首页 > 最新文献

2023 International Russian Smart Industry Conference (SmartIndustryCon)最新文献

英文 中文
Building an Attack Tree for Analysis of Information Security Risks 构建面向信息安全风险分析的攻击树
Pub Date : 2023-03-27 DOI: 10.1109/SmartIndustryCon57312.2023.10110738
U.V. Kuzmina, O. Kazakov, Bogdan Erushev
With the help of a well-thought-out information security threat model, you can develop a protection plan that will be based on current threats. The task of creating the most effective system for assessing the state of asset protection of an enterprise is one of the main goals of modeling. They imply the universality of information security concepts. You should use various methodologies of this process with the necessary perspective and sufficient level of detail to describe the threat models. An approach using all possible threat implementations is constructed in the form of trees or attack graphs (GAT) with verification of their properties. The set of threats, connections and their parameters are determined by asset owners and information security specialists. The elimination of shortcomings in the security model with complete overlap became possible thanks to the use of such a data set and the described structure. In this article, we describe the creation of a software application for automating and formalizing the process of assessing the information security of information system assets and localization of information system security bottlenecks. A distinctive feature of the application is the use of the threat database of the FSTEC of Russia to simulate an attack tree. FSTEC of Russia is the state regulator in the field of information security. The developed software application saves time by simplifying the process of assessing the security of information systems, and also makes the process of threat modeling visual.
在经过深思熟虑的信息安全威胁模型的帮助下,您可以开发基于当前威胁的保护计划。创建用于评估企业资产保护状态的最有效系统的任务是建模的主要目标之一。它们暗示了信息安全概念的普遍性。您应该使用此过程的各种方法,并具有必要的视角和足够的详细程度来描述威胁模型。使用所有可能的威胁实现的方法以树或攻击图(GAT)的形式构建,并验证其属性。威胁、连接及其参数的集合由资产所有者和信息安全专家确定。由于使用了这样的数据集和所描述的结构,消除了具有完全重叠的安全模型中的缺点成为可能。在本文中,我们描述了一个软件应用程序的创建,用于自动化和形式化评估信息系统资产的信息安全性和信息系统安全瓶颈的本地化的过程。该应用程序的一个显著特点是使用俄罗斯FSTEC的威胁数据库来模拟攻击树。FSTEC是俄罗斯信息安全领域的国家监管机构。开发的软件应用程序简化了信息系统安全评估过程,节省了时间,并使威胁建模过程可视化。
{"title":"Building an Attack Tree for Analysis of Information Security Risks","authors":"U.V. Kuzmina, O. Kazakov, Bogdan Erushev","doi":"10.1109/SmartIndustryCon57312.2023.10110738","DOIUrl":"https://doi.org/10.1109/SmartIndustryCon57312.2023.10110738","url":null,"abstract":"With the help of a well-thought-out information security threat model, you can develop a protection plan that will be based on current threats. The task of creating the most effective system for assessing the state of asset protection of an enterprise is one of the main goals of modeling. They imply the universality of information security concepts. You should use various methodologies of this process with the necessary perspective and sufficient level of detail to describe the threat models. An approach using all possible threat implementations is constructed in the form of trees or attack graphs (GAT) with verification of their properties. The set of threats, connections and their parameters are determined by asset owners and information security specialists. The elimination of shortcomings in the security model with complete overlap became possible thanks to the use of such a data set and the described structure. In this article, we describe the creation of a software application for automating and formalizing the process of assessing the information security of information system assets and localization of information system security bottlenecks. A distinctive feature of the application is the use of the threat database of the FSTEC of Russia to simulate an attack tree. FSTEC of Russia is the state regulator in the field of information security. The developed software application saves time by simplifying the process of assessing the security of information systems, and also makes the process of threat modeling visual.","PeriodicalId":157877,"journal":{"name":"2023 International Russian Smart Industry Conference (SmartIndustryCon)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128448740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Holographic and Perceptron Neuron Networks Joint Application for the Dynamic Systems Behavior Forecast 全息和感知器神经元网络在动态系统行为预测中的联合应用
Pub Date : 2023-03-27 DOI: 10.1109/SmartIndustryCon57312.2023.10110729
V. Olonichev, B. Staroverov, Sergey Tarasov
The method of prognosis of dynamic system behavior along its temporal series is suggested. This method is based on the joint application of two types of artificial neural networks: holographic and perceptron. The holographic network plays the role of associated memory and perceptron one—the forecasting approximator. The method was tested on the task of forecasting electrical energy consumption. The holographis network selected similar intervals in the preceding temporal series. The perceptron was then trained on the selected data, using it as input values and the intervals immediately after them as output values. A trained perceptron may be used for the prediction. With the real data from the regional electrical company, the average relative error of the forecast was about 2%.
