首页 > 最新文献

Voprosy kiberbezopasnosti最新文献

英文 中文
Model of Automated Information System Operation in Cyberspace 网络空间信息系统自动化运行模式
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-6-69-78
R. Zakharchenko, I. Korolev
{"title":"Model of Automated Information System Operation in Cyberspace","authors":"R. Zakharchenko, I. Korolev","doi":"10.21681/2311-3456-2019-6-69-78","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-6-69-78","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114660482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Increasing Cyber Resilience of SCADA and WAMS in the Event of Cyber Attacks on the Information and Communication Subsystem of the Electric Power System 提高SCADA和WAMS在电力系统信息通信子系统遭受网络攻击时的网络弹性
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-2-18-26
L. Gurina
Research objective: development of measures to ensure cyber resilience of SCADA and WAMS under realized threats, the consequence of which is a decrease in the quality of information required in the control of the electric power system (EPS). Research methods: probabilistic methods, methods of power system reliability analysis, Markov methods. Research result. A comparative analysis of possible states of information collection, transmission, and processing systems (SCADA, WAMS) during cyberattacks on the information and communication system was carried out. SCADA and WAMS cyber resilience models were developed. On the basis of the models proposed, measures to ensure cyber resilience of information collection, transmission, and processing system were put forward. Keywords: cyber-physical power system; resilience; information collection, processing, and transmission system; false data injection attack; DoS-attack; state estimation.
研究目标:在威胁实现的情况下,制定确保SCADA和WAMS网络弹性的措施,其后果是电力系统控制(EPS)所需的信息质量下降。研究方法:概率方法、电力系统可靠性分析方法、马尔可夫方法。研究的结果。对信息通信系统遭受网络攻击时,信息收集、传输和处理系统(SCADA、WAMS)的可能状态进行了比较分析。建立了SCADA和WAMS网络弹性模型。在此基础上,提出了保障信息采集、传输和处理系统网络弹性的措施。关键词:网络-物理电力系统;弹性;信息采集、处理和传输系统;虚假数据注入攻击;dos攻击;状态估计。
{"title":"Increasing Cyber Resilience of SCADA and WAMS in the Event of Cyber Attacks on the Information and Communication Subsystem of the Electric Power System","authors":"L. Gurina","doi":"10.21681/2311-3456-2022-2-18-26","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-2-18-26","url":null,"abstract":"Research objective: development of measures to ensure cyber resilience of SCADA and WAMS under realized threats, the consequence of which is a decrease in the quality of information required in the control of the electric power system (EPS). Research methods: probabilistic methods, methods of power system reliability analysis, Markov methods. Research result. A comparative analysis of possible states of information collection, transmission, and processing systems (SCADA, WAMS) during cyberattacks on the information and communication system was carried out. SCADA and WAMS cyber resilience models were developed. On the basis of the models proposed, measures to ensure cyber resilience of information collection, transmission, and processing system were put forward. Keywords: cyber-physical power system; resilience; information collection, processing, and transmission system; false data injection attack; DoS-attack; state estimation.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125400431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Visual Analytics for Information Security: Areas of Application, Tasks, Visualization Models 信息安全的可视化分析:应用领域,任务,可视化模型
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-4-2-15
Igor Kotenko, Maxim Kolomeec, K. Zhernova, A. Chechulin
The purpose of the article: to identify and systematize the areas and problems of information security that are solved using visual analytics methods, as well as analysis of the applied data visualization models and their properties that affect the perception of data by the operator. Research method: a systematic analysis of the application of visual analytics methods for solving information security problems. Analysis of relevant papers in the field of information security and data visualization. The objects of research are: theoretical and practical solutions to information security problems through visual analysis. Visual analytics in the article is considered from several sides: from the point of view of the areas of application of visual analysis methods in information security, from the point of view of the tasks solved by the security analyst, from the point of view of the visualization models used and the data structures used, as well as from the point of view of the properties of data visualization models. The result: classification of visualization models is proposed, which differs from analogs in that it is based on the analysis of areas and tasks of information security and comparison of visualization models to them. The scope of the proposed approach is the creation of visualization models that can be used to increase the efficiency of operator interaction with information security applications. The proposed article will be useful both for specialists who develop information security systems and for students studying in the direction of training “Information Security”.
