首页 > 最新文献

Ukrainian Information Security Research Journal最新文献

英文 中文
Password generation for wireless network with using variable complication rule 采用可变复杂度规则的无线网络密码生成
Pub Date : 2019-03-28 DOI: 10.18372/2410-7840.21.13547
Володимир Леонідович Бурячок, Андрій Олександрович Аносов, Артем Вадимович Платоненко
Найбільшу небезпеку для інформації останнім часом несуть відкриті Wi-Fi мережі, адже кожен має змогу підключитись до них та виконувати певні зловмисні дії. Небезпечними можна вважати також і умовно захищені мережі в публічних місцях чи організаціях, до яких можна підключитись дізнавшись, наприклад, пароль у працівника. Однією з причин кібернетичних атак на ресурси таких мереж є нестійкі до підбору паролі. Їх застосування дозволяє зловмисникам підключатися до зазначених мереж та отримувати доступ до всіх підключених до мереж пристроїв. Крім того, якщо нестійкий або стандартний пароль використовується для панелі налаштувань, то всі пристрої піддаються ризику кібернетичної атаки, яка може здійснюватися віддалено. Використання зловмисниками комплексного підходу для спроб несанкціонованого доступу до систем бездротового зв’язку (шляхом об’єднання соціальної інженерії та перехоплення даних з використанням зловмисного програмного забезпечення), а також нових видів кібератак, що дозволяють приховано встановлювати шкідливе програмне забезпечення на мобільні пристрої може сприяти зниженню ефективності існуючих методів та засобів захисту бездротових мереж.  З метою уникнення таких і подібних ним проблем у статті запропоновано спосіб підвищення захисту бездротових мереж від перехоплення інформації та впливу на неї, шляхом створення паролю, стійкого до підбору зі змінним правилом ускладнення. Даний спосіб може бути  використано при створенні програмно-апаратних засобів захисту, а також для підвищення захисту облікових записів користувачів та інших систем захисту, де необхідне використання надійного паролю. Враховуючи статистику та проведені в роботі розрахунки, можна стверджувати, що впровадження способу генерування ускладнених паролів дозволить суттєво підвищити рівень захищеності бездротових мереж.
{"title":"Password generation for wireless network with using variable complication rule","authors":"Володимир Леонідович Бурячок, Андрій Олександрович Аносов, Артем Вадимович Платоненко","doi":"10.18372/2410-7840.21.13547","DOIUrl":"https://doi.org/10.18372/2410-7840.21.13547","url":null,"abstract":"Найбільшу небезпеку для інформації останнім часом несуть відкриті Wi-Fi мережі, адже кожен має змогу підключитись до них та виконувати певні зловмисні дії. Небезпечними можна вважати також і умовно захищені мережі в публічних місцях чи організаціях, до яких можна підключитись дізнавшись, наприклад, пароль у працівника. Однією з причин кібернетичних атак на ресурси таких мереж є нестійкі до підбору паролі. Їх застосування дозволяє зловмисникам підключатися до зазначених мереж та отримувати доступ до всіх підключених до мереж пристроїв. Крім того, якщо нестійкий або стандартний пароль використовується для панелі налаштувань, то всі пристрої піддаються ризику кібернетичної атаки, яка може здійснюватися віддалено. Використання зловмисниками комплексного підходу для спроб несанкціонованого доступу до систем бездротового зв’язку (шляхом об’єднання соціальної інженерії та перехоплення даних з використанням зловмисного програмного забезпечення), а також нових видів кібератак, що дозволяють приховано встановлювати шкідливе програмне забезпечення на мобільні пристрої може сприяти зниженню ефективності існуючих методів та засобів захисту бездротових мереж.  З метою уникнення таких і подібних ним проблем у статті запропоновано спосіб підвищення захисту бездротових мереж від перехоплення інформації та впливу на неї, шляхом створення паролю, стійкого до підбору зі змінним правилом ускладнення. Даний спосіб може бути  використано при створенні програмно-апаратних засобів захисту, а також для підвищення захисту облікових записів користувачів та інших систем захисту, де необхідне використання надійного паролю. Враховуючи статистику та проведені в роботі розрахунки, можна стверджувати, що впровадження способу генерування ускладнених паролів дозволить суттєво підвищити рівень захищеності бездротових мереж.","PeriodicalId":378015,"journal":{"name":"Ukrainian Information Security Research Journal","volume":"50 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124975083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Assessment of organization’s information security on the criterion of confidence 基于置信度标准的组织信息安全评估
Pub Date : 2019-03-28 DOI: 10.18372/2410-7840.21.13445
Юрій Якович Самохвалов, Микола Миколайович Браіловський
Currently, the protection of information remains a pressing issue, and the most common approaches to its assessment are verification and risk-oriented method. However, the information security metrics in the relevant methodologies based on these approaches are insufficiently informative, since they take into account only objective aspects of security, completely ignoring the subjective ones. Therefore, they do not allow the development of judgments based on the state of confidentiality, integrity and availability of information and the organization’s information security level as a whole. For that reason, there is a necessity to develop a methodological apparatus for assessing the organization's information security, taking into account objective and subjective aspects of security. The article proposes the approach to assessing information security on the basis of the criterion of confidence that an organization implements its adopted security policy. Assessment of confidence includes assessment of the credibility of organization’s information security, the quality of the trust assessment model and the background of the persons who conducted such an assessment and knowledge assessment regarding threats. As an indicator of confidence, the utility indicator is used as the value of the generalized Harrington’s desirability function. The proposed approach to assessing the organization's information security is fairly simple to be implemented and can be used as a pilot to develop appropriate methods for assessing the security of organizations of various forms of ownership.