提出了沿时间序列预测动力系统行为的方法。该方法是基于全息和感知机两种人工神经网络的联合应用。全息网络起着关联记忆和感知器-预测逼近器的作用。在电力消耗预测任务中对该方法进行了验证。全息网络在之前的时间序列中选择了相似的间隔。然后,感知器在选定的数据上进行训练,将其作为输入值,并将紧随其后的间隔作为输出值。一个经过训练的感知器可以用于预测。与地区电力公司的实际数据相比,预测的平均相对误差约为2%。
{"title":"The Holographic and Perceptron Neuron Networks Joint Application for the Dynamic Systems Behavior Forecast","authors":"V. Olonichev, B. Staroverov, Sergey Tarasov","doi":"10.1109/SmartIndustryCon57312.2023.10110729","DOIUrl":"https://doi.org/10.1109/SmartIndustryCon57312.2023.10110729","url":null,"abstract":"The method of prognosis of dynamic system behavior along its temporal series is suggested. This method is based on the joint application of two types of artificial neural networks: holographic and perceptron. The holographic network plays the role of associated memory and perceptron one—the forecasting approximator. The method was tested on the task of forecasting electrical energy consumption. The holographis network selected similar intervals in the preceding temporal series. The perceptron was then trained on the selected data, using it as input values and the intervals immediately after them as output values. A trained perceptron may be used for the prediction. With the real data from the regional electrical company, the average relative error of the forecast was about 2%.","PeriodicalId":157877,"journal":{"name":"2023 International Russian Smart Industry Conference (SmartIndustryCon)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128575651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Calculating the Maximum Response Time of Protection Systems of Industrial Control System Network to the Impact of a DDoS Attack 工控系统网络防护系统对DDoS攻击影响的最大响应时间计算
Pub Date : 2023-03-27 DOI: 10.1109/SmartIndustryCon57312.2023.10110756
Aleksandr M. Boger, A. N. Sokolov
The purpose of this research is to develop a method for calculating the maximum response time of information protection systems for networks of industrial control systems (ICS) to the impact of a DDoS-attack. This parameter should not exceed the value corresponding to the average time of a successful DDoS attack and can be used when configuring protection systems for ICS networks to minimize the likelihood of a successful DDoS attack or significantly reduce the possible negative consequences of its impact. To achieve the goal, the task of developing a model of an intruder in the preparation and implementation of a DDoS attack was set and solved, based on a stochastic network of this process. The mathematical expectation of the average time of a successful DDoS attack and its dispersion, as well as the dependence of the probability of a successful DDoS attack on its duration in time, are calculated using the method of topological transformation of a stochastic network and the method of two-time approximation. In conclusion, several experiments simulating a DDoS attack were carried out and allowing us to conclude that the real time of the implementation of a successful DDoS attack corresponds to that time calculated with the proposed method.