本文的目的是:识别和系统化使用可视化分析方法解决的信息安全领域和问题,以及应用数据可视化模型及其影响操作员对数据感知的属性的分析。研究方法:系统分析可视化分析方法在解决信息安全问题中的应用。分析了信息安全和数据可视化领域的相关论文。研究对象是:通过可视化分析解决信息安全问题的理论和实践。本文从可视化分析方法在信息安全中的应用领域、安全分析人员解决的任务、使用的可视化模型和使用的数据结构以及数据可视化模型的属性等几个方面来考虑可视化分析。结果:提出了可视化模型的分类方法,该方法与类似方法的不同之处在于,它是基于对信息安全领域和任务的分析,并与可视化模型进行比较。所提出的方法的范围是创建可视化模型,可用于提高操作员与信息安全应用程序交互的效率。本文对开发信息安全系统的专家和学习“信息安全”培训方向的学生都很有用。
{"title":"Visual Analytics for Information Security: Areas of Application, Tasks, Visualization Models","authors":"Igor Kotenko, Maxim Kolomeec, K. Zhernova, A. Chechulin","doi":"10.21681/2311-3456-2021-4-2-15","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-4-2-15","url":null,"abstract":"The purpose of the article: to identify and systematize the areas and problems of information security that are solved using visual analytics methods, as well as analysis of the applied data visualization models and their properties that affect the perception of data by the operator. Research method: a systematic analysis of the application of visual analytics methods for solving information security problems. Analysis of relevant papers in the field of information security and data visualization. The objects of research are: theoretical and practical solutions to information security problems through visual analysis. Visual analytics in the article is considered from several sides: from the point of view of the areas of application of visual analysis methods in information security, from the point of view of the tasks solved by the security analyst, from the point of view of the visualization models used and the data structures used, as well as from the point of view of the properties of data visualization models. The result: classification of visualization models is proposed, which differs from analogs in that it is based on the analysis of areas and tasks of information security and comparison of visualization models to them. The scope of the proposed approach is the creation of visualization models that can be used to increase the efficiency of operator interaction with information security applications. The proposed article will be useful both for specialists who develop information security systems and for students studying in the direction of training “Information Security”.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122567367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INFORMATION PROTECTION FROM LEAKAGE THROUGH TECHNICAL CHANNELS ON THE BASIS OF ADAPTIVE MULTIAGENT SECURITY SYSTEM AT THE INFORMATIZATION OBJECT 基于自适应多智能体安全系统的信息化对象信息泄漏技术保护
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-5-2-13
Yury Yazov, A. Avsentiev
Purpose: to show the creation and consideration perspective of the ways to build a multi-agent information security system at an informatization object with the implementation of a decentralized and mixed (centralizeddecentralized) principle of its design and functioning in order to exclude the extraction of various types of information, data about the characteristics of the informatization object and relationships between its structural elements. Method: the method of functional and structural analysis of technical channels of leaking information circulating in the form of speech information at the informatization objects of the internal affairs bodies in the course of their daily activities or during official activities, as well as ways to build an information security system from leakage through technical channels is applied. Result: the factors determined are those that are necessary to be taken into account when substantiating the composition and functions of agents of a multi-agent information security system, depending on the conditions characterizing the dynamics of the intruder’s actions to obtain protected information, the dynamics of the application of measures and means of protection. It is shown that a multi-agent protection system composition can include two classes of agents - simple and intelligent, and the system itself must be a multilayer structure, each layer of which is tied to a certain type of technical information leakage channels, and contain one or more agents (meta-agents), which provide solution of decision support tasks for information protection in each layer and in the security system as a whole and control of other agents. Examples of the composition and structure of a multi-agent system for protecting against leakage through technical channels, as well as examples of the structure of a simple and intelligent agent for such a system are given. The scientific novelty of the article is in the fact that the idea of creating a multi-agent system is considered for the first time in relation to solving the problem of protecting information from leakage through technical channels, the composition, structure and functions of such systems are determined, as well as the directions for the development of methodological support for their creation and operation.