{"title":"Assessment of organization’s information security on the criterion of confidence","authors":"Юрій Якович Самохвалов, Микола Миколайович Браіловський","doi":"10.18372/2410-7840.21.13445","DOIUrl":"https://doi.org/10.18372/2410-7840.21.13445","url":null,"abstract":"Currently, the protection of information remains a pressing issue, and the most common approaches to its assessment are verification and risk-oriented method. However, the information security metrics in the relevant methodologies based on these approaches are insufficiently informative, since they take into account only objective aspects of security, completely ignoring the subjective ones. Therefore, they do not allow the development of judgments based on the state of confidentiality, integrity and availability of information and the organization’s information security level as a whole. For that reason, there is a necessity to develop a methodological apparatus for assessing the organization's information security, taking into account objective and subjective aspects of security. The article proposes the approach to assessing information security on the basis of the criterion of confidence that an organization implements its adopted security policy. Assessment of confidence includes assessment of the credibility of organization’s information security, the quality of the trust assessment model and the background of the persons who conducted such an assessment and knowledge assessment regarding threats. As an indicator of confidence, the utility indicator is used as the value of the generalized Harrington’s desirability function. The proposed approach to assessing the organization's information security is fairly simple to be implemented and can be used as a pilot to develop appropriate methods for assessing the security of organizations of various forms of ownership.","PeriodicalId":378015,"journal":{"name":"Ukrainian Information Security Research Journal","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124877557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On model of cyber-physical system with state and measurement attacks on the basis of stochastic difference equations 基于随机差分方程的具有状态和测量攻击的网络物理系统模型
Pub Date : 2019-03-28 DOI: 10.18372/2410-7840.21.13543
В. Марценюк, А.С. Сверстюк
The article is devoted to questions of simulation of cyber-physical systems taking into account information threats. The principles of organization of structure and reliable functioning of the studied systems are analyzed. The conceptual model of cyber-physical systems taking into account information threats is presented. The constructive algorithm for finding an estimation in a cyberphysical model during attacks on a state and observation on the basis of measuring system indices is proposed in the work. The model is presented as a non-stationary descriptor system, which includes differential equations for node state variables and algebraic equations for measurements. State variables and measurements are considered as random vectors. The information criterion is used to find the optimal estimate of the scalar product that characterizes the state of the system. The algorithm is based on the construction of the task of estimation to the problem of optimal control. The value of the mean square error that does not depend on attacks is obtained. The evaluation was carried out in the form of a scalar product, which includes a measurement vector. An algorithm for constructing an optimal estimation for a scalar product is proposed, which includes the state of the network model during an attack. Mutual information between random vectors was used as a quality criterion for optimization. The evaluation was carried out in the form of a scalar product, which includes a measurement vector. Considering the effects of attacks on this estimate, it should be noted that the build estimate depends on such attacks only through the multiplier. The average square error of such an estimate is independent of the attack. The reason for the absence of impact of the attack on the mean square error is the quadratic form of the sets that are selected for state attacks. This assumption makes it possible to apply a linear-quadratic optimization device, which reduces the problem of evaluation to the problem of optimal control. Received results illustrated in the numerical example for the stage of system without noise and with attacks and for the stage of system with noise and attacks. In this case , a three-node cyberphysical system was used which could be used for planning technical service and optimized management for achievement more high totalperformance and safety of the studied systems .