本研究的目的是开发一种计算工业控制系统(ICS)网络信息保护系统对ddos攻击影响的最大响应时间的方法。该参数不应超过DDoS攻击成功的平均时间所对应的值。在配置ICS网络防护系统时使用该参数,可以最大限度地降低DDoS攻击成功的可能性或显著降低DDoS攻击可能带来的负面影响。为了实现这一目标,在此过程的随机网络的基础上,设置并解决了建立DDoS攻击准备和实施过程中入侵者模型的任务。利用随机网络的拓扑变换方法和二次逼近方法,计算了DDoS攻击成功的平均时间和分散时间的数学期望,以及DDoS攻击成功的概率与时间持续时间的依赖关系。总之,进行了几个模拟DDoS攻击的实验,并允许我们得出结论,成功实施DDoS攻击的实时时间对应于用所提出的方法计算的时间。
{"title":"Calculating the Maximum Response Time of Protection Systems of Industrial Control System Network to the Impact of a DDoS Attack","authors":"Aleksandr M. Boger, A. N. Sokolov","doi":"10.1109/SmartIndustryCon57312.2023.10110756","DOIUrl":"https://doi.org/10.1109/SmartIndustryCon57312.2023.10110756","url":null,"abstract":"The purpose of this research is to develop a method for calculating the maximum response time of information protection systems for networks of industrial control systems (ICS) to the impact of a DDoS-attack. This parameter should not exceed the value corresponding to the average time of a successful DDoS attack and can be used when configuring protection systems for ICS networks to minimize the likelihood of a successful DDoS attack or significantly reduce the possible negative consequences of its impact. To achieve the goal, the task of developing a model of an intruder in the preparation and implementation of a DDoS attack was set and solved, based on a stochastic network of this process. The mathematical expectation of the average time of a successful DDoS attack and its dispersion, as well as the dependence of the probability of a successful DDoS attack on its duration in time, are calculated using the method of topological transformation of a stochastic network and the method of two-time approximation. In conclusion, several experiments simulating a DDoS attack were carried out and allowing us to conclude that the real time of the implementation of a successful DDoS attack corresponds to that time calculated with the proposed method.","PeriodicalId":157877,"journal":{"name":"2023 International Russian Smart Industry Conference (SmartIndustryCon)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129043490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Designing a High-Performance Resource Management Module for Real-Time Multiprocessor Systems 面向实时多处理器系统的高性能资源管理模块设计
Pub Date : 2023-03-27 DOI: 10.1109/SmartIndustryCon57312.2023.10110821
R. A. Biktashev, A. Martyshkin
The In this article the author substantiates a hardware approach to designing the kernel of real-time multiprocessor operating systems. The author also provides possible options for architectural solutions, and considers the formal representation of control algorithms for interacting processes operating in parallel computing systems when they access a shared resource. The theory of event-driven non-deterministic automata was used for formalization. There were obtained equations that describe the procedures for the process of entering the critical interval and remaining there, taking into account the accepted discipline of ensuring priority and mutual exclusion of incompatible events. The exit of the process from the critical section, which makes it possible to synthesize the control module was examined as well. Modeling of a device for 4 inputs of requests to a shared resource in the VHDL language was executed, the results of experimental studies were also provided.
本文提出了一种设计实时多处理器操作系统内核的硬件方法。作者还提供了架构解决方案的可能选项,并考虑了当并行计算系统中操作的交互进程访问共享资源时控制算法的形式化表示。采用事件驱动的非确定性自动机理论进行形式化。已获得的方程描述了进入临界区间并在此停留的过程的程序,同时考虑到确保优先和互不相容事件的相互排斥这一公认原则。同时,研究了该工艺在临界段的出口,使控制模块的合成成为可能。用VHDL语言对一个共享资源的4个输入请求的设备进行了建模,并给出了实验研究结果。
{"title":"Designing a High-Performance Resource Management Module for Real-Time Multiprocessor Systems","authors":"R. A. Biktashev, A. Martyshkin","doi":"10.1109/SmartIndustryCon57312.2023.10110821","DOIUrl":"https://doi.org/10.1109/SmartIndustryCon57312.2023.10110821","url":null,"abstract":"The In this article the author substantiates a hardware approach to designing the kernel of real-time multiprocessor operating systems. The author also provides possible options for architectural solutions, and considers the formal representation of control algorithms for interacting processes operating in parallel computing systems when they access a shared resource. The theory of event-driven non-deterministic automata was used for formalization. There were obtained equations that describe the procedures for the process of entering the critical interval and remaining there, taking into account the accepted discipline of ensuring priority and mutual exclusion of incompatible events. The exit of the process from the critical section, which makes it possible to synthesize the control module was examined as well. Modeling of a device for 4 inputs of requests to a shared resource in the VHDL language was executed, the results of experimental studies were also provided.","PeriodicalId":157877,"journal":{"name":"2023 International Russian Smart Industry Conference (SmartIndustryCon)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129224933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Neural Network Method for Solving a Fractional Order Differential Equation with the Cauchy-Type Problem 求解分数阶微分方程cauchy型问题的人工神经网络方法
Pub Date : 2023-03-27 DOI: 10.1109/SmartIndustryCon57312.2023.10110823
N. Duc, A. Galimyanov, I. Z. Akhmetov
Differential equations with Cauchy type initial conditions and boundary conditions play a very important role in mathematics, physics and other sciences. In this article, we have developed an artificial neural network (ANN) method for finding solutions to the Cauchy problem for fractional order differential equations (FODEs). The fractional derivative is considered to be of the Riemann-Liouville type. Here, we used a three-layer feedforward neural architecture (one input layer, one hidden layer and one output layer), L-BFGS (Broyden-Fletcher-Goldfarb-Shanno) optimization method to minimize the error function and change the parameters (weights and biases). Illustrative examples demonstrating the accuracy and efficiency of this method are given. Compare the results of the current method with the mathematical results.
