACHINE

        Pages:

        61-69

        Baranov A.P., Baranov P.A.

        PROBABILITY ASYMPTOTIC CRC ERROR ASSESSMENTS IN CERTAIN TELECOMMUNICATION PROTPCOLS

        Annotation:

        This paperwork is dedicated to research of k-length CRC value distribution for data interval with volume n. The paperwork examines CRC value distribution’s behavior under conditions of big n’s and fixed values of k (k = const, n ->). By means of character theory application we find the conditions of asymptotic unification of CRC distribution. Asymptotic results could be applied for error estimation for various telecommunication protocols (e.g. USB, X.25, HDLC, Bluetooth, Ethernet and others).

        To quote:

        Baranov A.P., Baranov P.A.

        PROBABILITY ASYMPTOTIC CRC ERROR ASSESSMENTS IN CERTAIN TELECOMMUNICATION PROTPCOLS // Information Security Problems. Computer Systems. 2016. №1. Pp. 70-75. DOI:

        Keywords:

        INFORMATION SECURITY, CRC, ERROR PROBABILITY, UNIFORM DISTRIBUTION, TELECOMMUNICATION PROTOCOLS

        Pages:

        70-75

        Belim S.V., Belim S.Yu.

         

        THE KDP SCHEME OF PRE-DISTRIBUTION OF KEYS FOR IMPLEMENTATION OF THE DISCRETIONARY POLICY

        Annotation:

        In article modification of the KDP-scheme of pre-distribution of keys for computer systems with discretionary model of security is considered. Access restriction defines the forbidden transmission channels of information. The scheme of pre-distribution of keys is built in such a way that for the forbidden channels becomes impossible to find a key of information exchange. An example of creation of the offered scheme is reviewed.

        To quote:

        Belim S.V., Belim S.Yu.

         

        THE KDP SCHEME OF PRE-DISTRIBUTION OF KEYS FOR IMPLEMENTATION OF THE DISCRETIONARY POLICY // Information Security Problems. Computer Systems. 2016. №1. Pp. 76-81. DOI:

        Keywords:

        KDP-SCHEME, PRE-DISTRIBUTION OF KEYS, DISCRETIONARY MODEL OF SECURITY

        Pages:

        76-81

        Tikhonov S.

        EXPERIMENTAL INVESTIGATION OF INFORMATION LEAKAGE FROM CHIPS BASED ON A MEASUREMENT OF POWER COMSUMPTION

        Annotation:

        The peculiarities of bench testing taking into account some difficulties of chip (like “Atmel”) power consumption analysis are considered. It is intended to use for further breaking of hardware-implemented block ciphers based on side attacks.Description of the minimal requested set of devices to solve this problem is presented.Analysis of the most popular cryptographic operations resulting in a leakage through such side channel is given.

        To quote:

        Tikhonov S.

        EXPERIMENTAL INVESTIGATION OF INFORMATION LEAKAGE FROM CHIPS BASED ON A MEASUREMENT OF POWER COMSUMPTION // Information Security Problems. Computer Systems. 2016. №1. Pp. 82-93. DOI:

        Keywords:

        hardware cipher implementation, secret key, S-box, power consumption, side-channel attacks, differential power analysis (DPA)

        Pages:

        82-93

        Shniperov A.N., Nikitina K.A.

        METHOD OF TEXT STEGANOGRAPHY BASED ON MARKOV CHAINS

        Annotation:

        This paper presents a new method of text steganography based on Markov chains. The basic idea of the method is to hide information in the text, that is automatically generated based on a Markov model of the original text. An algorithmic implementation of the developed method is given and the results of tests of created software package, that allows to generate texts within hidden data, are analysed. Generated texts show a good approximation of the natural language.

        To quote:

        Shniperov A.N., Nikitina K.A.

        METHOD OF TEXT STEGANOGRAPHY BASED ON MARKOV CHAINS // Information Security Problems. Computer Systems. 2016. №1. Pp. 94-101. DOI:

        Keywords:

        TEXT STEGANOGRAPHY, MARKOV CHAINS, AUTOMATIC GENERATION OF TEXTS, NATURALNESS OF TEXT

        Pages:

        94-101

        YakovlevV.A., MylnikovP.D.

        KEY DISTRIBUTION FOR WIRELESS MOBILE NETWORKS BASED ON THE USE OF MIMO CHANNELS WITH SIGNAL PHASE QUANTIZATION

        Annotation:

        The method of key distribution in wireless networks with mobile units based on the MIMO channels is investigated. The description of the method is given. The expressions for estimating of both the correct and wrong decision probability based on the use of a quantization signal phase with guard interval at MIMO channel output are proved. Optimization of system parameters providing the highest key generation rate is investigated under the condition of given probability for shared key coinciding.

        To quote:

        YakovlevV.A., MylnikovP.D.

        KEY DISTRIBUTION FOR WIRELESS MOBILE NETWORKS BASED ON THE USE OF MIMO CHANNELS WITH SIGNAL PHASE QUANTIZATION // Information Security Problems. Computer Systems. 2016. №1. Pp. 102-113. DOI:

        Keywords:

        WIRELESS NETWORK SECURITY, MIMO CHANNELS, KEY DISTRIBUTION

        Pages:

        102-113

        Sukhoparov M.E., Lebedev I.S.

        REALIZATION SYMMETRIC ENCRYPTION ON ALGORITHM GOST 28147-89 PER GPU

        Annotation:

        This article provides a method for the implementation of the algorithm of symmetric encryption GOST 28147 - 89 with the use of NVIDIA CUDA technology. Determine the most high-speed version of the system parameters and operation to ensure maximum system performance. Assess the effectiveness of the proposed solutions, as well as a comparative analysis of the approach to existing solutions.

        To quote:

        Sukhoparov M.E., Lebedev I.S.

        REALIZATION SYMMETRIC ENCRYPTION ON ALGORITHM GOST 28147-89 PER GPU // Information Security Problems. Computer Systems. 2016. №1. Pp. 101-105. DOI:

        Keywords:

        SYMMETRIC ENCRYPTION, SECURITY INFORMATION, GRAPHICS PROCESSOR, MULTI-THREADED COMPUTATION.

        Pages:

        101-105
      • INFORMATION SECURITY APPLICATION

        Azhmuhamedov I.M., Vybornova O.N., Brumshtein U.M.

        INFORMATION SECURITY RISK MANAGEMENT IN UNCERTAINTY CONDITIONS

        Annotation:

        Method of selecting optimum tactics is suggested for lowering the current information security risk to acceptable level specified by the decision maker is offered. It based on introduction of metric characteristics of acceptable and current risks, as well as algorithms of curve construction for acceptable risk and determination of current information security risk.

        To quote:

        Azhmuhamedov I.M., Vybornova O.N., Brumshtein U.M.

        INFORMATION SECURITY RISK MANAGEMENT IN UNCERTAINTY CONDITIONS // Information Security Problems. Computer Systems. 2016. №1. Pp. 7-14. DOI:

        Keywords:

        INFORMATION ASSETS, INFORMATION SECURITY RISKS, RISK-MANAGEMENT, THE COSTS OF RISK REDUCTION, FUZZY CONDITIONS

        Pages:

        7-14

        Kudiyarov D.S.

        ON SYMPA ACCOUNT CREDENTIALS STORAGE

        Annotation:

        Sympa is the open source mailing list server. CipherSaber-1 pseudo random number generator is used to secure stored Sympa user credentials. As shown in this article the securing method is vulnerable and the stored password recovery could be done with low computation complexity and moreover parallel computations may be used.

        To quote:

        Kudiyarov D.S.

        ON SYMPA ACCOUNT CREDENTIALS STORAGE // Information Security Problems. Computer Systems. 2016. №1. Pp. 15-21. DOI:

        Keywords:

        RENATER SYMPA, ACCOUNT, STORAGE

        Pages:

        15-21

        Molyakov A.S.