{"title":"On model of cyber-physical system with state and measurement attacks on the basis of stochastic difference equations","authors":"В. Марценюк, А.С. Сверстюк","doi":"10.18372/2410-7840.21.13543","DOIUrl":"https://doi.org/10.18372/2410-7840.21.13543","url":null,"abstract":"The article is devoted to questions of simulation of cyber-physical systems taking into account information threats. The principles of organization of structure and reliable functioning of the studied systems are analyzed. The conceptual model of cyber-physical systems taking into account information threats is presented. The constructive algorithm for finding an estimation in a cyberphysical model during attacks on a state and observation on the basis of measuring system indices is proposed in the work. The model is presented as a non-stationary descriptor system, which includes differential equations for node state variables and algebraic equations for measurements. State variables and measurements are considered as random vectors. The information criterion is used to find the optimal estimate of the scalar product that characterizes the state of the system. The algorithm is based on the construction of the task of estimation to the problem of optimal control. The value of the mean square error that does not depend on attacks is obtained. The evaluation was carried out in the form of a scalar product, which includes a measurement vector. An algorithm for constructing an optimal estimation for a scalar product is proposed, which includes the state of the network model during an attack. Mutual information between random vectors was used as a quality criterion for optimization. The evaluation was carried out in the form of a scalar product, which includes a measurement vector. Considering the effects of attacks on this estimate, it should be noted that the build estimate depends on such attacks only through the multiplier. The average square error of such an estimate is independent of the attack. The reason for the absence of impact of the attack on the mean square error is the quadratic form of the sets that are selected for state attacks. This assumption makes it possible to apply a linear-quadratic optimization device, which reduces the problem of evaluation to the problem of optimal control. Received results illustrated in the numerical example for the stage of system without noise and with attacks and for the stage of system with noise and attacks. In this case , a three-node cyberphysical system was used which could be used for planning technical service and optimized management for achievement more high totalperformance and safety of the studied systems .","PeriodicalId":378015,"journal":{"name":"Ukrainian Information Security Research Journal","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129857350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of intrusion detection systems 入侵检测系统分析
Pub Date : 2018-12-21 DOI: 10.18372/2410-7840.20.13425
Світлана Володимирівна Казмірчук, Анна Олександрівнa Корченко, Тарас Іванович Паращук
З розвитком інформаційних технологій збільшується кількість уразливостей та загроз різноманітним системам обробки даних і тому для забезпечення їх нормального функціонування та попередження вторгнень необхідні спеціалізовані засоби безпеки, а перспективним напрямком, який активно розвивається у сфері інформаційної безпеки є виявлення кібератак і запобігання вторгнень в інформаційних системах з боку неавторизованої сторони. Для виявлення мережевих вторгнень використовуються сучасні методи, моделі, засоби і комплексні технічні рішення для систем виявлення та запобігання вторгнень, які можуть залишатись ефективними при появі нових або модифікованих видів кіберзагроз. Загалом при появі нових загроз та аномалій, породжених атакуючими діями з невстановленими або нечітко визначеними властивостями, зазначені засоби не завжди залишаються ефективними і вимагають тривалих часових ресурсів для їх відповідної адаптації. Тому системи виявлення вторгнень повинні постійно досліджуватись і удосконалюватись для забезпечення неперервності в їх ефективному функціонуванні. Серед таких систем є спеціалізовані програмні засоби, які направлені на виявлення підозрілої активності або втручання в інформаційну систему і прийняття адекватних заходів щодо запобігання кібератакам. Аналіз джерел показав, що для сучасних інформаційних систем та мереж гостро стоїть питання оперативного виявлення зловживань та аномалій. В більшості робіт наведений лише частковий аналіз систем виявлення вторгнень та їх класифікація, представлений загальний опис відповідного забезпечення, який не відображає їх широкого спектру та не містить необхідної множини характеристик для інтегрованої оцінки таких систем. Тому, в роботі проведений узагальнений аналіз програмних засобів систем виявлення вторгнень за визначеною базовою множиною характеристик («Клас кібератак», «Адаптивність», «Методи виявлення», «Управління системою», «Масштабованість», «Рівень спостереження», «Реакція на кібератаку», «Захищеність» та «Підтримка операційної системи»). Це дасть певні можливості щодо вибору таких засобів та розробки для них найбільш ефективних механізмів безпеки при впливах кібератак.
