Babash A.V.
Annotation:
Given an achievable upper bound for the degree of distinctness of a connected permutation automaton with a given diameter.
To quote:
Babash A.V.
ACHIEVABLE UPPER BOUND FOR THE DEGREE OF DISTINCTNESS OF A CONNECTED PERMUTATION AUTOMATON // Information Security Problems. Computer Systems. 2016. №1. Pp. 61-69. DOI:Keywords:
STATE MACHINE, THE DEGREE OF DISTINCTIVENESS, THE DIAMETER OF THE MACHINEPages:
61-69Baranov A.P., Baranov P.A.
Annotation:
This paperwork is dedicated to research of k-length CRC value distribution for data interval with volume n. The paperwork examines CRC value distribution’s behavior under conditions of big n’s and fixed values of k (k = const, n ->∞). By means of character theory application we find the conditions of asymptotic unification of CRC distribution. Asymptotic results could be applied for error estimation for various telecommunication protocols (e.g. USB, X.25, HDLC, Bluetooth, Ethernet and others).
To quote:
Baranov A.P., Baranov P.A.
PROBABILITY ASYMPTOTIC CRC ERROR ASSESSMENTS IN CERTAIN TELECOMMUNICATION PROTPCOLS // Information Security Problems. Computer Systems. 2016. №1. Pp. 70-75. DOI:Keywords:
INFORMATION SECURITY, CRC, ERROR PROBABILITY, UNIFORM DISTRIBUTION, TELECOMMUNICATION PROTOCOLSPages:
70-75Belim S.V., Belim S.Yu.
Annotation:
In article modification of the KDP-scheme of pre-distribution of keys for computer systems with discretionary model of security is considered. Access restriction defines the forbidden transmission channels of information. The scheme of pre-distribution of keys is built in such a way that for the forbidden channels becomes impossible to find a key of information exchange. An example of creation of the offered scheme is reviewed.
To quote:
Belim S.V., Belim S.Yu.
THE KDP SCHEME OF PRE-DISTRIBUTION OF KEYS FOR IMPLEMENTATION OF THE DISCRETIONARY POLICY // Information Security Problems. Computer Systems. 2016. №1. Pp. 76-81. DOI:
Keywords:
KDP-SCHEME, PRE-DISTRIBUTION OF KEYS, DISCRETIONARY MODEL OF SECURITYPages:
76-81Tikhonov S.
Annotation:
The peculiarities of bench testing taking into account some difficulties of chip (like “Atmel”) power consumption analysis are considered. It is intended to use for further breaking of hardware-implemented block ciphers based on side attacks.Description of the minimal requested set of devices to solve this problem is presented.Analysis of the most popular cryptographic operations resulting in a leakage through such side channel is given.
To quote:
Tikhonov S.
EXPERIMENTAL INVESTIGATION OF INFORMATION LEAKAGE FROM CHIPS BASED ON A MEASUREMENT OF POWER COMSUMPTION // Information Security Problems. Computer Systems. 2016. №1. Pp. 82-93. DOI:Keywords:
hardware cipher implementation, secret key, S-box, power consumption, side-channel attacks, differential power analysis (DPA)Pages:
82-93Shniperov A.N., Nikitina K.A.
Annotation:
This paper presents a new method of text steganography based on Markov chains. The basic idea of the method is to hide information in the text, that is automatically generated based on a Markov model of the original text. An algorithmic implementation of the developed method is given and the results of tests of created software package, that allows to generate texts within hidden data, are analysed. Generated texts show a good approximation of the natural language.
To quote:
Shniperov A.N., Nikitina K.A.
METHOD OF TEXT STEGANOGRAPHY BASED ON MARKOV CHAINS // Information Security Problems. Computer Systems. 2016. №1. Pp. 94-101. DOI:Keywords:
TEXT STEGANOGRAPHY, MARKOV CHAINS, AUTOMATIC GENERATION OF TEXTS, NATURALNESS OF TEXTPages:
94-101YakovlevV.A., MylnikovP.D.
Annotation:
The method of key distribution in wireless networks with mobile units based on the MIMO channels is investigated. The description of the method is given. The expressions for estimating of both the correct and wrong decision probability based on the use of a quantization signal phase with guard interval at MIMO channel output are proved. Optimization of system parameters providing the highest key generation rate is investigated under the condition of given probability for shared key coinciding.
To quote:
YakovlevV.A., MylnikovP.D.
KEY DISTRIBUTION FOR WIRELESS MOBILE NETWORKS BASED ON THE USE OF MIMO CHANNELS WITH SIGNAL PHASE QUANTIZATION // Information Security Problems. Computer Systems. 2016. №1. Pp. 102-113. DOI:Keywords:
WIRELESS NETWORK SECURITY, MIMO CHANNELS, KEY DISTRIBUTIONPages:
102-113Sukhoparov M.E., Lebedev I.S.
Annotation:
This article provides a method for the implementation of the algorithm of symmetric encryption GOST 28147 - 89 with the use of NVIDIA CUDA technology. Determine the most high-speed version of the system parameters and operation to ensure maximum system performance. Assess the effectiveness of the proposed solutions, as well as a comparative analysis of the approach to existing solutions.
To quote:
Sukhoparov M.E., Lebedev I.S.
REALIZATION SYMMETRIC ENCRYPTION ON ALGORITHM GOST 28147-89 PER GPU // Information Security Problems. Computer Systems. 2016. №1. Pp. 101-105. DOI:Keywords:
SYMMETRIC ENCRYPTION, SECURITY INFORMATION, GRAPHICS PROCESSOR, MULTI-THREADED COMPUTATION.Pages:
101-105Azhmuhamedov I.M., Vybornova O.N., Brumshtein U.M.
Annotation:
Method of selecting optimum tactics is suggested for lowering the current information security risk to acceptable level specified by the decision maker is offered. It based on introduction of metric characteristics of acceptable and current risks, as well as algorithms of curve construction for acceptable risk and determination of current information security risk.
To quote:
Azhmuhamedov I.M., Vybornova O.N., Brumshtein U.M.
INFORMATION SECURITY RISK MANAGEMENT IN UNCERTAINTY CONDITIONS // Information Security Problems. Computer Systems. 2016. №1. Pp. 7-14. DOI:Keywords:
INFORMATION ASSETS, INFORMATION SECURITY RISKS, RISK-MANAGEMENT, THE COSTS OF RISK REDUCTION, FUZZY CONDITIONSPages:
7-14Kudiyarov D.S.