目的:展示在信息化对象上构建多主体信息安全系统的方法的创建和考虑视角,在其设计和功能上实施分散和混合(集中-分散)原则,以排除提取有关信息化对象特征及其结构元素之间关系的各种类型的信息、数据。方法:对内务机关信息化对象在日常活动过程中或公务活动中以言语信息形式传播的信息泄露技术渠道进行功能和结构分析的方法,以及从技术渠道泄漏构建信息安全体系的方法。结果:所确定的因素是在证实多主体信息安全系统中主体的组成和功能时需要考虑的因素,这取决于表征入侵者获取受保护信息的行动动态的条件,以及应用保护措施和手段的动态。研究表明,一个多智能体保护系统的组成可以包括简单智能体两类智能体,系统本身必须是一个多层结构,每一层都与某种类型的技术信息泄漏通道绑定,并包含一个或多个智能体(元智能体),为每一层和整个安全系统的信息保护提供决策支持任务的解决方案,并对其他智能体进行控制。给出了用于防止通过技术渠道泄漏的多智能体系统的组成和结构的示例,以及用于该系统的简单智能智能体的结构的示例。本文的科学新颖之处在于,首次从解决信息技术渠道泄露问题的角度出发,提出了构建多智能体系统的思路,确定了多智能体系统的组成、结构和功能,并为多智能体系统的创建和运行提供了方法论支持。
{"title":"INFORMATION PROTECTION FROM LEAKAGE THROUGH TECHNICAL CHANNELS ON THE BASIS OF ADAPTIVE MULTIAGENT SECURITY SYSTEM AT THE INFORMATIZATION OBJECT","authors":"Yury Yazov, A. Avsentiev","doi":"10.21681/2311-3456-2022-5-2-13","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-5-2-13","url":null,"abstract":"Purpose: to show the creation and consideration perspective of the ways to build a multi-agent information security system at an informatization object with the implementation of a decentralized and mixed (centralizeddecentralized) principle of its design and functioning in order to exclude the extraction of various types of information, data about the characteristics of the informatization object and relationships between its structural elements. Method: the method of functional and structural analysis of technical channels of leaking information circulating in the form of speech information at the informatization objects of the internal affairs bodies in the course of their daily activities or during official activities, as well as ways to build an information security system from leakage through technical channels is applied. Result: the factors determined are those that are necessary to be taken into account when substantiating the composition and functions of agents of a multi-agent information security system, depending on the conditions characterizing the dynamics of the intruder’s actions to obtain protected information, the dynamics of the application of measures and means of protection. It is shown that a multi-agent protection system composition can include two classes of agents - simple and intelligent, and the system itself must be a multilayer structure, each layer of which is tied to a certain type of technical information leakage channels, and contain one or more agents (meta-agents), which provide solution of decision support tasks for information protection in each layer and in the security system as a whole and control of other agents. Examples of the composition and structure of a multi-agent system for protecting against leakage through technical channels, as well as examples of the structure of a simple and intelligent agent for such a system are given. The scientific novelty of the article is in the fact that the idea of creating a multi-agent system is considered for the first time in relation to solving the problem of protecting information from leakage through technical channels, the composition, structure and functions of such systems are determined, as well as the directions for the development of methodological support for their creation and operation.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123502606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessment of Cyber Resilience of Operational Dispatch Control System of EPS EPS作战调度控制系统网络弹性评估
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-3-23-31
L. Gurina
The research objective is to develop an algorithm for assessing the cyber resilience of the operational dispatch control (ODC) system of electric power system (EPS) during cyberattacks on data collecting, processing, and transmitting systems. The research methods include the probabilistic methods, fuzzy set theory methods, and methods of EPS reliability analysis. Result of the research: the impact of cyberattacks on the functionality of the EPS ODC system is analyzed. The factors ensuring the cyber resilience of the EPS ODC system in the case of materialization of cyber threats are identified. A model of cyber resilience of the EPS ODC system is proposed. An algorithm for assessing the cyber resilience of the EPS ODC system is developed factoring in the cybersecurity risks.