具有柯西型初始条件和边界条件的微分方程在数学、物理和其他科学中占有非常重要的地位。在本文中,我们开发了一种人工神经网络(ANN)方法来求解分数阶微分方程(FODEs)的柯西问题。分数阶导数被认为是Riemann-Liouville型。在这里,我们使用三层前馈神经结构(一个输入层,一个隐藏层和一个输出层),L-BFGS (Broyden-Fletcher-Goldfarb-Shanno)优化方法最小化误差函数并改变参数(权值和偏差)。算例说明了该方法的准确性和有效性。将当前方法的结果与数学结果进行比较。
{"title":"Artificial Neural Network Method for Solving a Fractional Order Differential Equation with the Cauchy-Type Problem","authors":"N. Duc, A. Galimyanov, I. Z. Akhmetov","doi":"10.1109/SmartIndustryCon57312.2023.10110823","DOIUrl":"https://doi.org/10.1109/SmartIndustryCon57312.2023.10110823","url":null,"abstract":"Differential equations with Cauchy type initial conditions and boundary conditions play a very important role in mathematics, physics and other sciences. In this article, we have developed an artificial neural network (ANN) method for finding solutions to the Cauchy problem for fractional order differential equations (FODEs). The fractional derivative is considered to be of the Riemann-Liouville type. Here, we used a three-layer feedforward neural architecture (one input layer, one hidden layer and one output layer), L-BFGS (Broyden-Fletcher-Goldfarb-Shanno) optimization method to minimize the error function and change the parameters (weights and biases). Illustrative examples demonstrating the accuracy and efficiency of this method are given. Compare the results of the current method with the mathematical results.","PeriodicalId":157877,"journal":{"name":"2023 International Russian Smart Industry Conference (SmartIndustryCon)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124016253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliability of a Cluster of Duplicated Computer Systems with the Criticality of Functional Requests to Waiting 具有功能请求等待临界性的重复计算机系统集群的可靠性
Pub Date : 2023-03-27 DOI: 10.1109/SmartIndustryCon57312.2023.10110735
V. Bogatyrev, S. Bogatyrev, Victor V. Sivov
High reliability and fault tolerance of computer systems at high performance and low delays of executing the required functions are achieved by consolidating the data processing and storage resources through the use of cluster systems. Ensuring the reliability of cluster architecture computer systems while accelerating their reconfiguration after failures is accompanied by replication and migration of virtual machines. A approach is proposed for the justification of building a computer system with a cluster architecture, composed of duplicated computer nodes. Studies aimed at increasing the readiness of the cluster to timely execution of real-time requests while ensuring a stationary service traffic mode have been carried out. The work of duplicate nodes in load balancing mode and duplicate calculations is considered. In the first mode, requests are evenly distributed among the functional nodes (servers). In the second mode, replicas of the request are created, each of which is executed on one node of the backup system. For control, the calculation results are compared at check points. If there is a mismatch, a repeat calculation is possible.