随着信息技术的发展,各种数据处理系统的漏洞和威胁越来越多,因此需要专门的安全工具来确保其正常运行并防止入侵,而信息安全领域正在积极发展的一个前景广阔的领域就是检测网络攻击和防止未经授权方入侵信息系统。为了检测网络入侵,我们使用了现代方法、模型、工具和入侵检测与防御系统的综合技术解决方案,这些方法在面对新的或经过修改的网络威胁类型时依然有效。一般来说,当新的威胁和异常情况出现时,由于攻击行为具有未识别或未定义的属性,这些工具并不总是有效的,而且需要长时间的资源来对其进行相应的调整。因此,必须不断研究和改进入侵检测系统,以确保其有效运行的连续性。这些系统包括专门的软件工具,旨在检测信息系统中的可疑活动或干扰,并采取适当措施防止网络攻击。对资料来源的分析表明,对于现代信息系统和网络来说,及时发现滥用和异常情况的问题十分尖锐。大多数著作仅对入侵检测系统及其分类进行了部分分析,对相关软件进行了一般性描述,但并未反映出其广泛性,也未包含对此类系统进行综合评估所需的一系列特征。因此,本文根据某些基本特征(网络攻击类别、适应性、检测方法、系统管理、可扩展性、监视级别、对网络攻击的响应、安全性和操作系统支持)对入侵检测系统软件进行了概括性分析。这将为在发生网络攻击时选择这些手段并为其开发最有效的安全机制提供一定的机会。
{"title":"Analysis of intrusion detection systems","authors":"Світлана Володимирівна Казмірчук, Анна Олександрівнa Корченко, Тарас Іванович Паращук","doi":"10.18372/2410-7840.20.13425","DOIUrl":"https://doi.org/10.18372/2410-7840.20.13425","url":null,"abstract":"З розвитком інформаційних технологій збільшується кількість уразливостей та загроз різноманітним системам обробки даних і тому для забезпечення їх нормального функціонування та попередження вторгнень необхідні спеціалізовані засоби безпеки, а перспективним напрямком, який активно розвивається у сфері інформаційної безпеки є виявлення кібератак і запобігання вторгнень в інформаційних системах з боку неавторизованої сторони. Для виявлення мережевих вторгнень використовуються сучасні методи, моделі, засоби і комплексні технічні рішення для систем виявлення та запобігання вторгнень, які можуть залишатись ефективними при появі нових або модифікованих видів кіберзагроз. Загалом при появі нових загроз та аномалій, породжених атакуючими діями з невстановленими або нечітко визначеними властивостями, зазначені засоби не завжди залишаються ефективними і вимагають тривалих часових ресурсів для їх відповідної адаптації. Тому системи виявлення вторгнень повинні постійно досліджуватись і удосконалюватись для забезпечення неперервності в їх ефективному функціонуванні. Серед таких систем є спеціалізовані програмні засоби, які направлені на виявлення підозрілої активності або втручання в інформаційну систему і прийняття адекватних заходів щодо запобігання кібератакам. Аналіз джерел показав, що для сучасних інформаційних систем та мереж гостро стоїть питання оперативного виявлення зловживань та аномалій. В більшості робіт наведений лише частковий аналіз систем виявлення вторгнень та їх класифікація, представлений загальний опис відповідного забезпечення, який не відображає їх широкого спектру та не містить необхідної множини характеристик для інтегрованої оцінки таких систем. Тому, в роботі проведений узагальнений аналіз програмних засобів систем виявлення вторгнень за визначеною базовою множиною характеристик («Клас кібератак», «Адаптивність», «Методи виявлення», «Управління системою», «Масштабованість», «Рівень спостереження», «Реакція на кібератаку», «Захищеність» та «Підтримка операційної системи»). Це дасть певні можливості щодо вибору таких засобів та розробки для них найбільш ефективних механізмів безпеки при впливах кібератак.","PeriodicalId":378015,"journal":{"name":"Ukrainian Information Security Research Journal","volume":"168 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125985320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of confidentiality of information transfer in DSSS systems in conditions of limited systems of used signal constructions 有限系统使用信号结构条件下DSSS系统信息传输保密性分析
Pub Date : 2018-12-21 DOI: 10.18372/2410-7840.20.13252
Олексій Георгійович Голубничий
{"title":"Analysis of confidentiality of information transfer in DSSS systems in conditions of limited systems of used signal constructions","authors":"Олексій Георгійович Голубничий","doi":"10.18372/2410-7840.20.13252","DOIUrl":"https://doi.org/10.18372/2410-7840.20.13252","url":null,"abstract":"","PeriodicalId":378015,"journal":{"name":"Ukrainian Information Security Research Journal","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115868889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Передумови для формування безпечного інформаційно-освітнього середовища сучасного університету
Pub Date : 2018-12-21 DOI: 10.18372/2410-7840.20.13422
Лазат Муктаровна Кыдыралина
The paper reviewed and analyzed previous research in the field of protection of the information-educational environment of universities (ILE). It is shown that the priority development of digital education systems in many industrialized countries of the world requires appropriate technical and methodological support of specialists not only in the field of pedagogical activity, but also information technology, taking into account the problems of cyber security and information protection. It is shown that the protected data that is stored and circulate in the information and communication systems of universities, in particular, include: personal data of students, teachers, researchers, support staff; digitized information representing the intellectual property of the educational institution; information arrays that provide the learning process (for example, multimedia content, databases, training programs, etc.); It is substantiated that these information resources can act as an object of theft or distortion from external (internal) computer intruders or from hooliganism, from students or employees. It has been substantiated that the trend towards globalization of access to information resources, formed in many countries, makes relevant the task of introducing the latest digital and information and communication technologies in all areas of activity of a modern university. The relevance of research in the direction of developing models for decision support systems for finding investment management strategies for various ratios of the parameters of the investment process in the cybersecurity systems of educational institutions is substantiated.