研究目标是开发一种算法,用于评估电力系统(EPS)运行调度控制(ODC)系统在数据收集、处理和传输系统遭受网络攻击时的网络弹性。研究方法包括概率方法、模糊集理论方法和EPS可靠性分析方法。研究结果:分析了网络攻击对EPS ODC系统功能的影响。确定了在网络威胁实现的情况下,确保EPS ODC系统网络弹性的因素。提出了EPS ODC系统的网络弹性模型。提出了一种考虑网络安全风险的EPS ODC系统网络弹性评估算法。
{"title":"Assessment of Cyber Resilience of Operational Dispatch Control System of EPS","authors":"L. Gurina","doi":"10.21681/2311-3456-2022-3-23-31","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-3-23-31","url":null,"abstract":"The research objective is to develop an algorithm for assessing the cyber resilience of the operational dispatch control (ODC) system of electric power system (EPS) during cyberattacks on data collecting, processing, and transmitting systems. The research methods include the probabilistic methods, fuzzy set theory methods, and methods of EPS reliability analysis. Result of the research: the impact of cyberattacks on the functionality of the EPS ODC system is analyzed. The factors ensuring the cyber resilience of the EPS ODC system in the case of materialization of cyber threats are identified. A model of cyber resilience of the EPS ODC system is proposed. An algorithm for assessing the cyber resilience of the EPS ODC system is developed factoring in the cybersecurity risks.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114749315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Penetration Testing in Accordance with NIST SP 800-115 Standard 按照NIST SP 800-115标准进行渗透测试
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-3-44-57
S. Makarenko
Relevance. Security issues of information systems in critical infrastructure objects become important now. However, current tasks of information security audit of critical infrastructure objects are mainly limited to checking them for compliance with requirements of standards and documents. With this approach to the audit, security of these objects from real attacks by hackers remains unclear. Therefore, objects are subjected to a testing procedure, namely, penetration testing, in order to objectively verify their security. For example, there are instructions of the Bank of Russia to carry out such testing when the information security of banking systems are checked. However, there is no formal national standard for conducting penetration testing in Russia. This is the deterrent factor to testing critical infrastructure objects. The goal of the paper is to analysis of the American testing standard – NIST SP 800-115 to estimate the possibility of its used for development of the Russian national penetration testing standard. Research methods. Methods of analysis and decomposition from the theory of system analysis are used in the paper to achieve the research goal. Results. In-depth analysis of the NIST SP 800-115 standard is provided in the paper. The following are considered: types of information security assessment measures; stages of information security assessment; methods of analysis and testing which used in the assessment of information security; types and sequence of penetration testing; tested vulnerabilities; recommended tools for analysis and testing, are presented in NIST SP 800-11. Conclusions about the strengths and weaknesses of the NIST SP 800-115 standard are made. Recommendations about as NIST SP 800-115 is used in the development of the national Russian standard of penetration testing are presented.
的相关性。关键基础设施对象信息系统的安全问题日益重要。然而,目前对关键基础设施对象的信息安全审计任务主要局限于检查其是否符合标准和文档的要求。使用这种审计方法,这些对象免受黑客实际攻击的安全性仍然不清楚。因此,为了客观地验证对象的安全性,需要对对象进行测试过程,即渗透测试。例如,在检查银行系统的信息安全时,俄罗斯银行指示进行此类测试。然而,在俄罗斯没有进行渗透测试的正式国家标准。这是测试关键基础设施对象的威慑因素。本文的目的是分析美国测试标准NIST SP 800-115,以评估其用于俄罗斯国家渗透测试标准制定的可能性。研究方法。本文采用了系统分析理论中的分析和分解方法来实现研究目标。结果。本文对NIST SP 800-115标准进行了深入分析。考虑以下内容:信息安全评估措施的类型;信息安全评估的阶段;用于信息安全评估的分析和测试方法;渗透测试的种类和顺序;测试漏洞;推荐的分析和测试工具,在NIST SP 800-11中提出。总结了NIST SP 800-115标准的优缺点。提出了在制定俄罗斯渗透测试国家标准时采用NIST SP 800-115的建议。
{"title":"Penetration Testing in Accordance with NIST SP 800-115 Standard","authors":"S. Makarenko","doi":"10.21681/2311-3456-2022-3-44-57","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-3-44-57","url":null,"abstract":"Relevance. Security issues of information systems in critical infrastructure objects become important now. However, current tasks of information security audit of critical infrastructure objects are mainly limited to checking them for compliance with requirements of standards and documents. With this approach to the audit, security of these objects from real attacks by hackers remains unclear. Therefore, objects are subjected to a testing procedure, namely, penetration testing, in order to objectively verify their security. For example, there are instructions of the Bank of Russia to carry out such testing when the information security of banking systems are checked. However, there is no formal national standard for conducting penetration testing in Russia. This is the deterrent factor to testing critical infrastructure objects. The goal of the paper is to analysis of the American testing standard – NIST SP 800-115 to estimate the possibility of its used for development of the Russian national penetration testing standard. Research methods. Methods of analysis and decomposition from the theory of system analysis are used in the paper to achieve the research goal. Results. In-depth analysis of the NIST SP 800-115 standard is provided in the paper. The following are considered: types of information security assessment measures; stages of information security assessment; methods of analysis and testing which used in the assessment of information security; types and sequence of penetration testing; tested vulnerabilities; recommended tools for analysis and testing, are presented in NIST SP 800-11. Conclusions about the strengths and weaknesses of the NIST SP 800-115 standard are made. Recommendations about as NIST SP 800-115 is used in the development of the national Russian standard of penetration testing are presented.