通过使用集群系统来整合数据处理和存储资源,可以实现计算机系统在高性能和低延迟执行所需功能时的高可靠性和容错能力。为了保证集群架构计算机系统的可靠性,同时加速故障后的重构,虚拟机的复制和迁移是必不可少的。提出了一种基于集群结构的计算机系统的论证方法,该结构由多个重复的计算机节点组成。旨在提高集群及时执行实时请求的准备程度,同时确保固定的业务流量模式的研究已经开展。考虑了负载均衡模式下重复节点的工作和重复计算。在第一种模式中,请求均匀地分布在功能节点(服务器)之间。在第二种模式中,创建请求的副本,每个副本在备份系统的一个节点上执行。为了便于控制,在检查点对计算结果进行了比较。如果存在不匹配,则可能重复计算。
{"title":"Reliability of a Cluster of Duplicated Computer Systems with the Criticality of Functional Requests to Waiting","authors":"V. Bogatyrev, S. Bogatyrev, Victor V. Sivov","doi":"10.1109/SmartIndustryCon57312.2023.10110735","DOIUrl":"https://doi.org/10.1109/SmartIndustryCon57312.2023.10110735","url":null,"abstract":"High reliability and fault tolerance of computer systems at high performance and low delays of executing the required functions are achieved by consolidating the data processing and storage resources through the use of cluster systems. Ensuring the reliability of cluster architecture computer systems while accelerating their reconfiguration after failures is accompanied by replication and migration of virtual machines. A approach is proposed for the justification of building a computer system with a cluster architecture, composed of duplicated computer nodes. Studies aimed at increasing the readiness of the cluster to timely execution of real-time requests while ensuring a stationary service traffic mode have been carried out. The work of duplicate nodes in load balancing mode and duplicate calculations is considered. In the first mode, requests are evenly distributed among the functional nodes (servers). In the second mode, replicas of the request are created, each of which is executed on one node of the backup system. For control, the calculation results are compared at check points. If there is a mismatch, a repeat calculation is possible.","PeriodicalId":157877,"journal":{"name":"2023 International Russian Smart Industry Conference (SmartIndustryCon)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121406562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development and Application of an Application with Augmented Reality Technology for Training Future Aircraft Designers 增强现实技术在未来飞机设计师培训中的应用与开发
Pub Date : 2023-03-27 DOI: 10.1109/SmartIndustryCon57312.2023.10110795
N. Borgest, Sergei A. Vlasov, D.S Glibotsky
This article discusses the creation of an application with augmented reality technology, in order to improve the process of training skilled professionals in the field of aircraft engineering among students of higher education institutions. The application allows students to study and test their knowledge about the main aircraft units located in the aircraft class of the Department of Aircraft Construction and Design. This project is an Android-based application with the recognition of details on real objects (aircraft units) arranged in the class. The following tools and technologies have been used to create the application: Blender 3D for modeling objects, Unity 3D for creating the application interface and Vuforia Engine as a developer's toolkit.
本文讨论了利用增强现实技术创建一个应用程序,以改进高等院校学生在飞机工程领域培养熟练专业人员的过程。该应用程序允许学生学习和测试他们对位于飞机建造与设计系飞机类的主要飞机单元的知识。本项目是一个基于android的应用程序,对课堂中布置的实物(飞机单位)的细节进行识别。以下工具和技术已被用于创建应用程序:Blender 3D用于建模对象,Unity 3D用于创建应用程序界面和Vuforia引擎作为开发人员的工具包。
{"title":"Development and Application of an Application with Augmented Reality Technology for Training Future Aircraft Designers","authors":"N. Borgest, Sergei A. Vlasov, D.S Glibotsky","doi":"10.1109/SmartIndustryCon57312.2023.10110795","DOIUrl":"https://doi.org/10.1109/SmartIndustryCon57312.2023.10110795","url":null,"abstract":"This article discusses the creation of an application with augmented reality technology, in order to improve the process of training skilled professionals in the field of aircraft engineering among students of higher education institutions. The application allows students to study and test their knowledge about the main aircraft units located in the aircraft class of the Department of Aircraft Construction and Design. This project is an Android-based application with the recognition of details on real objects (aircraft units) arranged in the class. The following tools and technologies have been used to create the application: Blender 3D for modeling objects, Unity 3D for creating the application interface and Vuforia Engine as a developer's toolkit.","PeriodicalId":157877,"journal":{"name":"2023 International Russian Smart Industry Conference (SmartIndustryCon)","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121626973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Information Security Incident Handling Regulation 《资讯保安事故处理规例