        EVELOPING OF NEW COMPUTING DEVICE BASED ON RUSSIAN STRATEGIC MICROPROCESSOR J7 WITH NON VON-NEIMAN ARCHITECTURE

        Annotation:

        Author describes prototype of computing device with non von-Neiman architecture, based on non – classic extremely productive models with global addressed memory and using new technologies of data transmitting operations, new 3D constructives for making efficient IT- defense.

        To quote:

        Molyakov A.S.

        EVELOPING OF NEW COMPUTING DEVICE BASED ON RUSSIAN STRATEGIC MICROPROCESSOR J7 WITH NON VON-NEIMAN ARCHITECTURE // Information Security Problems. Computer Systems. 2016. №1. Pp. 22-28. DOI:

        Keywords:

        VIRTUALIZATION, INFORMATIONAL SECURITY, NON VON-NEIMAN ARCHITECTURE, 3D CONSTRUCTIVES

        Pages:

        22-28

        Molyakov A.S.

        MARKER SCANNING IS NEW SCIENTIFIC APPROACH IN THE FIELD OF SECURED IT-SYSTEMS DEVELOPING ON EXAMPLE OF NEW GENERATION OPERATION SYSTEM MICROTEK

        Annotation:

        In this article author illustrates marker scanning as new scientific approach in the field of secured IT-systems developing, describing information system states with semantic patterns as uncontrolled context transisions using variables that resolved on all sets by implementation of procedure languages and non-procedure programming languages.

        To quote:

        Molyakov A.S.

        MARKER SCANNING IS NEW SCIENTIFIC APPROACH IN THE FIELD OF SECURED IT-SYSTEMS DEVELOPING ON EXAMPLE OF NEW GENERATION OPERATION SYSTEM MICROTEK // Information Security Problems. Computer Systems. 2016. №1. Pp. 29-36. DOI:

        Keywords:

        VIRTUALIZATION, INFORMATIONAL SECURITY, NEW GENERATION OPERATION SYSTEM, MARKER SCANNING, EXAFLOPS SUPERCOMPUTERS

        Pages:

        29-36

        Poltavtseva M.A., Lavrova D.S., Pechenkin A.I.

        PLANNING AGGREGATION AND NORMALIZATION OF DATA FROM THE INTERNET OF THINGS FOR PROCESSING ON MULTIPROCESSOR CLUSTER

        Annotation:

        This paper proposes an approach that provides a reduction of large volumes of heterogeneous data from devices of the Internet of Things, based on data aggregation and normalization processes. To reduce data volumes and to increase execution speed aggregation and normalization processes are encouraged to process the data from the device on a multiprocessor cluster. The article describes in detail the approach to this problem in the partition related subtasks, indicating which of them can be performed in parallel. Designed task allocation algorithm between nodes of the cluster and multiprocessor tasks scheduling algorithm on multiprocessor cluster node.

        To quote:

        Poltavtseva M.A., Lavrova D.S., Pechenkin A.I.

        PLANNING AGGREGATION AND NORMALIZATION OF DATA FROM THE INTERNET OF THINGS FOR PROCESSING ON MULTIPROCESSOR CLUSTER // Information Security Problems. Computer Systems. 2016. №1. Pp. 37-46. DOI:

        Keywords:

        INTERNET OF THINGS, AGGREGATION, NORMALIZATION, PLANNING, MULTIPROCESSOR CLUSTER

        Pages:

        37-46
      • NETWORK AND TELECOMMUNICATION SECURITY

        Zegzhda P.D., Kalinin M.O.

        Technology of Security Services Virtualization in High Speed Computer Networks

        Annotation:

        The paper reviews the problem of performance degradation at network traffic protection and processing mechanisms being applied in distributed IT systems. There is discussed the approach of net traffic flows classification and distribution between virtual machines. Based on that model, a high performance security gateway is proposed. This gateway runs on virtualized platform and parallelizes the net traffic processing. This approach increases the speed and reliability of security tools.

        Project is financially supported by MinistryofEducationandScienceofRussianFederation, Federal Program "Researching and Development in Priority Directions of Scientific and Technological Sphere in Russia within 2014-2020" (Contract No.14.575.21.0079; June 17, 2014).

        To quote:

        Zegzhda P.D., Kalinin M.O.

        Technology of Security Services Virtualization in High Speed Computer Networks // Information Security Problems. Computer Systems. 2016. №1. Pp. 47-52. DOI:

        Keywords:

        VIRTUALIZATION, TRAFFIC FLOWS CLASSIFICATION, PARALLEL PROCESSING, PERFORMANCE

        Pages:

        47-52

        Tarasov P.A., Isaev Е.А., Kornilov V.V.

        THE MAIN METHODS OF ENSURING INFORMATION SECURITY OF WIRELESS SENSOR NETWORKS

        Annotation:

        The article discusses the various types of vulnerabilities of wireless sensor networks and classification of attacks on the security of these networks. For each attack demonstrated the possible means of protection and prevention, detection and possible response, and shows the necessity of development and introduction of new high-tech solutions to guarantee the security of wireless sensor networks.

        To quote:

        Tarasov P.A., Isaev Е.А., Kornilov V.V.

        THE MAIN METHODS OF ENSURING INFORMATION SECURITY OF WIRELESS SENSOR NETWORKS // Information Security Problems. Computer Systems. 2016. №1. Pp. 53-60. DOI:

        Keywords:

        WIRELESS SENSOR NETWORKS, WSN, INFORMATION SECURITY, ZIGBEE

        Pages:

        53-60
    • № 2 2016
      • INFORMATION SECURITY ASPECTS

        Zegzhda D.P., Stepanova T.V., Suprun A.F.

        ESTIMATION OF IOT-SYSTEM CONTROLLABILITY USING AGENTS GRAPH WITH MULTILEVEL STRUCTURE

        Annotation:

         In this paper authors propose a novel approach of calculation the upper and lower boundaries of an index of controllability multi-agent systems, formalized as probability of existence of a way from any node to controlling center is offered, the time of transmission of the message does not exceed a constant t. Controllability - one of properties of this system, defining stability of its functioning. For calculation of boundaries of controllability the regular graph in the form of a tree with the virtual peaks is offered, allowing to apply methods of calculation of number of peaks on a certain circle.

         

        To quote:

        Zegzhda D.P., Stepanova T.V., Suprun A.F.

        ESTIMATION OF IOT-SYSTEM CONTROLLABILITY USING AGENTS GRAPH WITH MULTILEVEL STRUCTURE // Information Security Problems. Computer Systems. 2016. № 2. Pp. 7-11. DOI:

        Keywords:

        MULTI-AGENT SYSTEMS, OPERATING STABILITY, CONTROLLABILITY, MANAGEABILITY, GRAPH THEORY

        Pages:

        7-11

        Zegzhda D.P

        ON THE ROBUSTNESS OF CYBER-PHYSIC SYSTEMS TO CYBERATTACKS

        Annotation:

        The paper introduces new approach to security of symbiotic equipment and software Cyber-physic Systems on the basis of homeostasis, i.e. the properties to maintain the system functioning in the hostile environment. Author proposes formal dynamic model based on this approach.

         

        To quote:

        Zegzhda D.P

        ON THE ROBUSTNESS OF CYBER-PHYSIC SYSTEMS TO CYBERATTACKS // Information Security Problems. Computer Systems. 2016. № 2. Pp. 12-20. DOI:

        Keywords:

        CYBER-PHYSIC SYSTEMS, CYBERTHREAT, CYBERSECURITY,HOMEOSTASIS, DYNAMIC MODEL

        Pages:

        12-20

        Ivanov A.I., Gazin A.I., Perfilov K.A., Vyatchanin S.E.