本文对高校信息教育环境保护领域的研究进行了回顾和分析。研究表明,世界上许多工业化国家数字教育系统的优先发展需要专家的适当技术和方法支持,不仅在教学活动领域,而且在考虑到网络安全和信息保护问题的信息技术领域。它表明,在大学的信息和通信系统中存储和流通的受保护的数据,特别是包括:学生,教师,研究人员,支持人员的个人数据;代表教育机构知识产权的数字化信息;提供学习过程的信息数组(例如,多媒体内容、数据库、培训计划等);事实证明,这些信息资源可以作为盗窃或歪曲的对象,从外部(内部)计算机入侵者或流氓,从学生或员工。事实证明,在许多国家形成的获取信息资源的全球化趋势,使得在现代大学活动的所有领域引入最新的数字和信息与通信技术的任务具有相关性。在开发决策支持系统模型的方向上进行研究的相关性,以寻找教育机构网络安全系统中投资过程参数的各种比例的投资管理策略。
{"title":"Передумови для формування безпечного інформаційно-освітнього середовища сучасного університету","authors":"Лазат Муктаровна Кыдыралина","doi":"10.18372/2410-7840.20.13422","DOIUrl":"https://doi.org/10.18372/2410-7840.20.13422","url":null,"abstract":"The paper reviewed and analyzed previous research in the field of protection of the information-educational environment of universities (ILE). It is shown that the priority development of digital education systems in many industrialized countries of the world requires appropriate technical and methodological support of specialists not only in the field of pedagogical activity, but also information technology, taking into account the problems of cyber security and information protection. It is shown that the protected data that is stored and circulate in the information and communication systems of universities, in particular, include: personal data of students, teachers, researchers, support staff; digitized information representing the intellectual property of the educational institution; information arrays that provide the learning process (for example, multimedia content, databases, training programs, etc.); It is substantiated that these information resources can act as an object of theft or distortion from external (internal) computer intruders or from hooliganism, from students or employees. It has been substantiated that the trend towards globalization of access to information resources, formed in many countries, makes relevant the task of introducing the latest digital and information and communication technologies in all areas of activity of a modern university. The relevance of research in the direction of developing models for decision support systems for finding investment management strategies for various ratios of the parameters of the investment process in the cybersecurity systems of educational institutions is substantiated.","PeriodicalId":378015,"journal":{"name":"Ukrainian Information Security Research Journal","volume":" 76","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120826711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Централізований синтез реконфігуровних апаратних засобів інформаційної безпеки на високопродуктивних платформах
Pub Date : 2018-12-21 DOI: 10.18372/2410-7840.20.13426
Виктор Федорович Евдокимов, Анатолий Николаевич Давиденко, Сергей Яковлевич Гильгурт
The main purpose of a signature-based network intrusion detection system (NIDS) is to inspect network packet contents against tens of thousands of predefined malicious patterns. Unlike the firewall, NIDS examines not only packet headers, but also the packet bodies. The multi-pattern string matching task is a specific type of string matching functionality to search an input stream for a set of patterns rather than a single pattern. Due to rising traffic rates, increasing number and sophistication of attacks and the collapse of Moore's law for sequential processing, traditional software solutions can no longer meet the high requirements of today’s security challenges. Therefore, hardware approaches are proposed to accelerate pattern matching. Combining the flexibility of software and the nearASIC performance, reconfigurable FPGA-based devices have become increasingly popular for this purpose. Unfortunately, the development of complex reconfigurable devices is a very difficult craft. Users of NIDS which are usually system administrators have not neither enough qualification, nor computing resources to fulfill such a work. On the other hand specificities of security tasks require frequent execution of dynamic re-synthesis of reconfigurable accelerators. To solve this problem, a centralized system based on GRID and Cloud platforms was proposed. Such approach moves design and computation complexities from LANs to HPC. An experimental system was constructed and tested. First results are received and discussed. Preliminary comparison of GRID and Cloud technologies is made. Besides cybersecurity, high-speed multi-pattern matching is required for such important applications as data mining, XML switching, QoS management, VoIP filtering, cache replication etc.
基于签名的网络入侵检测系统(NIDS)的主要目的是根据成千上万的预定义恶意模式对网络数据包内容进行检测。与防火墙不同,NIDS不仅检查包头,还检查包体。多模式字符串匹配任务是一种特定类型的字符串匹配功能,用于在输入流中搜索一组模式,而不是单个模式。随着业务量的增加、攻击的数量和复杂性的增加以及顺序处理的摩尔定律的崩溃,传统的软件解决方案已经无法满足当今安全挑战的高要求。因此,提出了硬件方法来加速模式匹配。结合软件的灵活性和接近asic的性能,基于可重构fpga的设备在这方面越来越受欢迎。不幸的是,开发复杂的可重构器件是一项非常困难的工作。NIDS的用户通常是系统管理员,他们既没有足够的资格,也没有足够的计算资源来完成这样的工作。另一方面,安全任务的特殊性要求频繁地执行可重构加速器的动态重新合成。为了解决这一问题,提出了一种基于网格和云平台的集中式系统。这种方法将设计和计算的复杂性从局域网转移到高性能计算。搭建了实验系统并进行了测试。收到并讨论第一批结果。对GRID和Cloud技术进行了初步比较。除了网络安全之外,数据挖掘、XML交换、QoS管理、VoIP过滤、缓存复制等重要应用都需要高速多模式匹配。
