Subsystem for Prevention of Computer Attacks Against Objects of Critical Information Infrastructure: Analysis of Functioning and Implementation

Igor Kotenko, I. Saenko, R. Zakharchenko, Dmitry Velichko
{"title":"Subsystem for Prevention of Computer Attacks Against Objects of Critical Information Infrastructure: Analysis of Functioning and Implementation","authors":"Igor Kotenko, I. Saenko, R. Zakharchenko, Dmitry Velichko","doi":"10.21681/2311-3456-2023-1-13-27","DOIUrl":null,"url":null,"abstract":"The purpose of the article: conducting a system analysis of the requirements for the subsystem for preventing computer attacks on critical information infrastructure in order to substantiate the directions for further improved scientific and methodological apparatus for the full functioning of the subsystem for preventing computer attacks. Research method: theoretical and systematic analysis of the requirements of legal acts, scientific publications, protection technologies and means of their implementation in departmental systems for detecting and counteringcomputer attacks.The result obtained: the rationale for the need to build mechanisms for preventing computer attacks on critical information infrastructure objects and the requirements for the subsystem for preventing computer attacks was carried out, an approach was proposed to prevent computer attacks at the stages of reconnaissance by an attacker of critical information infrastructure objects, based on the introduction of a security event correlation mechanism with automatic adaptation to the analyzed information infrastructure and the functions it performs at the current time and a detailed specification of the correlation rules.Scope of the proposed approach: a subsystem for preventing computer attacks of departmental systems for detecting and countering computer attacks, which should identify and prevent attempts to conduct computer attacks on critical information infrastructure objects in advance.The scientific novelty consists in a comprehensive analysis of the need to build mechanisms for preventing computer attacks on critical information infrastructure objects, an analysis of the requirements for the computer attack prevention subsystem, its functions and means of implementation. It is shown that the functions of preventing computer attacks in domestic technical solutions are not fully implemented, and that there is a substitution of the concept of “subsystem for preventing computer attacks” by the concept of “control and technical measures”. It is substantiated that for the implementation of the functions of preventing computer attacks, there is a technological backlog in the form of a ready-made technology based on the technology for building SIEM systems. It is shown that there is a need to refine the scientific and methodological apparatus for implementing computer warning functions based on artificial intelligence methods and big data technologies.Contribution: Kotenko I.V. - analysis of the functionality of the subsystem for preventing computer attacks, setting the task and proposals for developing the functionality of the subsystem for preventing computer attacks on critical information infrastructure objects; Saenko I.B. - analysis of the subsystem for preventing computer attacks in the general context of the theory of information security, substantiation of the implementation of the functions of preventing computer attacks based on the technology of building SIEM systems and big data; Zakharchenko R.I. - analysis of technical solutions that ensure the implementation of the subsystem for preventing computer attacks, Velichko D.V. - an approach to detecting computer attacks at the stages of reconnaissance by an attacker of objects of critical information infrastructure. All authors participated in the writing of the article.