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"66 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128024369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Fraudal Schemes When Publicating Articles in Scientific Journals 在科技期刊上发表文章时的欺诈行为分析
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-5-12-18
Y. Lavrich, Alexey Los
{"title":"Analysis of Fraudal Schemes When Publicating Articles in Scientific Journals","authors":"Y. Lavrich, Alexey Los","doi":"10.21681/2311-3456-2019-5-12-18","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-5-12-18","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132487178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensuring the Resistance of Critical Information Infrastructure Objects to Advanced Persistent Threats 确保关键信息基础设施对象抵御高级持续性威胁
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-2-39-51
A. Lapsar’, Sergey Nazaryan, Alisa Vladimirova
The purpose of the study: to improve security of significant objects of critical information infrastructure in conditions of destructive information impact, implemented in the form of advanced persistent threat (APT). Methods: comparative analysis of destructive information impact within the framework of a systematic approach; Markov theory of evolutionary processes; synergetics. Results: the authors carried out analysis of APT properties and their impact on objects of critical information infrastructure. To identify APTs, the use of a combination of various detection methods with the priority of heuristic analysis is substantiated. A scheme has been developed for the implementation of the method for assessing the state of an object of a critical information infrastructure based on a modified Markov-parametric model with a system for detecting computer attacks integrated into its structure. The preliminary assessment of computer attacks danger level as well as development of recommendations for their neutralization simultaneously with conducting the assessment of the properties and characteristics of destructive information impact are proposed.
该研究的目的是:在破坏性信息影响的情况下,以高级持续威胁(APT)的形式实施,提高关键信息基础设施重要对象的安全性。方法:在系统方法的框架内对破坏性信息影响进行比较分析;马尔可夫进化过程理论;协同学。结果:分析了APT的特性及其对关键信息基础设施对象的影响。为了识别apt,使用各种检测方法的组合与启发式分析的优先级被证实。基于改进的马尔可夫参数模型,开发了一种方案,用于实现评估关键信息基础设施对象状态的方法,并将检测计算机攻击的系统集成到其结构中。提出了计算机攻击危险水平的初步评估以及在进行破坏性信息影响的性质和特征评估的同时制定消除计算机攻击的建议。
{"title":"Ensuring the Resistance of Critical Information Infrastructure Objects to Advanced Persistent Threats","authors":"A. Lapsar’, Sergey Nazaryan, Alisa Vladimirova","doi":"10.21681/2311-3456-2022-2-39-51","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-2-39-51","url":null,"abstract":"The purpose of the study: to improve security of significant objects of critical information infrastructure in conditions of destructive information impact, implemented in the form of advanced persistent threat (APT). Methods: comparative analysis of destructive information impact within the framework of a systematic approach; Markov theory of evolutionary processes; synergetics. Results: the authors carried out analysis of APT properties and their impact on objects of critical information infrastructure. To identify APTs, the use of a combination of various detection methods with the priority of heuristic analysis is substantiated. A scheme has been developed for the implementation of the method for assessing the state of an object of a critical information infrastructure based on a modified Markov-parametric model with a system for detecting computer attacks integrated into its structure. The preliminary assessment of computer attacks danger level as well as development of recommendations for their neutralization simultaneously with conducting the assessment of the properties and characteristics of destructive information impact are proposed.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134408396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward to Information Security of AI-Enhanced Weapons 人工智能增强型武器信息安全研究
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-5-5-11
V. Gribunin, S. Kondakov