        NOISE ELIMINATION OF QUANTIZATION BIOMETRIC DATA WHILE USING MULTIVARIATE TEST CRAMER–VON MIZES IN SMALL SAMPLES

        Annotation:

        It is shown that presentation of continuous illumination and probability function with small number of examples biometric origin create quantizing noise with a high value of AM andpotency. The statistical test of Smirnov – Kolmogorovrepresents the estimation of maximum modulus value of noise elimination. The statistical criteria of Cramer-vonMizes is quadratic estimator of noise quantization potency. Using such an interpretation, it is possible to eliminate noises of quantization biometric data with the help of using multivariate variant of Cramer-von Mizes statistical criteria. It is believed that Cramer-von Mizes statistical criteria in small number of samples works more effectively, than chi square criteria of Peterson.

        To quote:

        Ivanov A.I., Gazin A.I., Perfilov K.A., Vyatchanin S.E.

        NOISE ELIMINATION OF QUANTIZATION BIOMETRIC DATA WHILE USING MULTIVARIATE TEST CRAMER–VON MIZES IN SMALL SAMPLES // Information Security Problems. Computer Systems. 2016. № 2. Pp. 21-28. DOI:

        Keywords:

        NOISE ELIMINATION OF QUANTIZATION BIOMETRIC DATA WHILE USING MULTIVARIATE TEST CRAMER–VON MIZES IN SMALL SAMPLES

        Pages:

        21-28
      • INFORMATION SECURITY APPLICATION

        Zhuravel E.P., Sherstyuk Yu.M.

        THE INFORMATON SECURITY IN THE ENHANCED TELECOMS OPERATIONS MAP

        Annotation:

        In article risk of information security on a classification sign of a type of impact on the equipment and control systems of communication networks in the enhanced telecom operations map are considered and the technical solution directed on decrease and/or weakening of their influence for ensuring functioning in the conditions of the incidents connected with threats and/or violations of information security is proposed.

        To quote:

        Zhuravel E.P., Sherstyuk Yu.M.

        THE INFORMATON SECURITY IN THE ENHANCED TELECOMS OPERATIONS MAP // Information Security Problems. Computer Systems. 2016. № 2. Pp. 29-36. DOI:

        Keywords:

        CONTROL PLANE; FUNCTIONAL SUPPORT PLANE.

        Pages:

        29-36
      • NETWORK AND TELECOMMUNICATION SECURITY

        Konoplev A.S., Kalinin M.O.

        ACCESS CONTROL SYSTEM IN DISTRIBUTED COMPUTING NETWORKS

        Annotation:

        The paper describes architecture of access control system in distributed computing networks which provides data security against the attacks of user privileges escalation. Comparison of proposed system with analogs is presented. The results of access control system effectiveness estimates are also provided.

        To quote:

        Konoplev A.S., Kalinin M.O.

        ACCESS CONTROL SYSTEM IN DISTRIBUTED COMPUTING NETWORKS // Information Security Problems. Computer Systems. 2016. № 2. Pp. 36-43. DOI:

        Keywords:

        DISTRIBUTED COMPUTING NETWORKS, GRID SYSTEM, UNAUTHORIZED ACCESS, ACCESS CONTROL, ACCESS CONTROL SYSTEM.

        Pages:

        36-43

        KonoplevA.S., KalininM.O.

        INFORMATION SECURITY CHALLENGES OF DISTRIBUTED COMPUTING NETWORKS

        Annotation:

        The paper highlights problem of information security in distributed computing networks. Grid system architecture features have been analyzed. Information security threats in distributed computing networks are classified. The existing security arrangements for Grid systems are presented, their disadvantages are admitted. The complex of information security challenges of distributed computing networks is formulized which are aimed to provide defense against the unauthorized access.

        To quote:

        KonoplevA.S., KalininM.O.

        INFORMATION SECURITY CHALLENGES OF DISTRIBUTED COMPUTING NETWORKS // Information Security Problems. Computer Systems. 2016. № 2. Pp. 44-49. DOI:

        Keywords:

        DISTRIBUTED COMPUTING NETWORKS, GRID SYSTEM, INFORMATION SECURITY, SECURITY THREATS, ACCESS CONTROL POLICY.

        Pages:

        44-49

        Lavrova D.S.

        APPROACH TO THE DEVELOPMENT OF SIEM-SYSTEM FOR THE INTERNET OF THINGS

        Annotation:

        Proposed an approach to the construction of the security incident analysis systems for Internet of Things. This approach consists in the consideration of Internet of Things as a self-similar system with its normal functioning. A graph model of the Internet of Things as a cyber physical system, based on the sufficiency of analysis of paired relationships extracted from the digital stream of messages from devices to identify security incidents.

        To quote:

        Lavrova D.S.

        APPROACH TO THE DEVELOPMENT OF SIEM-SYSTEM FOR THE INTERNET OF THINGS // Information Security Problems. Computer Systems. 2016. № 2. Pp. 50-60. DOI:

        Keywords:

        INTERNET OF THINGS, SECURITY INCIDENT, DATA ANALYSIS, AGGREGATION, LARGE VOLUMES OF DATA, PAIRED RELATIONS, SELF-SIMILARITY.

        Pages:

        50-60

        Nikonov V.V., Loss V.P., Ross G.V.

        DEVELOPMENT OF AUTOMATED SYSTEM FOR IDENTIFYING ABNORMAL NETWORK ACTIVITY AND DETECT THREATS

        Annotation:

        This article describes the features of the implementation of the system to identify abnormal network activity. Developed algorithms and software systems to identify abnormal network activity and detect threats.

        To quote:

        Nikonov V.V., Loss V.P., Ross G.V.

        DEVELOPMENT OF AUTOMATED SYSTEM FOR IDENTIFYING ABNORMAL NETWORK ACTIVITY AND DETECT THREATS // Information Security Problems. Computer Systems. 2016. № 2. Pp. 61-69. DOI:

        Keywords:

        CONTINGENCY NETWORK ACTIVITY, NETWORK THREATS, AGENTS LOG ACTIVITY PROFILE, THE NETWORK NODE CARD SOCKET, THE WINSOCK LIBRARY.

        Pages:

        61-69

        SukhoparovM.E., LebedevI.S., KorzhukV.M., KrivtsovaI.E., PecherkinS.A.

        PROVIDING INFORMATION SECURITY BASED COMMUNICATION CHANNELS MULTIFUNCTIONAL AND SPECIALIZED HARDWARE AND SOFTWARE SOLUTIONS

        Annotation:

        The proposed solution is to use methods that ensure the implementation of preventive measures aimed at increasing the complexity of the implementation of information security threats on a compact device based on PC-104 + form factor. The estimation of the information counter attacks and simulated device status in various modes, and the introduction of additional security features.

        To quote:

        SukhoparovM.E., LebedevI.S., KorzhukV.M., KrivtsovaI.E., PecherkinS.A.

        PROVIDING INFORMATION SECURITY BASED COMMUNICATION CHANNELS MULTIFUNCTIONAL AND SPECIALIZED HARDWARE AND SOFTWARE SOLUTIONS // Information Security Problems. Computer Systems. 2016. № 2. Pp. 70-74. DOI:

        Keywords:

        WIRELESS LINKS, INFORMATION PROTECTION SYSTEM, INFORMATION SECURITY, COUNTERING INFORMATION ATTACKS.

        Pages:

        70-74
        Baranov A.P., Baranov P.A.
        PROBABILITY crc error assessments with low distortion levels of transferred information

        Annotation:

        A white binary noise information distortion model is proposed in papers [1] and [2]. In this paperwork we analyze limiting behavior of CRC error probabilities with low values of p, which stands for distortion probability of a single bit that belongs to the information being transferred. Using acquired theoretical results we assess values of error probabilities to claim transferred information packet

        To quote:

        Baranov A.P., Baranov P.A. PROBABILITY crc error assessments with low distortion levels of transferred information // Information Security Problems. Computer Systems. 2016. № 2. Pp. 75-83. DOI:

        Keywords:

        INFORMATION SECURITY, CRC, ERROR PROBABILITY, LOW DISTORTION LEVEL, TELECOMMUNICATION PROTOCOLS.