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"21 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Voprosy kiberbezopasnosti","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21681/2311-3456-2023-1-13-27","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The purpose of the article: conducting a system analysis of the requirements for the subsystem for preventing computer attacks on critical information infrastructure in order to substantiate the directions for further improved scientific and methodological apparatus for the full functioning of the subsystem for preventing computer attacks. Research method: theoretical and systematic analysis of the requirements of legal acts, scientific publications, protection technologies and means of their implementation in departmental systems for detecting and counteringcomputer attacks.The result obtained: the rationale for the need to build mechanisms for preventing computer attacks on critical information infrastructure objects and the requirements for the subsystem for preventing computer attacks was carried out, an approach was proposed to prevent computer attacks at the stages of reconnaissance by an attacker of critical information infrastructure objects, based on the introduction of a security event correlation mechanism with automatic adaptation to the analyzed information infrastructure and the functions it performs at the current time and a detailed specification of the correlation rules.Scope of the proposed approach: a subsystem for preventing computer attacks of departmental systems for detecting and countering computer attacks, which should identify and prevent attempts to conduct computer attacks on critical information infrastructure objects in advance.The scientific novelty consists in a comprehensive analysis of the need to build mechanisms for preventing computer attacks on critical information infrastructure objects, an analysis of the requirements for the computer attack prevention subsystem, its functions and means of implementation. It is shown that the functions of preventing computer attacks in domestic technical solutions are not fully implemented, and that there is a substitution of the concept of “subsystem for preventing computer attacks” by the concept of “control and technical measures”. It is substantiated that for the implementation of the functions of preventing computer attacks, there is a technological backlog in the form of a ready-made technology based on the technology for building SIEM systems. It is shown that there is a need to refine the scientific and methodological apparatus for implementing computer warning functions based on artificial intelligence methods and big data technologies.Contribution: Kotenko I.V. - analysis of the functionality of the subsystem for preventing computer attacks, setting the task and proposals for developing the functionality of the subsystem for preventing computer attacks on critical information infrastructure objects; Saenko I.B. - analysis of the subsystem for preventing computer attacks in the general context of the theory of information security, substantiation of the implementation of the functions of preventing computer attacks based on the technology of building SIEM systems and big data; Zakharchenko R.I. - analysis of technical solutions that ensure the implementation of the subsystem for preventing computer attacks, Velichko D.V. - an approach to detecting computer attacks at the stages of reconnaissance by an attacker of objects of critical information infrastructure. All authors participated in the writing of the article.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
关键信息基础设施对象计算机攻击防范子系统:功能与实现分析
本文的目的是:对防止关键信息基础设施受到计算机攻击的子系统的需求进行系统分析,以确定进一步改进科学和方法设备的方向,使防止计算机攻击的子系统充分发挥作用。研究方法:从理论上和系统地分析部门系统中检测和打击计算机攻击的法律行为、科学出版物、保护技术及其实施手段的要求。得到的结果是:阐述了建立防止计算机攻击关键信息基础设施对象机制的基本原理和防止计算机攻击子系统的要求,提出了在攻击者对关键信息基础设施对象进行侦察阶段防止计算机攻击的方法;介绍了一种能够自动适应所分析的信息基础设施及其当前所执行的功能的安全事件关联机制,并详细规范了相关规则。建议方法的范围:一个防止部门系统的电脑攻击的分系统,用以侦测及对抗电脑攻击,该分系统应预先识别及防止对关键资讯基建对象进行电脑攻击的企图。科学的新颖性在于全面分析了构建计算机防范关键信息基础设施对象攻击机制的需求,分析了计算机防范攻击子系统的需求、功能和实现方式。研究表明,国内技术方案中防范计算机攻击的功能没有得到充分实现,“防范计算机攻击子系统”的概念被“控制与技术措施”的概念所替代。事实证明,为了实现防止计算机攻击的功能,在构建SIEM系统的技术基础上,存在以现成技术形式存在的技术积压。研究表明,需要完善基于人工智能方法和大数据技术实现计算机预警功能的科学和方法设备。贡献:Kotenko I.V. -分析了防止计算机攻击的子系统的功能,设定了任务和建议,以开发防止关键信息基础设施对象受到计算机攻击的子系统的功能;Saenko I.B. -在信息安全理论的大背景下,分析了防止计算机攻击的子系统,基于构建SIEM系统和大数据的技术,验证了防止计算机攻击功能的实现;Zakharchenko R.I.——分析技术解决方案,确保实现防止计算机攻击的子系统,Velichko D.V.——在关键信息基础设施对象的攻击者侦察阶段检测计算机攻击的方法。所有作者都参与了这篇文章的写作。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Model for Building Competencies of a Computer Crime Investigator ASSESSMENT AND PREDICTION OF THE COMPLEX OBJECTS STATE: APPLICATIOIN FOR INFORMATION SECURITY Cellular Automata and Their Generalizations in Cryptography. Part 1 A METHOD OF PARAMETRIC SYNTHESIS OF CRYPTO-CODE STRUCTURES FOR MONITORING AND RESTORING THE INTEGRITY OF INFORMATION Application of Methods of Theory of Fuzzy Sets to Assess the Risk of Violations of Critical Properties Protected Resources Automated Control System
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1