{"title":"Централізований синтез реконфігуровних апаратних засобів інформаційної безпеки на високопродуктивних платформах","authors":"Виктор Федорович Евдокимов, Анатолий Николаевич Давиденко, Сергей Яковлевич Гильгурт","doi":"10.18372/2410-7840.20.13426","DOIUrl":"https://doi.org/10.18372/2410-7840.20.13426","url":null,"abstract":"The main purpose of a signature-based network intrusion detection system (NIDS) is to inspect network packet contents against tens of thousands of predefined malicious patterns. Unlike the firewall, NIDS examines not only packet headers, but also the packet bodies. The multi-pattern string matching task is a specific type of string matching functionality to search an input stream for a set of patterns rather than a single pattern. Due to rising traffic rates, increasing number and sophistication of attacks and the collapse of Moore's law for sequential processing, traditional software solutions can no longer meet the high requirements of today’s security challenges. Therefore, hardware approaches are proposed to accelerate pattern matching. Combining the flexibility of software and the nearASIC performance, reconfigurable FPGA-based devices have become increasingly popular for this purpose. Unfortunately, the development of complex reconfigurable devices is a very difficult craft. Users of NIDS which are usually system administrators have not neither enough qualification, nor computing resources to fulfill such a work. On the other hand specificities of security tasks require frequent execution of dynamic re-synthesis of reconfigurable accelerators. To solve this problem, a centralized system based on GRID and Cloud platforms was proposed. Such approach moves design and computation complexities from LANs to HPC. An experimental system was constructed and tested. First results are received and discussed. Preliminary comparison of GRID and Cloud technologies is made. Besides cybersecurity, high-speed multi-pattern matching is required for such important applications as data mining, XML switching, QoS management, VoIP filtering, cache replication etc.","PeriodicalId":378015,"journal":{"name":"Ukrainian Information Security Research Journal","volume":"300 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116372123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Scaling and enhancing data protection for web application data in accordance with PCI DSS, HIPAA/HITECH, FEDRAMP standards 根据PCI DSS, HIPAA/HITECH, FEDRAMP标准扩展和增强web应用程序数据的数据保护
Pub Date : 2018-12-21 DOI: 10.18372/2410-7840.20.13423
Михайло Олексійович Колпаков, Андрій Борисович Петренко
The increase in the number of information web resources is due to the development of technologies for interaction with information, accessibility and ease of use for the consumer, opportunities for automating business processes, saving resources and time for providing services for entrepreneurs. In this paper, an integrated approach is considered regarding the implementation of the mechanisms for solving the above problems in accordance with the requirements of the standards of PCI DSS, HIPAA / HITECH, FEDRAMP. An effective approach for integrating the Amazon S3 cloud storage into web applications written in the Java programming language is proposed. The step-by-step guide to web services implementation will not only effectively scale and protect product data, but also significantly extend the functionality of the web application, use internal analytical tools to monitor user activity, generate reports based on aggregated statistics. The step-by-step guide for integration of web services will not only allow effectively to scale and protect product data, but also significantly expand the functionality of the web application, to use internal analytical tools for monitoring user activity, to generate reports based on collected statistics. The mathematical model of the AES encryption algorithm, implemented in the Amazon cloud environment, is considered to explain the feasibility and relevance of its use. A graph of comparing the speed of the most current encryption algorithms based on the data obtained by conducting research on measuring the amount of time spent on encryption at different data volumes was constructed. This approach will allow software products to meet the requirements of the EU and FISMA data protection directives, improve data scaling by accessibility zones and regions, and enhance data protection through internal Amazon mechanisms such as access control, auditing, network firewall, server-side encryption and the encryption key management infrastructure.
信息网络资源数量的增加是由于信息交互技术的发展、消费者的可访问性和易用性、业务流程自动化的机会、为企业家提供服务节省的资源和时间。本文根据PCI DSS、HIPAA / HITECH、FEDRAMP等标准的要求,综合考虑解决上述问题的机制实现方法。提出了一种将Amazon S3云存储集成到用Java编程语言编写的web应用程序中的有效方法。web服务实现的分步指南不仅可以有效地扩展和保护产品数据,还可以显著扩展web应用程序的功能,使用内部分析工具监控用户活动,根据汇总的统计数据生成报告。web服务集成的分步指南不仅可以有效地扩展和保护产品数据,还可以显著扩展web应用程序的功能,使用内部分析工具监视用户活动,根据收集的统计数据生成报告。在亚马逊云环境中实现的AES加密算法的数学模型被认为可以解释其使用的可行性和相关性。通过对不同数据量下加密时间的测量研究获得的数据,构建了当前几种加密算法的速度对比图。这种方法将允许软件产品满足欧盟和FISMA数据保护指令的要求,通过可访问区域和区域改善数据扩展,并通过Amazon内部机制(如访问控制、审计、网络防火墙、服务器端加密和加密密钥管理基础设施)增强数据保护。
{"title":"Scaling and enhancing data protection for web application data in accordance with PCI DSS, HIPAA/HITECH, FEDRAMP standards","authors":"Михайло Олексійович Колпаков, Андрій Борисович Петренко","doi":"10.18372/2410-7840.20.13423","DOIUrl":"https://doi.org/10.18372/2410-7840.20.13423","url":null,"abstract":"The increase in the number of information web resources is due to the development of technologies for interaction with information, accessibility and ease of use for the consumer, opportunities for automating business processes, saving resources and time for providing services for entrepreneurs. In this paper, an integrated approach is considered regarding the implementation of the mechanisms for solving the above problems in accordance with the requirements of the standards of PCI DSS, HIPAA / HITECH, FEDRAMP. An effective approach for integrating the Amazon S3 cloud storage into web applications written in the Java programming language is proposed. The step-by-step guide to web services implementation will not only effectively scale and protect product data, but also significantly extend the functionality of the web application, use internal analytical tools to monitor