        Pages:

        75-83
      • APPLIED CRYPTOGRAPHY

         

        Belim S.V., Bogachenko N.F.

         

        The cryptographic keys distribution in the systems with the object hierarchy

        Annotation:

        The algorithm for distribution of cryptographic keys which is based on the hierarchical structure of objects in the system is presented in this article. The substantiation of the algorithm for certain types of the objects hierarchy is given. The mechanism of the setting of the mandatory and discretionary access control using the developed algorithm is suggested.

        To quote:

         

        Belim S.V., Bogachenko N.F.

         

        The cryptographic keys distribution in the systems with the object hierarchy // Information Security Problems. Computer Systems. 2016. № 2. Pp. 84-95. DOI:

        Keywords:

        CRYPTOGRAPHIC KEYS DISTRIBUTION, OBJECT HIERARCHY, HASH FUNCTION, ACCESS CONTROL.

        Pages:

        84-95
        SYSTEM IDENTIFICATION AND AUTHENTICATION OF USERS ON THE BASIS OF FUZZY HYBRID APPROACH

        Annotation:

        Sumkin K.S., Loss V.P., Ross G.V.

        To quote:

        SYSTEM IDENTIFICATION AND AUTHENTICATION OF USERS ON THE BASIS OF FUZZY HYBRID APPROACH // Information Security Problems. Computer Systems. 2016. № 2. Pp. 95-100. DOI:

        Keywords:

        IDENTIFICATION AND AUTHENTICATION OF USERS, CLUSTERING, FUZZY SETS, FUZZY RELATIONAL DATA MODEL, THE MEMBERSHIP FUNCTION.

        Pages:

        95-100

        Tikhonov S.V.

        EXPERIMENTAL INVESTIGATION OF OPPORTUNITY TO BREAK HARDWARE IMPLEMENTED ON FEISTEL STRUCTURE BLOCK CIPHERS WITH THE USE OF POWER COMSUMPTION MEASUREMENT ATTACK

        Annotation:

        Investigation of hardware implemented block cipher based on Feistel structure is considered. It is shown that such cipher can be easily broken in real time even for very long key length. The most vulnerable to such attack operations within encryption algorithm are found. The main approaches are presented that simplify the way to break any hardware implemented cipher if it does not have special protection.

        To quote:

        Tikhonov S.V.

        EXPERIMENTAL INVESTIGATION OF OPPORTUNITY TO BREAK HARDWARE IMPLEMENTED ON FEISTEL STRUCTURE BLOCK CIPHERS WITH THE USE OF POWER COMSUMPTION MEASUREMENT ATTACK // Information Security Problems. Computer Systems. 2016. № 2. Pp. 106-117. DOI:

        Keywords:

        SECRET KEY, ALGORITHM DES, DPA, SPA ATTACKS, S-BOXES, POWER ATTACKS, SIDE-CHANNEL ATTACKS, DIFFERENTIAL POWER ANALYSIS.

        Pages:

        106-117
      • SOFTWARE SECURITY

        KosachokA.V.

        Developing malware detection heuristic engine based on hidden markov models

        Annotation:

        The article describes questions of heuristic malware detection based on hidden markov models application to reduce risk of malware infection.

        To quote:

        KosachokA.V.

        Developing malware detection heuristic engine based on hidden markov models // Information Security Problems. Computer Systems. 2016. № 2. Pp. 118-127. DOI:

        Keywords:

        ANTIVIRUS TOOLS, HIDDEN MARKOV MODELS, MALWARE.

        Pages:

        118-127
    • №3 2016
      • INFORMATION SECURITY ASPECTS

        P. D. Zegzhda, D. P. Zegzhda, A. I. Pechenkin, M. A. Poltavtseva

        INFORMATION SYSTEMS MODELING TO SOLVE THE PROBLEM OF SECURITY MANAGEMENT

        Annotation:

        (Russian)

        Предложенная графовая модель для решения задачи управления безопасностью информационных систем включает моделирование атак различного рода на информационные системы. Выбран оптимальный способ размещения средств контроля доступа к данным и дана количественная оценка защищенности конкретных узлов системы.

        To quote:

        P. D. Zegzhda, D. P. Zegzhda, A. I. Pechenkin, M. A. Poltavtseva

        INFORMATION SYSTEMS MODELING TO SOLVE THE PROBLEM OF SECURITY MANAGEMENT // Information Security Problems. Computer Systems. 2016. №3. DOI:

        Keywords:

        security assessment, information systems security, modeling systems, computer systems security, information security tools.

        Volkova V.N., Chernyy Yu.Yu.

        USAGE OF LAWS OF THE SYSTEMS THEORY TO RESEARCH THE PROBLEMS OF INFORMATION SAFETY

        Annotation:

        It is proposed to study issues of information security on the base the laws of systems theory and to substantiate the importance the takes into account social effects of cyber-space.

        To quote:

        Volkova V.N., Chernyy Yu.Yu.

        USAGE OF LAWS OF THE SYSTEMS THEORY TO RESEARCH THE PROBLEMS OF INFORMATION SAFETY // Information Security Problems. Computer Systems. 2016. №3. Pp. 17. DOI:

        Keywords:

        laws of systems theory, information, information security, cyberspace, systems theory, entropy-negentropy processes.

        Pages:

        17

        L. V. Utkin, V. S. Zaborovsky, S. G. Popov

        INFORMATION SECURITY CONTROL IN MULTI-ROBOT SYSTEMS ON THE BASIS OF DEEP LEARNING ELEMENTS

        Annotation:

        (Russian)

        Рассмотрена процедура предварительной обработки данных для контроля информационной безопасности элементов системы роботов, которая использует специальный вид нейронной сети — автокодер для решения двух задач. Первая задача — уменьшение размерности обучающих данных для вычисления расстояния Махаланобиса — одна из лучших метрик для обнаружения аномального поведения роботов или сенсоров в системе роботов. Вторая — применение автокодера для передачи обучения на целевых данных, которые соответствуют экстремальным условиям функционирования системы роботов.

        To quote:

        L. V. Utkin, V. S. Zaborovsky, S. G. Popov

        INFORMATION SECURITY CONTROL IN MULTI-ROBOT SYSTEMS ON THE BASIS OF DEEP LEARNING ELEMENTS // Information Security Problems. Computer Systems. 2016. №3. DOI:

        Keywords:

        multi-robot system, information security control, anomaly detection, autoencoder, Mahalanobis distance, transfer learning, target and source data.
      • INFORMATION SECURITY APPLICATION

        A. S. Zaitsev, A. A. Malyuk

        THE IDENTIFICATION OF POTENTIAL INSIDER USING CLASSIFICATION MODELS

        Annotation:

        The paper considers classifying models that allow to detect potential insider basing on technical and behavioural indicators under conditions of incomplete information about his behaviour.

        To quote:

        A. S. Zaitsev, A. A. Malyuk

        THE IDENTIFICATION OF POTENTIAL INSIDER USING CLASSIFICATION MODELS // Information Security Problems. Computer Systems. 2016. №3. Pp. 34-42. DOI:

        Keywords:

        information security insider threats, data mining, classifying models, CHAID, neural networks, decision trees

        Pages:

        34-42

        Sh. G. Magomedov, T. Yu. Morozova, D. A. Akimov

        SECURE DATA TRANSMISSION IN COMPUTER NETWORKS BASED ON THE USE OF RESIDUAL CLASSES OF SYSTEMS

        Annotation:

        The paper proposes a procedure for the use of residual classes of systems in the formation of the encryption keys that allows for modification and key exchange without any interaction with the network security system in a continuous mode as needed on the basis of residual classes of systems.