Annotation:
Sympa is the open source mailing list server. CipherSaber-1 pseudo random number generator is used to secure stored Sympa user credentials. As shown in this article the securing method is vulnerable and the stored password recovery could be done with low computation complexity and moreover parallel computations may be used.
To quote:
Kudiyarov D.S.
ON SYMPA ACCOUNT CREDENTIALS STORAGE // Information Security Problems. Computer Systems. 2016. №1. Pp. 15-21. DOI:Keywords:
RENATER SYMPA, ACCOUNT, STORAGEPages:
15-21Molyakov A.S.
Annotation:
Author describes prototype of computing device with non von-Neiman architecture, based on non – classic extremely productive models with global addressed memory and using new technologies of data transmitting operations, new 3D constructives for making efficient IT- defense.
To quote:
Molyakov A.S.
EVELOPING OF NEW COMPUTING DEVICE BASED ON RUSSIAN STRATEGIC MICROPROCESSOR J7 WITH NON VON-NEIMAN ARCHITECTURE // Information Security Problems. Computer Systems. 2016. №1. Pp. 22-28. DOI:Keywords:
VIRTUALIZATION, INFORMATIONAL SECURITY, NON VON-NEIMAN ARCHITECTURE, 3D CONSTRUCTIVESPages:
22-28Molyakov A.S.
Annotation:
In this article author illustrates marker scanning as new scientific approach in the field of secured IT-systems developing, describing information system states with semantic patterns as uncontrolled context transisions using variables that resolved on all sets by implementation of procedure languages and non-procedure programming languages.
To quote:
Molyakov A.S.
MARKER SCANNING IS NEW SCIENTIFIC APPROACH IN THE FIELD OF SECURED IT-SYSTEMS DEVELOPING ON EXAMPLE OF NEW GENERATION OPERATION SYSTEM MICROTEK // Information Security Problems. Computer Systems. 2016. №1. Pp. 29-36. DOI:Keywords:
VIRTUALIZATION, INFORMATIONAL SECURITY, NEW GENERATION OPERATION SYSTEM, MARKER SCANNING, EXAFLOPS SUPERCOMPUTERSPages:
29-36Poltavtseva M.A., Lavrova D.S., Pechenkin A.I.
Annotation:
This paper proposes an approach that provides a reduction of large volumes of heterogeneous data from devices of the Internet of Things, based on data aggregation and normalization processes. To reduce data volumes and to increase execution speed aggregation and normalization processes are encouraged to process the data from the device on a multiprocessor cluster. The article describes in detail the approach to this problem in the partition related subtasks, indicating which of them can be performed in parallel. Designed task allocation algorithm between nodes of the cluster and multiprocessor tasks scheduling algorithm on multiprocessor cluster node.
To quote:
Poltavtseva M.A., Lavrova D.S., Pechenkin A.I.
PLANNING AGGREGATION AND NORMALIZATION OF DATA FROM THE INTERNET OF THINGS FOR PROCESSING ON MULTIPROCESSOR CLUSTER // Information Security Problems. Computer Systems. 2016. №1. Pp. 37-46. DOI:Keywords:
INTERNET OF THINGS, AGGREGATION, NORMALIZATION, PLANNING, MULTIPROCESSOR CLUSTERPages:
37-46Zegzhda P.D., Kalinin M.O.
Annotation:
The paper reviews the problem of performance degradation at network traffic protection and processing mechanisms being applied in distributed IT systems. There is discussed the approach of net traffic flows classification and distribution between virtual machines. Based on that model, a high performance security gateway is proposed. This gateway runs on virtualized platform and parallelizes the net traffic processing. This approach increases the speed and reliability of security tools.
Project is financially supported by MinistryofEducationandScienceofRussianFederation, Federal Program "Researching and Development in Priority Directions of Scientific and Technological Sphere in Russia within 2014-2020" (Contract No.14.575.21.0079; June 17, 2014).
To quote:
Zegzhda P.D., Kalinin M.O.
Technology of Security Services Virtualization in High Speed Computer Networks // Information Security Problems. Computer Systems. 2016. №1. Pp. 47-52. DOI:Keywords:
VIRTUALIZATION, TRAFFIC FLOWS CLASSIFICATION, PARALLEL PROCESSING, PERFORMANCEPages:
47-52Tarasov P.A., Isaev Е.А., Kornilov V.V.
Annotation:
The article discusses the various types of vulnerabilities of wireless sensor networks and classification of attacks on the security of these networks. For each attack demonstrated the possible means of protection and prevention, detection and possible response, and shows the necessity of development and introduction of new high-tech solutions to guarantee the security of wireless sensor networks.
To quote:
Tarasov P.A., Isaev Е.А., Kornilov V.V.
THE MAIN METHODS OF ENSURING INFORMATION SECURITY OF WIRELESS SENSOR NETWORKS // Information Security Problems. Computer Systems. 2016. №1. Pp. 53-60. DOI:Keywords:
WIRELESS SENSOR NETWORKS, WSN, INFORMATION SECURITY, ZIGBEEPages:
53-60Zegzhda D.P., Stepanova T.V., Suprun A.F.
Annotation:
In this paper authors propose a novel approach of calculation the upper and lower boundaries of an index of controllability multi-agent systems, formalized as probability of existence of a way from any node to controlling center is offered, the time of transmission of the message does not exceed a constant t. Controllability - one of properties of this system, defining stability of its functioning. For calculation of boundaries of controllability the regular graph in the form of a tree with the virtual peaks is offered, allowing to apply methods of calculation of number of peaks on a certain circle.
To quote:
Zegzhda D.P., Stepanova T.V., Suprun A.F.
ESTIMATION OF IOT-SYSTEM CONTROLLABILITY USING AGENTS GRAPH WITH MULTILEVEL STRUCTURE // Information Security Problems. Computer Systems. 2016. № 2. Pp. 7-11. DOI:Keywords:
MULTI-AGENT SYSTEMS, OPERATING STABILITY, CONTROLLABILITY, MANAGEABILITY, GRAPH THEORYPages:
7-11Zegzhda D.P
Annotation:
The paper introduces new approach to security of symbiotic equipment and software Cyber-physic Systems on the basis of homeostasis, i.e. the properties to maintain the system functioning in the hostile environment. Author proposes formal dynamic model based on this approach.