user activity, generate reports based on aggregated statistics. The step-by-step guide for integration of web services will not only allow effectively to scale and protect product data, but also significantly expand the functionality of the web application, to use internal analytical tools for monitoring user activity, to generate reports based on collected statistics. The mathematical model of the AES encryption algorithm, implemented in the Amazon cloud environment, is considered to explain the feasibility and relevance of its use. A graph of comparing the speed of the most current encryption algorithms based on the data obtained by conducting research on measuring the amount of time spent on encryption at different data volumes was constructed. This approach will allow software products to meet the requirements of the EU and FISMA data protection directives, improve data scaling by accessibility zones and regions, and enhance data protection through internal Amazon mechanisms such as access control, auditing, network firewall, server-side encryption and the encryption key management infrastructure.","PeriodicalId":378015,"journal":{"name":"Ukrainian Information Security Research Journal","volume":"162 8-12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132846311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Псевдовипадкові криптостійкі послідовності і подільність точки скрученої кривої Едвардса навпіл над простими і складеними полями
Pub Date : 2018-12-21 DOI: 10.18372/2410-7840.20.13101
Руслан Вячеславович Скуратовский
Estimates of the complexity of the point division operation into two for twisted Edwards curve are obtained in comparison with the doubling of the point. One of the applications of the divisibility properties of a point into two is considered to determine the order of a point in a cryptosystem. The cryptological security of the pseudo-random sequence generator proposed by the author is shown on the basis of a curve in the form of Edwards. A new generation scheme and a new one-sided function of a pseudo-random cryptological security sequence based on these curves are proposed. The degree of embedding of these curves into a finite field for pairing on friendly elliptic curves of prime order or almost prime order is investigated. Pairingfriendly curves of prime or near-prime order are absolutely essential in certain pairing-based schemes like short signatures with longer useful life. For this goal we construct friendly curves on base of family of twisted Edwards curves. The possibility of constructing a twisted Edwards order curve, that is, one that has a minimal cofactor 4, has been found. A solution for the inverse doubling problem is obtained for quasi-elliptic curves that represented in the twisted Edwards form. Also its application to the proving of cryptographic pseudo-random sequence generator. It makes it possible to prove the cryptological security of the pseudo-random sequence we developed.
通过与点的加倍运算的比较,得到了扭曲Edwards曲线分两点运算的复杂度估计。一个点的可整除性质的一个应用被认为是确定一个点的顺序在一个密码系统。作者提出的伪随机序列发生器的密码学安全性用爱德华兹曲线表示。基于这些曲线,提出了伪随机密码安全序列的新的生成方案和新的单侧函数。研究了这些曲线在素数阶或近素数阶友好椭圆曲线上的嵌入程度。在某些基于配对的方案中,如具有较长使用寿命的短签名,素数或近素数阶的配对友好曲线是绝对必要的。为此,我们在扭曲爱德华兹曲线族的基础上构造友好曲线。我们发现了构造一个扭曲的爱德华兹阶曲线的可能性,即具有最小余数4的曲线。得到了以扭曲爱德华兹形式表示的拟椭圆曲线的逆加倍问题的一个解。并将其应用于密码伪随机序列生成器的证明。这使得证明伪随机序列的密码学安全性成为可能。
{"title":"Псевдовипадкові криптостійкі послідовності і подільність точки скрученої кривої Едвардса навпіл над простими і складеними полями","authors":"Руслан Вячеславович Скуратовский","doi":"10.18372/2410-7840.20.13101","DOIUrl":"https://doi.org/10.18372/2410-7840.20.13101","url":null,"abstract":"Estimates of the complexity of the point division operation into two for twisted Edwards curve are obtained in comparison with the doubling of the point. One of the applications of the divisibility properties of a point into two is considered to determine the order of a point in a cryptosystem. The cryptological security of the pseudo-random sequence generator proposed by the author is shown on the basis of a curve in the form of Edwards. A new generation scheme and a new one-sided function of a pseudo-random cryptological security sequence based on these curves are proposed. The degree of embedding of these curves into a finite field for pairing on friendly elliptic curves of prime order or almost prime order is investigated. Pairingfriendly curves of prime or near-prime order are absolutely essential in certain pairing-based schemes like short signatures with longer useful life. For this goal we construct friendly curves on base of family of twisted Edwards curves. The possibility of constructing a twisted Edwards order curve, that is, one that has a minimal cofactor 4, has been found. A solution for the inverse doubling problem is obtained for quasi-elliptic curves that represented in the twisted Edwards form. Also its application to the proving of cryptographic pseudo-random sequence generator. It makes it possible to prove the cryptological security of the pseudo-random sequence we developed.","PeriodicalId":378015,"journal":{"name":"Ukrainian Information Security Research Journal","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114886048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimation of financial costs for building of information protection system 信息保护系统建设的财务成本估算
Pub Date : 2018-12-21 DOI: 10.18372/2410-7840.20.13424
Б.Є. Журиленко