        To quote:

        Sh. G. Magomedov, T. Yu. Morozova, D. A. Akimov

        SECURE DATA TRANSMISSION IN COMPUTER NETWORKS BASED ON THE USE OF RESIDUAL CLASSES OF SYSTEMS // Information Security Problems. Computer Systems. 2016. №3. Pp. 43-47. DOI:

        Keywords:

        residue number system, encryption, information security, computer network

        Pages:

        43-47

        O. V. Trubienko, V. I. Kuznetsov

        SYSTEM INTELLIGENT MONITORING THE FUNCTIONAL STATUS OF DYNAMIC OBJECTS

        Annotation:

        On the basis of statistical data the EMERCOM of Russia on emergency situation the authors come to the conclusion about the need to create a complex system of intellectual-term monitoring of dynamic objects of industrial facilities and residential buildings. The article describes the composition and operation of the monitor system of complex the monitor.

        To quote:

        O. V. Trubienko, V. I. Kuznetsov

        SYSTEM INTELLIGENT MONITORING THE FUNCTIONAL STATUS OF DYNAMIC OBJECTS // Information Security Problems. Computer Systems. 2016. №3. Pp. 48-54. DOI:

        Keywords:

        innovation, safety, security complex

        Pages:

        48-54

        A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, E. E. Timonina

        DATA MINING IN ENSURING INFORMATION SECURITY

        Annotation:

        Now there is a large number of the directions and of the results of development of artificial intelligence systems. The paper is devoted to the available description of connection of some problems of information security and the opportunities given by data mining.

        To quote:

        A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, E. E. Timonina

        DATA MINING IN ENSURING INFORMATION SECURITY // Information Security Problems. Computer Systems. 2016. №3. Pp. 55-60. DOI:

        Keywords:

        information security, data mining, the distributed information systems

        Pages:

        55-60

        V. G. Anisimov, E. G. Anisimov, D. A. Bazhin, P. D. Zegzhda, A. F. Suprun

        THE RISK-BASED METHOD FOR ORGANIZATION OF MONITORING IN INFORMATION SYSTEMS SECURITY FACILITIES

        Annotation:

        The article considers the methodological statements, concerning the creation of models and methods for decision support in the sphere of security monitoring organization for information systems. The designation of monitoring is to neutralize the internal and external impacts leading to occasional or intentional access to stored or processed data, as well as to its damage or distortion.

        To quote:

        V. G. Anisimov, E. G. Anisimov, D. A. Bazhin, P. D. Zegzhda, A. F. Suprun

        THE RISK-BASED METHOD FOR ORGANIZATION OF MONITORING IN INFORMATION SYSTEMS SECURITY FACILITIES // Information Security Problems. Computer Systems. 2016. №3. Pp. 61-67. DOI:

        Keywords:

        information system, security, risk, monitoring organization, model

        Pages:

        61-67
      • NETWORK AND TELECOMMUNICATION SECURITY

        D. S. Lavrova

        ONTOLOGICAL MODEL OF SUBJECT FIELD OF THE INTERNET OF THINGS FOR SECURITY ANALYSIS

        Annotation:

        In this paper proposed an ontological model of the subject field of the Internet of Things, which provides a detailed view of the linkages and relationships between the elements of the system at different levels of abstraction, with varying degrees of detail. Designed ontological model allows us to understand the technical aspects of the development of SIEM-system for the identification and analysis of security incidents in the Internet of Things

        To quote:

        D. S. Lavrova

        ONTOLOGICAL MODEL OF SUBJECT FIELD OF THE INTERNET OF THINGS FOR SECURITY ANALYSIS // Information Security Problems. Computer Systems. 2016. №3. Pp. 68-75. DOI:

        Keywords:

        Internet of things, security incident, data analysis, aggregation, large volumes of data, SIEM system, ontology

        Pages:

        68-75

        N. A^. Bazhaev, I. E. Krivtsova, I. S. Lebedev, M. E. Sukhoparov

        MODELING OF INFORMATION INFLUENCE ON THE REMOTE DEVICE WIRELESS

        Annotation:

        Considered a wireless network under "broadcast storm" attack, in order to determine the availability of stand-alone units, the ability to carry out their tasks in the functional impact of the information. Identified a number of conditions for the  organization of attack by a potential intruder. The analysis of system availability of devices based on wireless technologies.
        Proposed model can be used to determine the technical characteristics of a wireless ad hoc network of devices.

        To quote:

        N. A^. Bazhaev, I. E. Krivtsova, I. S. Lebedev, M. E. Sukhoparov

        MODELING OF INFORMATION INFLUENCE ON THE REMOTE DEVICE WIRELESS // Information Security Problems. Computer Systems. 2016. №3. Pp. 76-84. DOI:

        Keywords:

        information security, wireless networks, multi-agent systems, vulnerability, accessibility of devices, information security model

        Pages:

        76-84

        D. V. Ivanov, D. A. Moskvin, A.V. Myasnikov

        THE USE OF NFC TECHNOLOGY FOR USER DATA AUTOMATED REPLICATION

        Annotation:

        The article presents results of analyze of user data replication mechanisms. The authors have classified replication mechanisms, have identified its advantages and disadvantages, and have proposed a method that uses NFC technology to establish a secure channel data replication.

        To quote:

        D. V. Ivanov, D. A. Moskvin, A.V. Myasnikov

        THE USE OF NFC TECHNOLOGY FOR USER DATA AUTOMATED REPLICATION // Information Security Problems. Computer Systems. 2016. №3. Pp. 85-90. DOI:

        Keywords:

        REPLICATION, USER PROFILE, SECURE CHANNEL, NFC, EMULATION, DATA TRANSFER

        Pages:

        85-90
      • APPLIED CRYPTOGRAPHY

        N. N. Shenets, I. V. Bulatov

        COMPARATIVE ANALYSIS OF MODULAR THRESHOLD SECRET SHARING SCHEMES

        Annotation:

        In this work the modular threshold secret sharing schemes are considered, in particular, Shamir’s scheme and general modular scheme in the univariate polynomial ring over Galois field. Different qualitative and numerical properties of such schemes are compared; the problems of its optimal realization are studied.

        To quote:

        N. N. Shenets, I. V. Bulatov

        COMPARATIVE ANALYSIS OF MODULAR THRESHOLD SECRET SHARING SCHEMES // Information Security Problems. Computer Systems. 2016. №3. Pp. 91-101. DOI:

        Keywords:

        words: modular secret sharing schemes, ideality, perfectness, computational complexity.

        Pages:

        91-101

        E. B. Aleksandrova, E. N. Shkorkina

        TRIPARTITE OUTSOURCING KEY-AGREEMENT PROTOCOL ON BILINEAR PAIRINGS

        Annotation:

        In cryptographic protocols, being implemented in the systems using resource-constrained devices, hard computations can be outsourced to cloud servers. Light-weight arithmetic operations are carried out on the device. The tripartite key-agreement protocol with two servers in the one-malicious version of two untrusted program model is suggested.

        To quote:

        E. B. Aleksandrova, E. N. Shkorkina

        TRIPARTITE OUTSOURCING KEY-AGREEMENT PROTOCOL ON BILINEAR PAIRINGS // Information Security Problems. Computer Systems. 2016. №3. Pp. 102-108. DOI:

        Keywords:

        Outsourcing algorithm, bilinear pairing, tripartite Diffie–Hellman protocol

        Pages:

        102-108

        D. P. Zegzhda, E. B. Aleksandrova, A. S. Konoplev

        APPLYING THE GROUP SIGNATURE FOR ENTITY AUTHENTICATION IN DISTRIBUTED COMPUTING NETWORKS SUCH AS “GRID”

        Annotation:

        The paper reviews the problem of unauthorized access to the data in distributed computing networks. Available implementations of authentication mechanisms in Grid systems are discussed, their disadvantages are considered. The group signature approach is proposed, which exceeds unauthorized access to computing environment and provides integrity of transmitted data.