To quote:
Zegzhda D.P
ON THE ROBUSTNESS OF CYBER-PHYSIC SYSTEMS TO CYBERATTACKS // Information Security Problems. Computer Systems. 2016. № 2. Pp. 12-20. DOI:Keywords:
CYBER-PHYSIC SYSTEMS, CYBERTHREAT, CYBERSECURITY,HOMEOSTASIS, DYNAMIC MODELPages:
12-20Ivanov A.I., Gazin A.I., Perfilov K.A., Vyatchanin S.E.
Annotation:
It is shown that presentation of continuous illumination and probability function with small number of examples biometric origin create quantizing noise with a high value of AM andpotency. The statistical test of Smirnov – Kolmogorovrepresents the estimation of maximum modulus value of noise elimination. The statistical criteria of Cramer-vonMizes is quadratic estimator of noise quantization potency. Using such an interpretation, it is possible to eliminate noises of quantization biometric data with the help of using multivariate variant of Cramer-von Mizes statistical criteria. It is believed that Cramer-von Mizes statistical criteria in small number of samples works more effectively, than chi square criteria of Peterson.
To quote:
Ivanov A.I., Gazin A.I., Perfilov K.A., Vyatchanin S.E.
NOISE ELIMINATION OF QUANTIZATION BIOMETRIC DATA WHILE USING MULTIVARIATE TEST CRAMER–VON MIZES IN SMALL SAMPLES // Information Security Problems. Computer Systems. 2016. № 2. Pp. 21-28. DOI:Keywords:
NOISE ELIMINATION OF QUANTIZATION BIOMETRIC DATA WHILE USING MULTIVARIATE TEST CRAMER–VON MIZES IN SMALL SAMPLESPages:
21-28Zhuravel E.P., Sherstyuk Yu.M.
Annotation:
In article risk of information security on a classification sign of a type of impact on the equipment and control systems of communication networks in the enhanced telecom operations map are considered and the technical solution directed on decrease and/or weakening of their influence for ensuring functioning in the conditions of the incidents connected with threats and/or violations of information security is proposed.
To quote:
Zhuravel E.P., Sherstyuk Yu.M.
THE INFORMATON SECURITY IN THE ENHANCED TELECOMS OPERATIONS MAP // Information Security Problems. Computer Systems. 2016. № 2. Pp. 29-36. DOI:Keywords:
CONTROL PLANE; FUNCTIONAL SUPPORT PLANE.Pages:
29-36Konoplev A.S., Kalinin M.O.
Annotation:
The paper describes architecture of access control system in distributed computing networks which provides data security against the attacks of user privileges escalation. Comparison of proposed system with analogs is presented. The results of access control system effectiveness estimates are also provided.
To quote:
Konoplev A.S., Kalinin M.O.
ACCESS CONTROL SYSTEM IN DISTRIBUTED COMPUTING NETWORKS // Information Security Problems. Computer Systems. 2016. № 2. Pp. 36-43. DOI:Keywords:
DISTRIBUTED COMPUTING NETWORKS, GRID SYSTEM, UNAUTHORIZED ACCESS, ACCESS CONTROL, ACCESS CONTROL SYSTEM.Pages:
36-43KonoplevA.S., KalininM.O.
Annotation:
The paper highlights problem of information security in distributed computing networks. Grid system architecture features have been analyzed. Information security threats in distributed computing networks are classified. The existing security arrangements for Grid systems are presented, their disadvantages are admitted. The complex of information security challenges of distributed computing networks is formulized which are aimed to provide defense against the unauthorized access.
To quote:
KonoplevA.S., KalininM.O.
INFORMATION SECURITY CHALLENGES OF DISTRIBUTED COMPUTING NETWORKS // Information Security Problems. Computer Systems. 2016. № 2. Pp. 44-49. DOI:Keywords:
DISTRIBUTED COMPUTING NETWORKS, GRID SYSTEM, INFORMATION SECURITY, SECURITY THREATS, ACCESS CONTROL POLICY.Pages:
44-49Lavrova D.S.
Annotation:
Proposed an approach to the construction of the security incident analysis systems for Internet of Things. This approach consists in the consideration of Internet of Things as a self-similar system with its normal functioning. A graph model of the Internet of Things as a cyber physical system, based on the sufficiency of analysis of paired relationships extracted from the digital stream of messages from devices to identify security incidents.
To quote:
Lavrova D.S.
APPROACH TO THE DEVELOPMENT OF SIEM-SYSTEM FOR THE INTERNET OF THINGS // Information Security Problems. Computer Systems. 2016. № 2. Pp. 50-60. DOI:Keywords:
INTERNET OF THINGS, SECURITY INCIDENT, DATA ANALYSIS, AGGREGATION, LARGE VOLUMES OF DATA, PAIRED RELATIONS, SELF-SIMILARITY.Pages:
50-60Nikonov V.V., Loss V.P., Ross G.V.
Annotation:
This article describes the features of the implementation of the system to identify abnormal network activity. Developed algorithms and software systems to identify abnormal network activity and detect threats.
To quote:
Nikonov V.V., Loss V.P., Ross G.V.
DEVELOPMENT OF AUTOMATED SYSTEM FOR IDENTIFYING ABNORMAL NETWORK ACTIVITY AND DETECT THREATS // Information Security Problems. Computer Systems. 2016. № 2. Pp. 61-69. DOI:Keywords:
CONTINGENCY NETWORK ACTIVITY, NETWORK THREATS, AGENTS LOG ACTIVITY PROFILE, THE NETWORK NODE CARD SOCKET, THE WINSOCK LIBRARY.Pages:
61-69SukhoparovM.E., LebedevI.S., KorzhukV.M., KrivtsovaI.E., PecherkinS.A.
Annotation:
The proposed solution is to use methods that ensure the implementation of preventive measures aimed at increasing the complexity of the implementation of information security threats on a compact device based on PC-104 + form factor. The estimation of the information counter attacks and simulated device status in various modes, and the introduction of additional security features.
To quote:
SukhoparovM.E., LebedevI.S., KorzhukV.M., KrivtsovaI.E., PecherkinS.A.