In this paper, an attempt has been made to develop a methodology for estimating the financial costs of building a complex of technical information protection (CTIP) using known parameters. Such parameters can be: the likelihood of hacking protection, depending on the amount of funding invested in protection and possible financial losses without protection; risks of losses from invested funding in defense; risks of total financial losses and the effectiveness of the constructed protection. All CTEI assessments were conducted for the maximum values of the likelihood of hacking and the maximum risk of loss. In this paper, specific expressions are obtained for assessing the effectiveness of information protection, optimizing the risks of financial losses in the design, certification and evaluation of the working condition depending on financial investments in information protection and the risks of their losses. A theoretical definition of the effectiveness of protection through the risks of invested funding in defense and the risks of total financial losses are proposed. Coefficient the effectiveness of the protection of a single or single-tier protection will vary from zero (in the absence of funding for protection) to unity (with infinite funding for the construction of protection). The obtained expressions at the design stage will allow you to compare with each other and evaluate the chosen KTPDI before the process of its implementation. Experimental research data on the differences between the practical and theoretical parameters of the effectiveness of protection will allow to investigate and select the most optimal and effective protection. Expressions are given that make it possible to determine the actual effectiveness of security based on the experimental probability of hacking. Theoretically confirmed higher reliability of multi-level protection compared with single-level. It is shown that with the same financial costs for single-level and multi-level protection, the likelihood of hacking protection and risks financial loss of multi-level protection is much lower. Consequently, with the help of a multi-level protection system, you can create the required level of protection with lower financial costs. Thus, this work can be useful for assessing the effectiveness of information protection, optimizing the risks of financial losses in the design, certification and assessment of the working condition.
在本文中,尝试开发了一种方法,用于使用已知参数估算构建技术信息保护(CTIP)综合体的财务成本。这些参数可以是:黑客保护的可能性,取决于投入保护的资金数量和没有保护可能造成的经济损失;国防投资损失的风险;金融总损失的风险和构建保护的有效性。所有CTEI评估都是针对黑客攻击可能性的最大值和损失的最大风险进行的。本文根据信息保护的财务投入及其损失风险,得出了评估信息保护有效性的具体表达式,优化了工况设计、认证和评估中的财务损失风险。提出了通过防卫投入资金风险和财政总损失风险来界定防卫有效性的理论定义。单个或单层防护的防护有效性系数将从零(没有防护资金)到统一(有无限的防护资金建设)变化。在设计阶段获得的表达式将允许您相互比较,并在其实现过程之前评估所选的KTPDI。实验研究数据的实际和理论参数的保护有效性的差异,将允许调查和选择最优和有效的保护。给出了基于实验的黑客攻击概率来确定安全的实际有效性的表达式。从理论上证实了多级保护比单级保护具有更高的可靠性。结果表明,在同等财务成本的情况下,多级保护被黑客攻击的可能性和风险财务损失要低得多。因此,在多级保护系统的帮助下,您可以以较低的财务成本创建所需的保护级别。因此,这项工作可以用于评估信息保护的有效性,优化工作条件的设计,认证和评估中的财务损失风险。
{"title":"Estimation of financial costs for building of information protection system","authors":"Б.Є. Журиленко","doi":"10.18372/2410-7840.20.13424","DOIUrl":"https://doi.org/10.18372/2410-7840.20.13424","url":null,"abstract":"In this paper, an attempt has been made to develop a methodology for estimating the financial costs of building a complex of technical information protection (CTIP) using known parameters. Such parameters can be: the likelihood of hacking protection, depending on the amount of funding invested in protection and possible financial losses without protection; risks of losses from invested funding in defense; risks of total financial losses and the effectiveness of the constructed protection. All CTEI assessments were conducted for the maximum values of the likelihood of hacking and the maximum risk of loss. In this paper, specific expressions are obtained for assessing the effectiveness of information protection, optimizing the risks of financial losses in the design, certification and evaluation of the working condition depending on financial investments in information protection and the risks of their losses. A theoretical definition of the effectiveness of protection through the risks of invested funding in defense and the risks of total financial losses are proposed. Coefficient the effectiveness of the protection of a single or single-tier protection will vary from zero (in the absence of funding for protection) to unity (with infinite funding for the construction of protection). The obtained expressions at the design stage will allow you to compare with each other and evaluate the chosen KTPDI before the process of its implementation. Experimental research data on the differences between the practical and theoretical parameters of the effectiveness of protection will allow to investigate and select the most optimal and effective protection. Expressions are given that make it possible to determine the actual effectiveness of security based on the experimental probability of hacking. Theoretically confirmed higher reliability of multi-level protection compared with single-level. It is shown that with the same financial costs for single-level and multi-level protection, the likelihood of hacking protection and risks financial loss of multi-level protection is much lower. Consequently, with the help of a multi-level protection system, you can create the required level of protection with lower financial costs. Thus, this work can be useful for assessing the effectiveness of information protection, optimizing the risks of financial losses in the design, certification and assessment of the working condition.","PeriodicalId":378015,"journal":{"name":"Ukrainian Information Security Research Journal","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122547507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Ukrainian Information Security Research Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1