INFORMATION PROTECTION FROM LEAKAGE THROUGH TECHNICAL CHANNELS ON THE BASIS OF ADAPTIVE MULTIAGENT SECURITY SYSTEM AT THE INFORMATIZATION OBJECT

Yury Yazov, A. Avsentiev
{"title":"INFORMATION PROTECTION FROM LEAKAGE THROUGH TECHNICAL CHANNELS ON THE BASIS OF ADAPTIVE MULTIAGENT SECURITY SYSTEM AT THE INFORMATIZATION OBJECT","authors":"Yury Yazov, A. Avsentiev","doi":"10.21681/2311-3456-2022-5-2-13","DOIUrl":null,"url":null,"abstract":"Purpose: to show the creation and consideration perspective of the ways to build a multi-agent information security system at an informatization object with the implementation of a decentralized and mixed (centralizeddecentralized) principle of its design and functioning in order to exclude the extraction of various types of information, data about the characteristics of the informatization object and relationships between its structural elements. Method: the method of functional and structural analysis of technical channels of leaking information circulating in the form of speech information at the informatization objects of the internal affairs bodies in the course of their daily activities or during official activities, as well as ways to build an information security system from leakage through technical channels is applied. Result: the factors determined are those that are necessary to be taken into account when substantiating the composition and functions of agents of a multi-agent information security system, depending on the conditions characterizing the dynamics of the intruder’s actions to obtain protected information, the dynamics of the application of measures and means of protection. It is shown that a multi-agent protection system composition can include two classes of agents - simple and intelligent, and the system itself must be a multilayer structure, each layer of which is tied to a certain type of technical information leakage channels, and contain one or more agents (meta-agents), which provide solution of decision support tasks for information protection in each layer and in the security system as a whole and control of other agents. Examples of the composition and structure of a multi-agent system for protecting against leakage through technical channels, as well as examples of the structure of a simple and intelligent agent for such a system are given. The scientific novelty of the article is in the fact that the idea of creating a multi-agent system is considered for the first time in relation to solving the problem of protecting information from leakage through technical channels, the composition, structure and functions of such systems are determined, as well as the directions for the development of methodological support for their creation and operation.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"154 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Voprosy kiberbezopasnosti","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21681/2311-3456-2022-5-2-13","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Purpose: to show the creation and consideration perspective of the ways to build a multi-agent information security system at an informatization object with the implementation of a decentralized and mixed (centralizeddecentralized) principle of its design and functioning in order to exclude the extraction of various types of information, data about the characteristics of the informatization object and relationships between its structural elements. Method: the method of functional and structural analysis of technical channels of leaking information circulating in the form of speech information at the informatization objects of the internal affairs bodies in the course of their daily activities or during official activities, as well as ways to build an information security system from leakage through technical channels is applied. Result: the factors determined are those that are necessary to be taken into account when substantiating the composition and functions of agents of a multi-agent information security system, depending on the conditions characterizing the dynamics of the intruder’s actions to obtain protected information, the dynamics of the application of measures and means of protection. It is shown that a multi-agent protection system composition can include two classes of agents - simple and intelligent, and the system itself must be a multilayer structure, each layer of which is tied to a certain type of technical information leakage channels, and contain one or more agents (meta-agents), which provide solution of decision support tasks for information protection in each layer and in the security system as a whole and control of other agents. Examples of the composition and structure of a multi-agent system for protecting against leakage through technical channels, as well as examples of the structure of a simple and intelligent agent for such a system are given. The scientific novelty of the article is in the fact that the idea of creating a multi-agent system is considered for the first time in relation to solving the problem of protecting information from leakage through technical channels, the composition, structure and functions of such systems are determined, as well as the directions for the development of methodological support for their creation and operation.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于自适应多智能体安全系统的信息化对象信息泄漏技术保护
目的:展示在信息化对象上构建多主体信息安全系统的方法的创建和考虑视角,在其设计和功能上实施分散和混合(集中-分散)原则,以排除提取有关信息化对象特征及其结构元素之间关系的各种类型的信息、数据。方法:对内务机关信息化对象在日常活动过程中或公务活动中以言语信息形式传播的信息泄露技术渠道进行功能和结构分析的方法,以及从技术渠道泄漏构建信息安全体系的方法。结果:所确定的因素是在证实多主体信息安全系统中主体的组成和功能时需要考虑的因素,这取决于表征入侵者获取受保护信息的行动动态的条件,以及应用保护措施和手段的动态。研究表明,一个多智能体保护系统的组成可以包括简单智能体两类智能体,系统本身必须是一个多层结构,每一层都与某种类型的技术信息泄漏通道绑定,并包含一个或多个智能体(元智能体),为每一层和整个安全系统的信息保护提供决策支持任务的解决方案,并对其他智能体进行控制。给出了用于防止通过技术渠道泄漏的多智能体系统的组成和结构的示例,以及用于该系统的简单智能智能体的结构的示例。本文的科学新颖之处在于,首次从解决信息技术渠道泄露问题的角度出发,提出了构建多智能体系统的思路,确定了多智能体系统的组成、结构和功能,并为多智能体系统的创建和运行提供了方法论支持。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Model for Building Competencies of a Computer Crime Investigator ASSESSMENT AND PREDICTION OF THE COMPLEX OBJECTS STATE: APPLICATIOIN FOR INFORMATION SECURITY Cellular Automata and Their Generalizations in Cryptography. Part 1 A METHOD OF PARAMETRIC SYNTHESIS OF CRYPTO-CODE STRUCTURES FOR MONITORING AND RESTORING THE INTEGRITY OF INFORMATION Application of Methods of Theory of Fuzzy Sets to Assess the Risk of Violations of Critical Properties Protected Resources Automated Control System
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1