        To quote:

        D. P. Zegzhda, E. B. Aleksandrova, A. S. Konoplev

        APPLYING THE GROUP SIGNATURE FOR ENTITY AUTHENTICATION IN DISTRIBUTED COMPUTING NETWORKS SUCH AS “GRID” // Information Security Problems. Computer Systems. 2016. №3. Pp. 109-114. DOI:

        Keywords:

        distributed computing networks, Grid system, unauthorized access, authentication, group signature, elliptic curve

        Pages:

        109-114
      • TECHNICAL SOLUTION

        Sikarev I.A., Volkova T.A., Galochkin R.N.

        COEFFICIENTS OF MUTUAL DIFFERENCE FOR COMPLEX DISCRETE-MANIPULATED SIGNALS WITH DISCONTINUOUS IN TIME STRUCTURE

        Annotation:

        The problem of calculating coefficients of mutual difference (CMD) for complex discrete-manipulated signals (DMS) with discontinuous in time structure in terms of (measure of) determining the degree of electromagnetic protection is considered.

        To quote:

        Sikarev I.A., Volkova T.A., Galochkin R.N.

        COEFFICIENTS OF MUTUAL DIFFERENCE FOR COMPLEX DISCRETE-MANIPULATED SIGNALS WITH DISCONTINUOUS IN TIME STRUCTURE // Information Security Problems. Computer Systems. 2016. №3. Pp. 115-118. DOI:

        Keywords:

        DISCRETE-MANIPULATED SIGNALS (DMS), SIGNALS WITH DISCONTINUOUS IN TIME STRUCTURE, NARROW-BAND INTERFERENCE, COEFFICIENT OF MUTUAL DIFFERENCE (CMD).

        Pages:

        115-118
      • SOFTWARE SECURITY

        PavlenkoE.Yu., YarmakA.V., MoskvinD.A.

        USE OF CLUSTERING METHODS FOR THE ANALYSIS OF SECURITY ANDROID APPLICATIONS

        Annotation:

        The article presents results of the malware identification problem research in Google Android operating system. To resolve this problem authors have created the system, based on the fuzzy clustering method which use an application parameters vector. This vector is result of the static and dynamic analysis of the application code. The paper describes the application settings that are used for drawing vector features, and also highlights the efficiency of the use of different criteria of separability in relation to the task and given the format of the input data. An experimental evaluation of the proposed system, showing a high level of malware detection for the Google Android operating system.

        To quote:

        PavlenkoE.Yu., YarmakA.V., MoskvinD.A.

        USE OF CLUSTERING METHODS FOR THE ANALYSIS OF SECURITY ANDROID APPLICATIONS // Information Security Problems. Computer Systems. 2016. №3. Pp. 119-126. DOI:

        Keywords:

        Google Android, security of mobile devices, cluster analysis, machine learning, malware, static analysis, dynamic analysis.

        Pages:

        119-126
    • №4 2016
      • INFORMATION SECURITY APPLICATION

        ZegzhdaP.D., MalyshevE.V., PavlenkoE.Y.

        USE OF NEURAL NETWORK FOR DETECTION AUTOMATICALLY CONTROLLED ACCOUNTS IN SOCIAL NETWORKS

        Annotation:

        In this paper, authors consider the problem of identifying automatically managed accounts (bots) in social networks and propose a method for bots detection based on machine learning methods. The paper describes an example of a method based on artificial neural network training, also were represented parameters of user account in social network for bots detection. An experimental evaluation of the proposed system shows a high degree of bots detection in social networks.

        To quote:

        ZegzhdaP.D., MalyshevE.V., PavlenkoE.Y.

        USE OF NEURAL NETWORK FOR DETECTION AUTOMATICALLY CONTROLLED ACCOUNTS IN SOCIAL NETWORKS // Information Security Problems. Computer Systems. 2016. №4. Pp. 9-15. DOI:

        Keywords:

        information security, social networks, bots in social networks, neural network, bot detection

        Pages:

        9-15
        Kalinin M., Busygin А., Konoplev A.
        SECURITY APPROACHES TO TLS PROTOCOL BASED APPLICATIONS FROM CERTIFICATE REVOCATION ATTACKS

        Annotation:

        The paper reviews the problem of TLS protocol based applications. It highlights attack scenarios to such applications, using certificate revocation vulnerabilities. There is a comparison of X.509 certificate status verification methods is presented which is applied in conjunction with TLS protocol, their advantages and disadvantages are specified.

        To quote:

        Kalinin M., Busygin А., Konoplev A. SECURITY APPROACHES TO TLS PROTOCOL BASED APPLICATIONS FROM CERTIFICATE REVOCATION ATTACKS // Information Security Problems. Computer Systems. 2016. №4. Pp. 16-22. DOI:

        Keywords:

        certificate revocation, TLS protocol, authentication, man-in-the-middle attacks, Grid system, X.509 standard.

        Pages:

        16-22

        M. O. Kalinin, A. A. Minin

        DETECTION OF INFORMATION SECURITY THREATS IN COMPUTER NETWORKS WITH DYNAMIC TOPOLOGY USING HOSTS ACTIVITY MONITORING

        Annotation:

        This paper reviews security problems in computer networks with dynamic topology (e.g. mesh, MANET, computing grid). There is suggested a method of security threats detection in such networks based on graph modeling

        To quote:

        M. O. Kalinin, A. A. Minin

        DETECTION OF INFORMATION SECURITY THREATS IN COMPUTER NETWORKS WITH DYNAMIC TOPOLOGY USING HOSTS ACTIVITY MONITORING // Information Security Problems. Computer Systems. 2016. №4. Pp. 23-31. DOI:

        Keywords:

        network with dynamic topology, mesh, adhoc, sensor network, security, security node, traffic statistics

        Pages:

        23-31

        A. A. Grusho, N. A. Grusho, M. V. Levykin, E. E. Timonina

        SECURE ARCHITECTURE OF DISTRIBUTED INFORMATION SYSTEMS ON THE BASIS OF INTEGRATED VIRTUALIZATION

        Annotation:

        In the paper the concept of integrated virtualization of information technology and tasks for the purpose of isolation of valuable information from risk hosts is entered. The technology of realization of business processes and in parallel the technology of realization of the principles of isolation for ensuring information security is considered. At a certain stage of realization of business processes the security model and model developed for business process is unified. The resulted model can be implemented with the help of integrated system of virtual computers and the operated information flows.

        To quote:

        A. A. Grusho, N. A. Grusho, M. V. Levykin, E. E. Timonina

        SECURE ARCHITECTURE OF DISTRIBUTED INFORMATION SYSTEMS ON THE BASIS OF INTEGRATED VIRTUALIZATION // Information Security Problems. Computer Systems. 2016. №4. Pp. 32-35. DOI:

        Keywords:

        information security, the distributed information systems, virtualization

        Pages:

        32-35

        A. Y. Chernov, A. S. Konoplev

        TRUSTED EXECUTABLE ENVIRONMENT CONSTRUCTION TASK ON INTEL-BASED PC

        Annotation:

        The paper reviews the problem of construction trusted executable environment on modern PC architecture. It shows main features of software execution on different privilege levels. Intel ME architecture has been reviewed. There are Intel ME potential threats highlighted and shown possible ways to solve them.

        To quote:

        A. Y. Chernov, A. S. Konoplev

        TRUSTED EXECUTABLE ENVIRONMENT CONSTRUCTION TASK ON INTEL-BASED PC // Information Security Problems. Computer Systems. 2016. №4. Pp. 36-41. DOI:

        Keywords:

        Trusted execution, PC architecture, hypervisor, virtualization, BIOS, Intel ME

        Pages:

        36-41
      • NETWORK AND TELECOMMUNICATION SECURITY

        Zegzhda D.P., Moskvin D.A., Dakhnovich A.D.

        WIFI USER PROTECTION FROM FAKE ACCESS POINTS

        Annotation:

        The article presents results of analyze of WiFi network protection mechanisms. The authors propose the access point authentication method, which can be used in various designed networks.