Pub Date : 2023-03-27 DOI: 10.1109/SmartIndustryCon57312.2023.10110721
Anastasia Iakovleva, M. Zhukova, Tatyana Strekaleva
The article shows the problem of cyber fatigue of the specialists investigating information security incidents. The cause of the problem is the increase in the number of warnings and events generated and logged daily by a protection system. This volume of information is processed using automation tools; nevertheless, it cannot do without human participation. The essence of the issue lies in the fact that specialists do not have a common algorithm for conducting investigations and a roadmap for building a timeline of events. Therefore, it is necessary to change and supplement the existing approach to the work with incidents by unifying the process of identifying the stages of development of a computer incident during an investigation. To do this, the paper studies the issue of algorithmization and describes typical approaches to handling information security incidents. We propose an algorithm that allows processing an information security incident: to obtain information about the access point to the system, the development of an incident in the system, and the general profile of the attacker. In addition, it is assumed that the algorithm can be used for educational purposes to train specialists who work with incidents in order to form and develop basic practical skills by applying this in a case-oriented approach.
文章揭示了信息安全事件调查专家的网络疲劳问题。问题的原因是保护系统每天生成和记录的警告和事件数量的增加。这些信息是使用自动化工具处理的;然而,它离不开人的参与。问题的实质在于,专家们没有一个共同的进行调查的算法,也没有一个建立事件时间表的路线图。因此,有必要通过在调查过程中统一识别计算机事件发展阶段的过程,来改变和补充现有的处理事件的方法。为此,本文研究了算法问题,并描述了处理信息安全事件的典型方法。我们提出了一种允许处理信息安全事件的算法:获取有关系统的访问点、系统中事件的发展以及攻击者的一般概况的信息。此外,假设该算法可用于教育目的,以培训处理事件的专家,以便通过在面向案例的方法中应用该算法来形成和发展基本的实践技能。
{"title":"Information Security Incident Handling Regulation","authors":"Anastasia Iakovleva, M. Zhukova, Tatyana Strekaleva","doi":"10.1109/SmartIndustryCon57312.2023.10110721","DOIUrl":"https://doi.org/10.1109/SmartIndustryCon57312.2023.10110721","url":null,"abstract":"The article shows the problem of cyber fatigue of the specialists investigating information security incidents. The cause of the problem is the increase in the number of warnings and events generated and logged daily by a protection system. This volume of information is processed using automation tools; nevertheless, it cannot do without human participation. The essence of the issue lies in the fact that specialists do not have a common algorithm for conducting investigations and a roadmap for building a timeline of events. Therefore, it is necessary to change and supplement the existing approach to the work with incidents by unifying the process of identifying the stages of development of a computer incident during an investigation. To do this, the paper studies the issue of algorithmization and describes typical approaches to handling information security incidents. We propose an algorithm that allows processing an information security incident: to obtain information about the access point to the system, the development of an incident in the system, and the general profile of the attacker. In addition, it is assumed that the algorithm can be used for educational purposes to train specialists who work with incidents in order to form and develop basic practical skills by applying this in a case-oriented approach.","PeriodicalId":157877,"journal":{"name":"2023 International Russian Smart Industry Conference (SmartIndustryCon)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121759893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model of the Initial Section of RTD’s CVC for RFID Tags RTD的RFID标签CVC初始部分模型
Pub Date : 2023-03-27 DOI: 10.1109/SmartIndustryCon57312.2023.10110720
E. Kuimov, Natalia Vetrova, S. Meshkov
A model of current transfer in resonant tunnel structures has been developed to develop applications for nonlinear elements of RFID tags. Unlike the previous models of this class, the developed model exhibits manifestations of interelectronic interaction. The expected work in the model is distinguished by high accuracy in the initial section (average relative deviation within 1%), low requirements for computing resources (reduced time complexity of the calculation by more than 400 times compared to traditional approaches), and the absence of coefficients without theoretical estimates, which makes it promising for high accuracy in TCAD systems for designing a new generation microwave device.