PROVIDING INFORMATION SECURITY BASED COMMUNICATION CHANNELS MULTIFUNCTIONAL AND SPECIALIZED HARDWARE AND SOFTWARE SOLUTIONS // Information Security Problems. Computer Systems. 2016. № 2. Pp. 70-74. DOI:Keywords:
WIRELESS LINKS, INFORMATION PROTECTION SYSTEM, INFORMATION SECURITY, COUNTERING INFORMATION ATTACKS.Pages:
70-74Annotation:
A white binary noise information distortion model is proposed in papers [1] and [2]. In this paperwork we analyze limiting behavior of CRC error probabilities with low values of p, which stands for distortion probability of a single bit that belongs to the information being transferred. Using acquired theoretical results we assess values of error probabilities to claim transferred information packet
To quote:
Baranov A.P., Baranov P.A. PROBABILITY crc error assessments with low distortion levels of transferred information // Information Security Problems. Computer Systems. 2016. № 2. Pp. 75-83. DOI:Keywords:
INFORMATION SECURITY, CRC, ERROR PROBABILITY, LOW DISTORTION LEVEL, TELECOMMUNICATION PROTOCOLS.Pages:
75-83
Belim S.V., Bogachenko N.F.
Annotation:
The algorithm for distribution of cryptographic keys which is based on the hierarchical structure of objects in the system is presented in this article. The substantiation of the algorithm for certain types of the objects hierarchy is given. The mechanism of the setting of the mandatory and discretionary access control using the developed algorithm is suggested.
To quote:
Belim S.V., Bogachenko N.F.
The cryptographic keys distribution in the systems with the object hierarchy // Information Security Problems. Computer Systems. 2016. № 2. Pp. 84-95. DOI:
Keywords:
CRYPTOGRAPHIC KEYS DISTRIBUTION, OBJECT HIERARCHY, HASH FUNCTION, ACCESS CONTROL.Pages:
84-95Annotation:
Sumkin K.S., Loss V.P., Ross G.V.
To quote:
SYSTEM IDENTIFICATION AND AUTHENTICATION OF USERS ON THE BASIS OF FUZZY HYBRID APPROACH // Information Security Problems. Computer Systems. 2016. № 2. Pp. 95-100. DOI:Keywords:
IDENTIFICATION AND AUTHENTICATION OF USERS, CLUSTERING, FUZZY SETS, FUZZY RELATIONAL DATA MODEL, THE MEMBERSHIP FUNCTION.Pages:
95-100Tikhonov S.V.
Annotation:
Investigation of hardware implemented block cipher based on Feistel structure is considered. It is shown that such cipher can be easily broken in real time even for very long key length. The most vulnerable to such attack operations within encryption algorithm are found. The main approaches are presented that simplify the way to break any hardware implemented cipher if it does not have special protection.
To quote:
Tikhonov S.V.
EXPERIMENTAL INVESTIGATION OF OPPORTUNITY TO BREAK HARDWARE IMPLEMENTED ON FEISTEL STRUCTURE BLOCK CIPHERS WITH THE USE OF POWER COMSUMPTION MEASUREMENT ATTACK // Information Security Problems. Computer Systems. 2016. № 2. Pp. 106-117. DOI:Keywords:
SECRET KEY, ALGORITHM DES, DPA, SPA ATTACKS, S-BOXES, POWER ATTACKS, SIDE-CHANNEL ATTACKS, DIFFERENTIAL POWER ANALYSIS.Pages:
106-117KosachokA.V.
Annotation:
The article describes questions of heuristic malware detection based on hidden markov models application to reduce risk of malware infection.
To quote:
KosachokA.V.
Developing malware detection heuristic engine based on hidden markov models // Information Security Problems. Computer Systems. 2016. № 2. Pp. 118-127. DOI:Keywords:
ANTIVIRUS TOOLS, HIDDEN MARKOV MODELS, MALWARE.Pages:
118-127P. D. Zegzhda, D. P. Zegzhda, A. I. Pechenkin, M. A. Poltavtseva
Annotation:
(Russian)Предложенная графовая модель для решения задачи управления безопасностью информационных систем включает моделирование атак различного рода на информационные системы. Выбран оптимальный способ размещения средств контроля доступа к данным и дана количественная оценка защищенности конкретных узлов системы.
To quote:
P. D. Zegzhda, D. P. Zegzhda, A. I. Pechenkin, M. A. Poltavtseva
INFORMATION SYSTEMS MODELING TO SOLVE THE PROBLEM OF SECURITY MANAGEMENT // Information Security Problems. Computer Systems. 2016. №3. DOI:Keywords:
security assessment, information systems security, modeling systems, computer systems security, information security tools.Volkova V.N., Chernyy Yu.Yu.
Annotation:
It is proposed to study issues of information security on the base the laws of systems theory and to substantiate the importance the takes into account social effects of cyber-space.
To quote:
Volkova V.N., Chernyy Yu.Yu.
USAGE OF LAWS OF THE SYSTEMS THEORY TO RESEARCH THE PROBLEMS OF INFORMATION SAFETY // Information Security Problems. Computer Systems. 2016. №3. Pp. 17. DOI:Keywords:
laws of systems theory, information, information security, cyberspace, systems theory, entropy-negentropy processes.Pages:
17L. V. Utkin, V. S. Zaborovsky, S. G. Popov
Annotation:
(Russian)Рассмотрена процедура предварительной обработки данных для контроля информационной безопасности элементов системы роботов, которая использует специальный вид нейронной сети — автокодер для решения двух задач. Первая задача — уменьшение размерности обучающих данных для вычисления расстояния Махаланобиса — одна из лучших метрик для обнаружения аномального поведения роботов или сенсоров в системе роботов. Вторая — применение автокодера для передачи обучения на целевых данных, которые соответствуют экстремальным условиям функционирования системы роботов.
To quote:
L. V. Utkin, V. S. Zaborovsky, S. G. Popov
INFORMATION SECURITY CONTROL IN MULTI-ROBOT SYSTEMS ON THE BASIS OF DEEP LEARNING ELEMENTS // Information Security Problems. Computer Systems. 2016. №3. DOI:Keywords:
multi-robot system, information security control, anomaly detection, autoencoder, Mahalanobis distance, transfer learning, target and source data.A. S. Zaitsev, A. A. Malyuk
Annotation:
The paper considers classifying models that allow to detect potential insider basing on technical and behavioural indicators under conditions of incomplete information about his behaviour.