        To quote:

        Zegzhda D.P., Moskvin D.A., Dakhnovich A.D.

        WIFI USER PROTECTION FROM FAKE ACCESS POINTS // Information Security Problems. Computer Systems. 2016. №4. Pp. 42-49. DOI:

        Keywords:

        WiFi, client protection, access point, wireless client, authentication

        Pages:

        42-49

        D. P. Zegzhda, E. S. Usov, A. V. Nikolsky, E. Y. Pavlenko

        USE OF INTEL SGX TECHNOLOGIES OF ENSURE THE CONFIDENTIALITY OF DATA CLOUD SYSTEMS USERS

        Annotation:

        In this paper is considered the problem of users’ data confidentiality in cloud systems from attacks by the provider. The system of secure cloud computing using Intel Software Guard Extensions technology (SGX) is also considered. The paper describes Intel SGX technology, the basic concepts and security mechanisms. Possibility of using this technology in the cloud system is shown. An experimental scheme of the proposed system provides data confidentiality for cloud systems users, and provides a method of implementation of the scheme in existing cloud systems.

        To quote:

        D. P. Zegzhda, E. S. Usov, A. V. Nikolsky, E. Y. Pavlenko

        USE OF INTEL SGX TECHNOLOGIES OF ENSURE THE CONFIDENTIALITY OF DATA CLOUD SYSTEMS USERS // Information Security Problems. Computer Systems. 2016. №4. Pp. 50-57. DOI:

        Keywords:

        Intel SGX, enclave, cloud systems, data confi dentiality, encryption, hypervisor, protected memory.

        Pages:

        50-57

        D. V. Kostin, O. I. Sheluhin

        MACHINE LEARNING BASED ENCRYPTED TRAFFIC CLASSIFICATION TO DETECT NETWORK INTRUSIONS

        Annotation:

        The objective of this work is to assess the robustness of machine learning based encrypted traffic classification to detect network intrusion. In this work, we have focused on the identification of four types of encrypted traffic: Skype, Tor, PuTTY (SSHv2) and CyberGhost (VPN). In order to classify encrypted traffic five different machine learning algorithms are employed. These are Naive Bayes, C4.5, AdaBoost and Random Forest. We describe a comparison the two methods of traffic classification based on machine learning: generation and analysis of network flows and analysis of each network packet.

        To quote:

        D. V. Kostin, O. I. Sheluhin

        MACHINE LEARNING BASED ENCRYPTED TRAFFIC CLASSIFICATION TO DETECT NETWORK INTRUSIONS // Information Security Problems. Computer Systems. 2016. №4. Pp. 57-67. DOI:

        Keywords:

        TRAFFIC CLASSIFICATION, ENCRYPTED TRAFFIC, MACHINE LEARNING, INTRUSION DETECTION SYSTEM.

        Pages:

        57-67

        D. V. Ivanov, D. A. Moskvin, T. D. Ovasapyan

        APPROACHES FOR DETECTION OF ACTIVE NETWORK NODES IN THE IPV6 ADDRESS SPACE

        Annotation:

        The article describes the approaches to the detection of active network nodes in the IPv6 address space. Two main families of approaches are described: with and without using the initial sample.

        To quote:

        D. V. Ivanov, D. A. Moskvin, T. D. Ovasapyan

        APPROACHES FOR DETECTION OF ACTIVE NETWORK NODES IN THE IPV6 ADDRESS SPACE // Information Security Problems. Computer Systems. 2016. №4. Pp. 68-73. DOI:

        Keywords:

        networks, information security audit, internet, ipv6, network nodes

        Pages:

        68-73
        I. V. Alekseev, V. V. Platonov
        IDENTIFICATION OF THE ENCRYPTED EXECUTABLE FILES BASED ON THE ENTROPY ANALYSIS FOR DETECTION VALUE RANDOMNESS OF BYTE SEQUENCES

        Annotation:

        Method of detecting malware that uses encryption as a disguise. The paper describes the modification of statistical spectral test based on entropy analysis.

        To quote:

        I. V. Alekseev, V. V. Platonov IDENTIFICATION OF THE ENCRYPTED EXECUTABLE FILES BASED ON THE ENTROPY ANALYSIS FOR DETECTION VALUE RANDOMNESS OF BYTE SEQUENCES // Information Security Problems. Computer Systems. 2016. №4. Pp. 74-79. DOI:

        Keywords:

        potential malware detection, cryptоr, statistical tests, entropy.

        Pages:

        74-79

        L. V. Utkin, V. S. Zaborovsky, S. G. Popov

        SIAMESE NEURAL NETWORK FOR INTELLIGENT INFORMATION SECURITY CONTROL IN MULTIROBOT SYSTEMS

        Annotation:

        Anomaly detection of the robot system behavior is one of the important components of the information security control. In order to control robots equipped with many sensors it is difficult to apply the well-known Mahalanobis distance which allows us to analyze the current state of the sensors. Therefore, the Siamese neural network is proposed to intellectually support the security control. The Siamese network simplifies the anomaly detection of the robot system and realizes a non-linear analogue of the Mahalanobis distance. This peculiarity allows us to take into account complex data structures received from the robot sensors.

        To quote:

        L. V. Utkin, V. S. Zaborovsky, S. G. Popov

        SIAMESE NEURAL NETWORK FOR INTELLIGENT INFORMATION SECURITY CONTROL IN MULTIROBOT SYSTEMS // Information Security Problems. Computer Systems. 2016. №4. Pp. 80-88. DOI:

        Keywords:

        multi-robot system; security control; anomaly detection; Siamese neural network; Mahalanobis distance; sensor

        Pages:

        80-88
      • APPLIED CRYPTOGRAPHY
        Styugin M.A.
        ESTABLISHING SYSTEMS PROTECTED FROM RESEARCH WITH IMPLEMENTATION IN ENCRYPTION ALGORITHMS

        Annotation:

        Systems that have a complex technical implementation usually contain many vulnerabilities which cannot be found at the development stage. The present paper reviews a method of modeling information systems, which allows formalizing the amount of information obtained by a researcher. Two methods of establishing systems protected from research are presented. One method is related to complicating the algorithms and the other one is related to their multiplication.

        To quote:

        Styugin M.A. ESTABLISHING SYSTEMS PROTECTED FROM RESEARCH WITH IMPLEMENTATION IN ENCRYPTION ALGORITHMS // Information Security Problems. Computer Systems. 2016. №4. Pp. 89-96. DOI:

        Keywords:

        protection from research, researcher model, indistinguishability, cryptography, block ciphers.

        Pages:

        89-96
        Sergeev A.S.
        APPLICATION OF THE BIOINSPIRED EVOLUTIONARY OPTIMIZATION METHODS FOR REALIZATION OF CRYPTANALYSIS OF BLOCK ENCIPHERING METHODS ON THE EXAMPLE OF THE AES STANDARD

        Annotation:

        The task of cryptanalysis of methods of cryptography protection with use of new model of optimization methods – the genetic algorithms imitating processes of evolution of wildlife is considered. Application of genetic algorithms for cryptanalysis of the block standard of encoding of AES is described. The block diagram and a information -logical graph-scheme of algorithm, an estimation of necessary minimum number of processors for implementation of algorithm of cryptanalysis, and also some experimental results and the main conclusions are provided.