为了开发RFID标签非线性元件的应用,建立了谐振隧道结构中的电流转移模型。与本课程之前的模型不同,开发的模型展示了电子间相互作用的表现。该模型具有初始部分精度高(平均相对偏差在1%以内)、对计算资源要求低(与传统方法相比,计算时间复杂度降低了400倍以上)、不存在未经理论估计的系数等特点,有望在新一代微波器件设计的TCAD系统中实现高精度。
{"title":"Model of the Initial Section of RTD’s CVC for RFID Tags","authors":"E. Kuimov, Natalia Vetrova, S. Meshkov","doi":"10.1109/SmartIndustryCon57312.2023.10110720","DOIUrl":"https://doi.org/10.1109/SmartIndustryCon57312.2023.10110720","url":null,"abstract":"A model of current transfer in resonant tunnel structures has been developed to develop applications for nonlinear elements of RFID tags. Unlike the previous models of this class, the developed model exhibits manifestations of interelectronic interaction. The expected work in the model is distinguished by high accuracy in the initial section (average relative deviation within 1%), low requirements for computing resources (reduced time complexity of the calculation by more than 400 times compared to traditional approaches), and the absence of coefficients without theoretical estimates, which makes it promising for high accuracy in TCAD systems for designing a new generation microwave device.","PeriodicalId":157877,"journal":{"name":"2023 International Russian Smart Industry Conference (SmartIndustryCon)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130091957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Statistical Analysis Methods of the Data Obtained by Water Electro Conductivity Measurement 水电导率测量数据的统计分析方法
Pub Date : 2023-03-27 DOI: 10.1109/SmartIndustryCon57312.2023.10110797
Adil I. Burumbaev, V. Kuanishev, N. Barbin
The distilled water investigation has been undertaken by means of the descriptive and correlation method analysis backed by the Statistica and Matlab software. The conclusion has been made that further investigation to study chemical properties of water and water solutions is needed. The paper presents a method exploring the water properties measuring results by means of the professional water quality measurement meter WMM-97 at the temperature of 21°С and water pH (pH of the media corresponded to the State Standards 58144 5.0-6.6). The distilled water electro conductivity has been measured within a one-week time-period (the electro conductivity being in compliance with the State Standards 58144, less than 0,43 mCm/m), the indicators being registered each second.
在Statistica软件和Matlab软件的支持下,采用描述性和相关性分析方法对蒸馏水进行了调查。得出结论,需要对水及其水溶液的化学性质进行进一步的研究。本文介绍了用专业水质测量仪WMM-97在温度为21°С和水pH值(介质pH值符合国家标准58144 5.0-6.6)条件下,对水的性质测量结果进行探讨的方法。在一周的时间内测量蒸馏水的电导率(电导率符合国家标准58144,小于0.43 mCm/m),每秒记录指标。
{"title":"Statistical Analysis Methods of the Data Obtained by Water Electro Conductivity Measurement","authors":"Adil I. Burumbaev, V. Kuanishev, N. Barbin","doi":"10.1109/SmartIndustryCon57312.2023.10110797","DOIUrl":"https://doi.org/10.1109/SmartIndustryCon57312.2023.10110797","url":null,"abstract":"The distilled water investigation has been undertaken by means of the descriptive and correlation method analysis backed by the Statistica and Matlab software. The conclusion has been made that further investigation to study chemical properties of water and water solutions is needed. The paper presents a method exploring the water properties measuring results by means of the professional water quality measurement meter WMM-97 at the temperature of 21°С and water pH (pH of the media corresponded to the State Standards 58144 5.0-6.6). The distilled water electro conductivity has been measured within a one-week time-period (the electro conductivity being in compliance with the State Standards 58144, less than 0,43 mCm/m), the indicators being registered each second.","PeriodicalId":157877,"journal":{"name":"2023 International Russian Smart Industry Conference (SmartIndustryCon)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134601983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2023 International Russian Smart Industry Conference (SmartIndustryCon)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1