Purpose of the article: Analysis of intellectualized weapons using machine learning from the point of view of information security. Development of proposals for the deployment of work in the field of information security in similar products. Research method: System analysis of machine learning systems as objects of protection. Determination on the basis of the analysis of rational priority directions for improving these systems in terms of ensuring information security. Obtained result: New threats to information security arising from the use of weapons and military equipment with elements of artificial intelligence are presented. Machine learning systems are considered by the authors as an object of protection, which made it possible to determine the protected assets of such systems, their vulnerabilities, threats and possible attacks on them. The article analyzes the measures to neutralize the identified threats based on the taxonomy proposed by the US National Institute of Standards and Technology. The insufficiency of the existing regulatory methodological framework in the field of information protection to ensure the security of machine learning systems has been determined. An approach is proposed that should be used in the development and security assessment of systems using machine learning. Proposals for the deployment of work in the field of ensuring the security of intelligent weapons using machine learning technologies are presented.
本文目的:从信息安全的角度分析使用机器学习的智能化武器。为在类似产品中部署信息安全领域的工作提出建议。研究方法:系统分析机器学习系统作为保护对象。在分析的基础上,确定从保障信息安全的角度出发,完善这些系统的合理优先方向。获得的结果:提出了使用具有人工智能元素的武器和军事装备对信息安全造成的新威胁。机器学习系统被作者认为是一个保护对象,这使得确定这些系统的受保护资产、它们的漏洞、威胁和可能的攻击成为可能。本文根据美国国家标准与技术研究所提出的分类,分析了消除已识别威胁的措施。现有的监管方法框架在信息保护领域的不足,以确保机器学习系统的安全性已经确定。提出了一种应该用于使用机器学习的系统的开发和安全评估的方法。提出了在使用机器学习技术确保智能武器安全领域开展工作的建议。
{"title":"Toward to Information Security of AI-Enhanced Weapons","authors":"V. Gribunin, S. Kondakov","doi":"10.21681/2311-3456-2021-5-5-11","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-5-5-11","url":null,"abstract":"Purpose of the article: Analysis of intellectualized weapons using machine learning from the point of view of information security. Development of proposals for the deployment of work in the field of information security in similar products. Research method: System analysis of machine learning systems as objects of protection. Determination on the basis of the analysis of rational priority directions for improving these systems in terms of ensuring information security. Obtained result: New threats to information security arising from the use of weapons and military equipment with elements of artificial intelligence are presented. Machine learning systems are considered by the authors as an object of protection, which made it possible to determine the protected assets of such systems, their vulnerabilities, threats and possible attacks on them. The article analyzes the measures to neutralize the identified threats based on the taxonomy proposed by the US National Institute of Standards and Technology. The insufficiency of the existing regulatory methodological framework in the field of information protection to ensure the security of machine learning systems has been determined. An approach is proposed that should be used in the development and security assessment of systems using machine learning. Proposals for the deployment of work in the field of ensuring the security of intelligent weapons using machine learning technologies are presented.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134594739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CELLULAR AUTOMATA AND THEIR GENERALIZATIONS IN CRYPTOGRAPHY. PART 2. 元胞自动机及其在密码学中的推广。第2部分。
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-1-37-48
P. Klyucharev
The purpose of the article is an analytical review of the application of cellular automata and their generalizations in cryptography. Research method: an analysis of scientific publications on the topic of the article. Results: The review article analyzes the literature devoted to the use of cellular automata and their generalizations for the construction of cryptographic algorithms. The article consists of two parts. The first part was devoted to classical cellular automata and symmetric cryptographic algorithms based on them. It briefly discussed the history of the theory of cellular automata and its application in various scientific fields. A review of the works of a number of authors who proposed symmetric cryptographic algorithms and pseudorandom sequence generators based on one-dimensional cellular automata was presented. The security of such cryptographic algorithms turned out to be insufficient. The following was a review of articles devoted to the use of two-dimensional cellular automata for constructing ciphers (this approach gave the best results). Multidimensional cellular automata were also mentioned. This second part of the article is devoted to a review of works devoted to the use of generalized cellular automata in cryptography – on the basis of such automata, it is possible to create symmetric encryption algorithms and cryptographic hash functions that provide a high level of security and high performance in hardware implementation (for example, on FPGA), as well as having fairly low requirements for hardware resources. In addition, an attention is paid to interesting connections of generalized cellular automata, in the context of their use in cryptography, with the theory of expander graphs. Attention is also paid to the security of cryptographic algorithms based on generalized cellular automata. The works devoted to the implementation of various cryptographic algorithms based on generalized cellular automata on FPGA and GPU are mentioned. In addition, an overview of asymmetric cryptoalgorithms based on cellular automata is given. The questions about the belonging of some problems on cellular automata and their generalizations to the class of NP-complete problems, as well as to some other complexity classes, are also considered.