To quote:
A. S. Zaitsev, A. A. Malyuk
THE IDENTIFICATION OF POTENTIAL INSIDER USING CLASSIFICATION MODELS // Information Security Problems. Computer Systems. 2016. №3. Pp. 34-42. DOI:Keywords:
information security insider threats, data mining, classifying models, CHAID, neural networks, decision treesPages:
34-42Sh. G. Magomedov, T. Yu. Morozova, D. A. Akimov
Annotation:
The paper proposes a procedure for the use of residual classes of systems in the formation of the encryption keys that allows for modification and key exchange without any interaction with the network security system in a continuous mode as needed on the basis of residual classes of systems.
To quote:
Sh. G. Magomedov, T. Yu. Morozova, D. A. Akimov
SECURE DATA TRANSMISSION IN COMPUTER NETWORKS BASED ON THE USE OF RESIDUAL CLASSES OF SYSTEMS // Information Security Problems. Computer Systems. 2016. №3. Pp. 43-47. DOI:Keywords:
residue number system, encryption, information security, computer networkPages:
43-47O. V. Trubienko, V. I. Kuznetsov
Annotation:
On the basis of statistical data the EMERCOM of Russia on emergency situation the authors come to the conclusion about the need to create a complex system of intellectual-term monitoring of dynamic objects of industrial facilities and residential buildings. The article describes the composition and operation of the monitor system of complex the monitor.
To quote:
O. V. Trubienko, V. I. Kuznetsov
SYSTEM INTELLIGENT MONITORING THE FUNCTIONAL STATUS OF DYNAMIC OBJECTS // Information Security Problems. Computer Systems. 2016. №3. Pp. 48-54. DOI:Keywords:
innovation, safety, security complexPages:
48-54A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, E. E. Timonina
Annotation:
Now there is a large number of the directions and of the results of development of artificial intelligence systems. The paper is devoted to the available description of connection of some problems of information security and the opportunities given by data mining.
To quote:
A. A. Grusho, N. A. Grusho, M. I. Zabezhailo, E. E. Timonina
DATA MINING IN ENSURING INFORMATION SECURITY // Information Security Problems. Computer Systems. 2016. №3. Pp. 55-60. DOI:Keywords:
information security, data mining, the distributed information systemsPages:
55-60V. G. Anisimov, E. G. Anisimov, D. A. Bazhin, P. D. Zegzhda, A. F. Suprun
Annotation:
The article considers the methodological statements, concerning the creation of models and methods for decision support in the sphere of security monitoring organization for information systems. The designation of monitoring is to neutralize the internal and external impacts leading to occasional or intentional access to stored or processed data, as well as to its damage or distortion.
To quote:
V. G. Anisimov, E. G. Anisimov, D. A. Bazhin, P. D. Zegzhda, A. F. Suprun
THE RISK-BASED METHOD FOR ORGANIZATION OF MONITORING IN INFORMATION SYSTEMS SECURITY FACILITIES // Information Security Problems. Computer Systems. 2016. №3. Pp. 61-67. DOI:Keywords:
information system, security, risk, monitoring organization, modelPages:
61-67D. S. Lavrova
Annotation:
In this paper proposed an ontological model of the subject field of the Internet of Things, which provides a detailed view of the linkages and relationships between the elements of the system at different levels of abstraction, with varying degrees of detail. Designed ontological model allows us to understand the technical aspects of the development of SIEM-system for the identification and analysis of security incidents in the Internet of Things
To quote:
D. S. Lavrova
ONTOLOGICAL MODEL OF SUBJECT FIELD OF THE INTERNET OF THINGS FOR SECURITY ANALYSIS // Information Security Problems. Computer Systems. 2016. №3. Pp. 68-75. DOI:Keywords:
Internet of things, security incident, data analysis, aggregation, large volumes of data, SIEM system, ontologyPages:
68-75N. A^. Bazhaev, I. E. Krivtsova, I. S. Lebedev, M. E. Sukhoparov
Annotation:
Considered a wireless network under "broadcast storm" attack, in order to determine the availability of stand-alone units, the ability to carry out their tasks in the functional impact of the information. Identified a number of conditions for the organization of attack by a potential intruder. The analysis of system availability of devices based on wireless technologies.
Proposed model can be used to determine the technical characteristics of a wireless ad hoc network of devices.
To quote:
N. A^. Bazhaev, I. E. Krivtsova, I. S. Lebedev, M. E. Sukhoparov
MODELING OF INFORMATION INFLUENCE ON THE REMOTE DEVICE WIRELESS // Information Security Problems. Computer Systems. 2016. №3. Pp. 76-84. DOI:Keywords:
information security, wireless networks, multi-agent systems, vulnerability, accessibility of devices, information security modelPages:
76-84D. V. Ivanov, D. A. Moskvin, A.V. Myasnikov
Annotation:
The article presents results of analyze of user data replication mechanisms. The authors have classified replication mechanisms, have identified its advantages and disadvantages, and have proposed a method that uses NFC technology to establish a secure channel data replication.
To quote:
D. V. Ivanov, D. A. Moskvin, A.V. Myasnikov
THE USE OF NFC TECHNOLOGY FOR USER DATA AUTOMATED REPLICATION // Information Security Problems. Computer Systems. 2016. №3. Pp. 85-90. DOI:Keywords:
REPLICATION, USER PROFILE, SECURE CHANNEL, NFC, EMULATION, DATA TRANSFERPages:
85-90N. N. Shenets, I. V. Bulatov
Annotation:
In this work the modular threshold secret sharing schemes are considered, in particular, Shamir’s scheme and general modular scheme in the univariate polynomial ring over Galois field. Different qualitative and numerical properties of such schemes are compared; the problems of its optimal realization are studied.
To quote:
N. N. Shenets, I. V. Bulatov
COMPARATIVE ANALYSIS OF MODULAR THRESHOLD SECRET SHARING SCHEMES // Information Security Problems. Computer Systems. 2016. №3. Pp. 91-101. DOI:Keywords:
words: modular secret sharing schemes, ideality, perfectness, computational complexity.Pages:
91-101E. B. Aleksandrova, E. N. Shkorkina
Annotation:
In cryptographic protocols, being implemented in the systems using resource-constrained devices, hard computations can be outsourced to cloud servers. Light-weight arithmetic operations are carried out on the device. The tripartite key-agreement protocol with two servers in the one-malicious version of two untrusted program model is suggested.