        To quote:

        Sergeev A.S. APPLICATION OF THE BIOINSPIRED EVOLUTIONARY OPTIMIZATION METHODS FOR REALIZATION OF CRYPTANALYSIS OF BLOCK ENCIPHERING METHODS ON THE EXAMPLE OF THE AES STANDARD // Information Security Problems. Computer Systems. 2016. №4. Pp. 97-105. DOI:

        Keywords:

        CRYPTANALYSIS, GENETIC ALGORITHM, BLOCK METHODS OF ENCIPHERING, INFORMATION-LOGICAL GRAPH SCHEMЕ, POPULATION OF KEYS, СROSSING-OVER, QUASI-OPTIMUM KEY, INDEPENDENCE MATRIX

        Pages:

        97-105
        Shenets N., Truhina E.
        X‑PACE: MODIFIED PASSSWORD AUTHENTICATED CONNECTION ESTABLISHMENT PROTOCOL

        Annotation:

        In this work the Password Authenticated Connection Establishment (PACE) protocol, wish is used in European smartcard environments, is considered. The modifications of the PACE are proposed. They accelerate the protocol but don’t reflect on its overall security. The new version of PACE is called X‑PACE.

        To quote:

        Shenets N., Truhina E. X‑PACE: MODIFIED PASSSWORD AUTHENTICATED CONNECTION ESTABLISHMENT PROTOCOL // Information Security Problems. Computer Systems. 2016. №4. Pp. 106-112. DOI:

        Keywords:

        password authenticated connection establishment protocol, smartcard security.

        Pages:

        106-112
      • FUNDAMENTAL THEORY OF INFORMATION CONFRONTATION
        R. N. Zharkih, A. A. Kornev
        CONCEPTUAL QUESTIONS OF PROTECTION OF NETWORK-CENTRIC CONTROL SYSTEMS IN THE ERA OF INFORMATION CONFRONTATION OF CONFLICTING PARTIES

        Annotation:

        Outlines the conceptual aspects of the problems of protection management systems that implement the principle of setecentrizma, characteristic of the era of information confrontation between the conflicting sides. Discusses possible directions of studies based on extensive use of mathematical modeling to enable system positions analyze problematic aspects of control systems. Attention is drawn to the logical dependence of the investigated issues of modern network-centric paradigm of governance. Shows preference for the proposed solutions to the problem as compared to traditional management methods and technologies.

        To quote:

        R. N. Zharkih, A. A. Kornev CONCEPTUAL QUESTIONS OF PROTECTION OF NETWORK-CENTRIC CONTROL SYSTEMS IN THE ERA OF INFORMATION CONFRONTATION OF CONFLICTING PARTIES // Information Security Problems. Computer Systems. 2016. №4. Pp. 113-118. DOI:

        Keywords:

        data protection, information confrontation, modeling, network-centric technology paradigm real-time management, control system

        Pages:

        113-118
      • TECHNICAL SOLUTION
        R. N. Zharkih, A. A. Kornev
        CHOOSING A SENSOR PANEL FOR APPLICATION IN SECURED PORTABLE DEVICE.

        Annotation:

        The paper reviews problems of usage of sensor input panels in secured computer equipment. The challenge is to implement both sufficient screening of device's electronic components, including display as well, and provide usage of the panel at the same time. The article provides survey of different aspects of using existing sensory panels and a possibility of developing an own one, designed in accordance with the formed requirements. Described the concept of building such a panel and technical details obtained with a prototype are given.

        To quote:

        R. N. Zharkih, A. A. Kornev CHOOSING A SENSOR PANEL FOR APPLICATION IN SECURED PORTABLE DEVICE. // Information Security Problems. Computer Systems. 2016. №4. Pp. 118-126. DOI:

        Keywords:

        optical sensor panel, secured input device, information security

        Pages:

        118-126
        Parshutkin A.V., Egin A.V., Zaytsev S.A.
        THE MODEL OF JAMMING INTERCEPT STRAY ELECTROMAGNETIC RADIATION OPTIMAL RECEIVER OF RASTER DISPLAY SYSTEMS WITH DVI STANDART

        Annotation:

        This article discusses formation of stray electromagnetic radiation from raster display systems using interfaces data organization exchange standard DVI. Submitted description model of jamming intercept stray electromagnetic radiation optimal receiver.

        To quote:

        Parshutkin A.V., Egin A.V., Zaytsev S.A. THE MODEL OF JAMMING INTERCEPT STRAY ELECTROMAGNETIC RADIATION OPTIMAL RECEIVER OF RASTER DISPLAY SYSTEMS WITH DVI STANDART // Information Security Problems. Computer Systems. 2016. №4. Pp. 127-133. DOI:

        Keywords:

        JAMMING, STRAY ELECTROMAGNETIC RADIATION, RASTER DISPLAY SYSTEMS, DVI INTERFACE

        Pages:

        127-133
        Rudy'kh S.V., Sikarev I.A., Galochkin R.N., Kiselevich G.V.
        ELECTROMAGNETIC IMMUNITY OF THE MONITORING SYSTEMS OF AIDS TO NAVIGATION ON THE BASIS OF AUTOMATIC INFORMATION SYSTEMS

        Annotation:

        The purpose of article is research of questions of fight against the narrow-band hindrances on a range in automated control systems of technical and auxiliary fleet and system of monitoring of navigation signs.

        To quote:

        Rudy'kh S.V., Sikarev I.A., Galochkin R.N., Kiselevich G.V. ELECTROMAGNETIC IMMUNITY OF THE MONITORING SYSTEMS OF AIDS TO NAVIGATION ON THE BASIS OF AUTOMATIC INFORMATION SYSTEMS // Information Security Problems. Computer Systems. 2016. №4. Pp. 134-139. DOI:

        Keywords:

        INTERNAL WATERWAYS, AUTOMATED IDENTIFICATION SYSTEMS (AIS), ADDITIVE AND MULTIPLICATIVE INTERFERENCE, COEFFICIENT OF MUTUAL DIFFERENCE (CMD)

        Pages:

        134-139
      • ASPECTS OF INFORMATION SECURITY
        Anisimov V.G., Anisimov E.G., Zegzhda P.D., Saurenko T.N., Prisyazhnyuk S.P.
        INDICATORS TO EVALUATE THE EFFECTIVENESS OF INFORMATION SECURITY SYSTEM OF INFORMATION INTERACTION AT COMPLEX DISTRIBUTED ORGANIZATIONAL MANAGEMENT OBJECTS.

        Annotation:

        The article deals the indicators to evaluate the effectiveness of information security system of information interaction in complex distributed organizational management objects and the methods of their determination. The methodology laid stochastic representation of a stream of destructive effects on the process of information interaction between the control elements distributed organizational object.

        To quote:

        Anisimov V.G., Anisimov E.G., Zegzhda P.D., Saurenko T.N., Prisyazhnyuk S.P. INDICATORS TO EVALUATE THE EFFECTIVENESS OF INFORMATION SECURITY SYSTEM OF INFORMATION INTERACTION AT COMPLEX DISTRIBUTED ORGANIZATIONAL MANAGEMENT OBJECTS. // Information Security Problems. Computer Systems. 2016. №4. Pp. 140-145. DOI:

        Keywords:

        Complex distributed organizational object, information interaction, information security, efficiency, performance

        Pages:

        140-145
      • EDUCATION PROBLEMS

        Kucheryavyi M., Storozhik V., Vovenda J.

        ON SECURITY STAFFING IN THE INFORMATION FIELD

        Annotation:

        The article considers the security staffing issues in the information field. It focuses on activities FSTEC of Russia in the framework of training in the specialty “Information security”. The article deals with a set of measures for the implementation FSTEC of Russia powers of the center of responsibility for determining the annual admission quotas.

        To quote:

        Kucheryavyi M., Storozhik V., Vovenda J.

        ON SECURITY STAFFING IN THE INFORMATION FIELD // Information Security Problems. Computer Systems. 2016. №4. Pp. 146-150. DOI:

        Keywords:

        information field; security staffing; information security; professional training; responsibility center

        Pages:

        146-150
  • 2015 year
  • 2014 year
  • 2013 year
  • 2012 year
  • 2011 year
  • 2010 year
  • 2009 year
  • 2008 year
  • 2007 year
  • 2006 year
  • 2005 year
  • 2004 year
  • 2003 year
  • 2002 year
  • 2001 year
  • 2000 year
  • 1999 year