To quote:
E. B. Aleksandrova, E. N. Shkorkina
TRIPARTITE OUTSOURCING KEY-AGREEMENT PROTOCOL ON BILINEAR PAIRINGS // Information Security Problems. Computer Systems. 2016. №3. Pp. 102-108. DOI:Keywords:
Outsourcing algorithm, bilinear pairing, tripartite Diffie–Hellman protocolPages:
102-108D. P. Zegzhda, E. B. Aleksandrova, A. S. Konoplev
Annotation:
The paper reviews the problem of unauthorized access to the data in distributed computing networks. Available implementations of authentication mechanisms in Grid systems are discussed, their disadvantages are considered. The group signature approach is proposed, which exceeds unauthorized access to computing environment and provides integrity of transmitted data.
To quote:
D. P. Zegzhda, E. B. Aleksandrova, A. S. Konoplev
APPLYING THE GROUP SIGNATURE FOR ENTITY AUTHENTICATION IN DISTRIBUTED COMPUTING NETWORKS SUCH AS “GRID” // Information Security Problems. Computer Systems. 2016. №3. Pp. 109-114. DOI:Keywords:
distributed computing networks, Grid system, unauthorized access, authentication, group signature, elliptic curvePages:
109-114Sikarev I.A., Volkova T.A., Galochkin R.N.
Annotation:
The problem of calculating coefficients of mutual difference (CMD) for complex discrete-manipulated signals (DMS) with discontinuous in time structure in terms of (measure of) determining the degree of electromagnetic protection is considered.
To quote:
Sikarev I.A., Volkova T.A., Galochkin R.N.
COEFFICIENTS OF MUTUAL DIFFERENCE FOR COMPLEX DISCRETE-MANIPULATED SIGNALS WITH DISCONTINUOUS IN TIME STRUCTURE // Information Security Problems. Computer Systems. 2016. №3. Pp. 115-118. DOI:Keywords:
DISCRETE-MANIPULATED SIGNALS (DMS), SIGNALS WITH DISCONTINUOUS IN TIME STRUCTURE, NARROW-BAND INTERFERENCE, COEFFICIENT OF MUTUAL DIFFERENCE (CMD).Pages:
115-118PavlenkoE.Yu., YarmakA.V., MoskvinD.A.
Annotation:
The article presents results of the malware identification problem research in Google Android operating system. To resolve this problem authors have created the system, based on the fuzzy clustering method which use an application parameters vector. This vector is result of the static and dynamic analysis of the application code. The paper describes the application settings that are used for drawing vector features, and also highlights the efficiency of the use of different criteria of separability in relation to the task and given the format of the input data. An experimental evaluation of the proposed system, showing a high level of malware detection for the Google Android operating system.
To quote:
PavlenkoE.Yu., YarmakA.V., MoskvinD.A.
USE OF CLUSTERING METHODS FOR THE ANALYSIS OF SECURITY ANDROID APPLICATIONS // Information Security Problems. Computer Systems. 2016. №3. Pp. 119-126. DOI:Keywords:
Google Android, security of mobile devices, cluster analysis, machine learning, malware, static analysis, dynamic analysis.Pages:
119-126ZegzhdaP.D., MalyshevE.V., PavlenkoE.Y.
Annotation:
In this paper, authors consider the problem of identifying automatically managed accounts (bots) in social networks and propose a method for bots detection based on machine learning methods. The paper describes an example of a method based on artificial neural network training, also were represented parameters of user account in social network for bots detection. An experimental evaluation of the proposed system shows a high degree of bots detection in social networks.
To quote:
ZegzhdaP.D., MalyshevE.V., PavlenkoE.Y.
USE OF NEURAL NETWORK FOR DETECTION AUTOMATICALLY CONTROLLED ACCOUNTS IN SOCIAL NETWORKS // Information Security Problems. Computer Systems. 2016. №4. Pp. 9-15. DOI:Keywords:
information security, social networks, bots in social networks, neural network, bot detectionPages:
9-15Annotation:
The paper reviews the problem of TLS protocol based applications. It highlights attack scenarios to such applications, using certificate revocation vulnerabilities. There is a comparison of X.509 certificate status verification methods is presented which is applied in conjunction with TLS protocol, their advantages and disadvantages are specified.To quote:
Kalinin M., Busygin А., Konoplev A. SECURITY APPROACHES TO TLS PROTOCOL BASED APPLICATIONS FROM CERTIFICATE REVOCATION ATTACKS // Information Security Problems. Computer Systems. 2016. №4. Pp. 16-22. DOI:Keywords:
certificate revocation, TLS protocol, authentication, man-in-the-middle attacks, Grid system, X.509 standard.Pages:
16-22M. O. Kalinin, A. A. Minin
Annotation:
This paper reviews security problems in computer networks with dynamic topology (e.g. mesh, MANET, computing grid). There is suggested a method of security threats detection in such networks based on graph modeling
To quote:
M. O. Kalinin, A. A. Minin
DETECTION OF INFORMATION SECURITY THREATS IN COMPUTER NETWORKS WITH DYNAMIC TOPOLOGY USING HOSTS ACTIVITY MONITORING // Information Security Problems. Computer Systems. 2016. №4. Pp. 23-31. DOI:Keywords:
network with dynamic topology, mesh, adhoc, sensor network, security, security node, traffic statisticsPages:
23-31A. A. Grusho, N. A. Grusho, M. V. Levykin, E. E. Timonina
Annotation:
In the paper the concept of integrated virtualization of information technology and tasks for the purpose of isolation of valuable information from risk hosts is entered. The technology of realization of business processes and in parallel the technology of realization of the principles of isolation for ensuring information security is considered. At a certain stage of realization of business processes the security model and model developed for business process is unified. The resulted model can be implemented with the help of integrated system of virtual computers and the operated information flows.
To quote:
A. A. Grusho, N. A. Grusho, M. V. Levykin, E. E. Timonina
SECURE ARCHITECTURE OF DISTRIBUTED INFORMATION SYSTEMS ON THE BASIS OF INTEGRATED VIRTUALIZATION // Information Security Problems. Computer Systems. 2016. №4. Pp. 32-35. DOI:Keywords:
information security, the distributed information systems, virtualizationPages:
32-35A. Y. Chernov, A. S. Konoplev
Annotation:
The paper reviews the problem of construction trusted executable environment on modern PC architecture. It shows main features of software execution on different privilege levels. Intel ME architecture has been reviewed. There are Intel ME potential threats highlighted and shown possible ways to solve them.
To quote:
A. Y. Chernov, A. S. Konoplev
TRUSTED EXECUTABLE ENVIRONMENT CONSTRUCTION TASK ON INTEL-BASED PC // Information Security Problems. Computer Systems. 2016. №4. Pp. 36-41. DOI:Keywords:
Trusted execution, PC architecture, hypervisor, virtualization, BIOS, Intel MEPages:
36-41Zegzhda D.P., Moskvin D.A., Dakhnovich A.D.
Annotation:
The article presents results of analyze of WiFi network protection mechanisms. The authors propose the access point authentication method, which can be used in various designed networks.
To quote:
Zegzhda D.P., Moskvin D.A., Dakhnovich A.D.
WIFI USER PROTECTION FROM FAKE ACCESS POINTS // Information Security Problems. Computer Systems. 2016. №4. Pp. 42-49. DOI:Keywords:
WiFi, client protection, access point, wireless client, authenticationPages:
42-49D. P. Zegzhda, E. S. Usov, A. V. Nikolsky, E. Y. Pavlenko
Annotation:
In this paper is considered the problem of users’ data confidentiality in cloud systems from attacks by the provider. The system of secure cloud computing using Intel Software Guard Extensions technology (SGX) is also considered. The paper describes Intel SGX technology, the basic concepts and security mechanisms. Possibility of using this technology in the cloud system is shown. An experimental scheme of the proposed system provides data confidentiality for cloud systems users, and provides a method of implementation of the scheme in existing cloud systems.
To quote:
D. P. Zegzhda, E. S. Usov, A. V. Nikolsky, E. Y. Pavlenko
USE OF INTEL SGX TECHNOLOGIES OF ENSURE THE CONFIDENTIALITY OF DATA CLOUD SYSTEMS USERS // Information Security Problems. Computer Systems. 2016. №4. Pp. 50-57. DOI:Keywords:
Intel SGX, enclave, cloud systems, data confi dentiality, encryption, hypervisor, protected memory.Pages:
50-57D. V. Kostin, O. I. Sheluhin
Annotation:
The objective of this work is to assess the robustness of machine learning based encrypted traffic classification to detect network intrusion. In this work, we have focused on the identification of four types of encrypted traffic: Skype, Tor, PuTTY (SSHv2) and CyberGhost (VPN). In order to classify encrypted traffic five different machine learning algorithms are employed. These are Naive Bayes, C4.5, AdaBoost and Random Forest. We describe a comparison the two methods of traffic classification based on machine learning: generation and analysis of network flows and analysis of each network packet.
To quote:
D. V. Kostin, O. I. Sheluhin
MACHINE LEARNING BASED ENCRYPTED TRAFFIC CLASSIFICATION TO DETECT NETWORK INTRUSIONS // Information Security Problems. Computer Systems. 2016. №4. Pp. 57-67. DOI:Keywords:
TRAFFIC CLASSIFICATION, ENCRYPTED TRAFFIC, MACHINE LEARNING, INTRUSION DETECTION SYSTEM.Pages:
57-67D. V. Ivanov, D. A. Moskvin, T. D. Ovasapyan
Annotation:
The article describes the approaches to the detection of active network nodes in the IPv6 address space. Two main families of approaches are described: with and without using the initial sample.
To quote:
D. V. Ivanov, D. A. Moskvin, T. D. Ovasapyan
APPROACHES FOR DETECTION OF ACTIVE NETWORK NODES IN THE IPV6 ADDRESS SPACE // Information Security Problems. Computer Systems. 2016. №4. Pp. 68-73. DOI:Keywords:
networks, information security audit, internet, ipv6, network nodesPages:
68-73Annotation:
Method of detecting malware that uses encryption as a disguise. The paper describes the modification of statistical spectral test based on entropy analysis.To quote:
I. V. Alekseev, V. V. Platonov IDENTIFICATION OF THE ENCRYPTED EXECUTABLE FILES BASED ON THE ENTROPY ANALYSIS FOR DETECTION VALUE RANDOMNESS OF BYTE SEQUENCES // Information Security Problems. Computer Systems. 2016. №4. Pp. 74-79. DOI:Keywords:
potential malware detection, cryptоr, statistical tests, entropy.Pages:
74-79L. V. Utkin, V. S. Zaborovsky, S. G. Popov
Annotation:
Anomaly detection of the robot system behavior is one of the important components of the information security control. In order to control robots equipped with many sensors it is difficult to apply the well-known Mahalanobis distance which allows us to analyze the current state of the sensors. Therefore, the Siamese neural network is proposed to intellectually support the security control. The Siamese network simplifies the anomaly detection of the robot system and realizes a non-linear analogue of the Mahalanobis distance. This peculiarity allows us to take into account complex data structures received from the robot sensors.
To quote:
L. V. Utkin, V. S. Zaborovsky, S. G. Popov
SIAMESE NEURAL NETWORK FOR INTELLIGENT INFORMATION SECURITY CONTROL IN MULTIROBOT SYSTEMS // Information Security Problems. Computer Systems. 2016. №4. Pp. 80-88. DOI:Keywords:
multi-robot system; security control; anomaly detection; Siamese neural network; Mahalanobis distance; sensorPages:
80-88Annotation:
Systems that have a complex technical implementation usually contain many vulnerabilities which cannot be found at the development stage. The present paper reviews a method of modeling information systems, which allows formalizing the amount of information obtained by a researcher. Two methods of establishing systems protected from research are presented. One method is related to complicating the algorithms and the other one is related to their multiplication.
To quote:
Styugin M.A. ESTABLISHING SYSTEMS PROTECTED FROM RESEARCH WITH IMPLEMENTATION IN ENCRYPTION ALGORITHMS // Information Security Problems. Computer Systems. 2016. №4. Pp. 89-96. DOI:Keywords:
protection from research, researcher model, indistinguishability, cryptography, block ciphers.Pages:
89-96Annotation:
The task of cryptanalysis of methods of cryptography protection with use of new model of optimization methods – the genetic algorithms imitating processes of evolution of wildlife is considered. Application of genetic algorithms for cryptanalysis of the block standard of encoding of AES is described. The block diagram and a information -logical graph-scheme of algorithm, an estimation of necessary minimum number of processors for implementation of algorithm of cryptanalysis, and also some experimental results and the main conclusions are provided.
To quote:
Sergeev A.S. APPLICATION OF THE BIOINSPIRED EVOLUTIONARY OPTIMIZATION METHODS FOR REALIZATION OF CRYPTANALYSIS OF BLOCK ENCIPHERING METHODS ON THE EXAMPLE OF THE AES STANDARD // Information Security Problems. Computer Systems. 2016. №4. Pp. 97-105. DOI:Keywords:
CRYPTANALYSIS, GENETIC ALGORITHM, BLOCK METHODS OF ENCIPHERING, INFORMATION-LOGICAL GRAPH SCHEMЕ, POPULATION OF KEYS, СROSSING-OVER, QUASI-OPTIMUM KEY, INDEPENDENCE MATRIXPages:
97-105Annotation:
In this work the Password Authenticated Connection Establishment (PACE) protocol, wish is used in European smartcard environments, is considered. The modifications of the PACE are proposed. They accelerate the protocol but don’t reflect on its overall security. The new version of PACE is called X‑PACE.To quote:
Shenets N., Truhina E. X‑PACE: MODIFIED PASSSWORD AUTHENTICATED CONNECTION ESTABLISHMENT PROTOCOL // Information Security Problems. Computer Systems. 2016. №4. Pp. 106-112. DOI:Keywords:
password authenticated connection establishment protocol, smartcard security.Pages:
106-112Annotation:
Outlines the conceptual aspects of the problems of protection management systems that implement the principle of setecentrizma, characteristic of the era of information confrontation between the conflicting sides. Discusses possible directions of studies based on extensive use of mathematical modeling to enable system positions analyze problematic aspects of control systems. Attention is drawn to the logical dependence of the investigated issues of modern network-centric paradigm of governance. Shows preference for the proposed solutions to the problem as compared to traditional management methods and technologies.To quote:
R. N. Zharkih, A. A. Kornev CONCEPTUAL QUESTIONS OF PROTECTION OF NETWORK-CENTRIC CONTROL SYSTEMS IN THE ERA OF INFORMATION CONFRONTATION OF CONFLICTING PARTIES // Information Security Problems. Computer Systems. 2016. №4. Pp. 113-118. DOI:Keywords:
data protection, information confrontation, modeling, network-centric technology paradigm real-time management, control systemPages:
113-118Annotation:
The paper reviews problems of usage of sensor input panels in secured computer equipment. The challenge is to implement both sufficient screening of device's electronic components, including display as well, and provide usage of the panel at the same time. The article provides survey of different aspects of using existing sensory panels and a possibility of developing an own one, designed in accordance with the formed requirements. Described the concept of building such a panel and technical details obtained with a prototype are given.To quote:
R. N. Zharkih, A. A. Kornev CHOOSING A SENSOR PANEL FOR APPLICATION IN SECURED PORTABLE DEVICE. // Information Security Problems. Computer Systems. 2016. №4. Pp. 118-126. DOI:Keywords:
optical sensor panel, secured input device, information securityPages:
118-126Annotation:
This article discusses formation of stray electromagnetic radiation from raster display systems using interfaces data organization exchange standard DVI. Submitted description model of jamming intercept stray electromagnetic radiation optimal receiver.To quote:
Parshutkin A.V., Egin A.V., Zaytsev S.A. THE MODEL OF JAMMING INTERCEPT STRAY ELECTROMAGNETIC RADIATION OPTIMAL RECEIVER OF RASTER DISPLAY SYSTEMS WITH DVI STANDART // Information Security Problems. Computer Systems. 2016. №4. Pp. 127-133. DOI:Keywords:
JAMMING, STRAY ELECTROMAGNETIC RADIATION, RASTER DISPLAY SYSTEMS, DVI INTERFACEPages:
127-133Annotation:
The purpose of article is research of questions of fight against the narrow-band hindrances on a range in automated control systems of technical and auxiliary fleet and system of monitoring of navigation signs.To quote:
Rudy'kh S.V., Sikarev I.A., Galochkin R.N., Kiselevich G.V. ELECTROMAGNETIC IMMUNITY OF THE MONITORING SYSTEMS OF AIDS TO NAVIGATION ON THE BASIS OF AUTOMATIC INFORMATION SYSTEMS // Information Security Problems. Computer Systems. 2016. №4. Pp. 134-139. DOI:Keywords:
INTERNAL WATERWAYS, AUTOMATED IDENTIFICATION SYSTEMS (AIS), ADDITIVE AND MULTIPLICATIVE INTERFERENCE, COEFFICIENT OF MUTUAL DIFFERENCE (CMD)Pages:
134-139Annotation:
The article deals the indicators to evaluate the effectiveness of information security system of information interaction in complex distributed organizational management objects and the methods of their determination. The methodology laid stochastic representation of a stream of destructive effects on the process of information interaction between the control elements distributed organizational object.To quote:
Anisimov V.G., Anisimov E.G., Zegzhda P.D., Saurenko T.N., Prisyazhnyuk S.P. INDICATORS TO EVALUATE THE EFFECTIVENESS OF INFORMATION SECURITY SYSTEM OF INFORMATION INTERACTION AT COMPLEX DISTRIBUTED ORGANIZATIONAL MANAGEMENT OBJECTS. // Information Security Problems. Computer Systems. 2016. №4. Pp. 140-145. DOI:Keywords:
Complex distributed organizational object, information interaction, information security, efficiency, performancePages:
140-145Kucheryavyi M., Storozhik V., Vovenda J.
Annotation:
The article considers the security staffing issues in the information field. It focuses on activities FSTEC of Russia in the framework of training in the specialty “Information security”. The article deals with a set of measures for the implementation FSTEC of Russia powers of the center of responsibility for determining the annual admission quotas.To quote:
Kucheryavyi M., Storozhik V., Vovenda J.
ON SECURITY STAFFING IN THE INFORMATION FIELD // Information Security Problems. Computer Systems. 2016. №4. Pp. 146-150. DOI:Keywords:
information field; security staffing; information security; professional training; responsibility centerPages:
146-150