本文的目的是对元胞自动机及其在密码学中的应用进行分析综述。研究方法:分析科学出版物上关于该主题的文章。结果:本文分析了有关元胞自动机及其在构造密码算法中的推广的文献。本文由两部分组成。第一部分介绍了经典元胞自动机和基于它们的对称密码算法。简要讨论了元胞自动机理论的发展历史及其在各个科学领域的应用。综述了一些作者提出的基于一维元胞自动机的对称密码算法和伪随机序列生成器的工作。这种加密算法的安全性是不够的。下面是关于使用二维元胞自动机构造密码的文章的综述(这种方法的结果最好)。多维元胞自动机也被提到。本文的第二部分专门回顾了在密码学中使用广义元细胞自动机的相关工作——在这种自动机的基础上,可以创建对称加密算法和加密散列函数,这些算法和散列函数在硬件实现(例如在FPGA上)中提供了高级别的安全性和高性能,并且对硬件资源的要求相当低。此外,本文还关注了广义元胞自动机在密码学中的应用与展开图理论之间的有趣联系。本文还对基于广义元胞自动机的密码算法的安全性进行了研究。介绍了在FPGA和GPU上实现各种基于广义元胞自动机的密码算法的工作。此外,对基于元胞自动机的非对称密码算法进行了综述。讨论了元胞自动机上一些问题的归属问题,以及它们在np完全问题和其他复杂性类中的推广问题。
{"title":"CELLULAR AUTOMATA AND THEIR GENERALIZATIONS IN CRYPTOGRAPHY. PART 2.","authors":"P. Klyucharev","doi":"10.21681/2311-3456-2022-1-37-48","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-1-37-48","url":null,"abstract":"The purpose of the article is an analytical review of the application of cellular automata and their generalizations in cryptography. Research method: an analysis of scientific publications on the topic of the article. Results: The review article analyzes the literature devoted to the use of cellular automata and their generalizations for the construction of cryptographic algorithms. The article consists of two parts. The first part was devoted to classical cellular automata and symmetric cryptographic algorithms based on them. It briefly discussed the history of the theory of cellular automata and its application in various scientific fields. A review of the works of a number of authors who proposed symmetric cryptographic algorithms and pseudorandom sequence generators based on one-dimensional cellular automata was presented. The security of such cryptographic algorithms turned out to be insufficient. The following was a review of articles devoted to the use of two-dimensional cellular automata for constructing ciphers (this approach gave the best results). Multidimensional cellular automata were also mentioned. This second part of the article is devoted to a review of works devoted to the use of generalized cellular automata in cryptography – on the basis of such automata, it is possible to create symmetric encryption algorithms and cryptographic hash functions that provide a high level of security and high performance in hardware implementation (for example, on FPGA), as well as having fairly low requirements for hardware resources. In addition, an attention is paid to interesting connections of generalized cellular automata, in the context of their use in cryptography, with the theory of expander graphs. Attention is also paid to the security of cryptographic algorithms based on generalized cellular automata. The works devoted to the implementation of various cryptographic algorithms based on generalized cellular automata on FPGA and GPU are mentioned. In addition, an overview of asymmetric cryptoalgorithms based on cellular automata is given. The questions about the belonging of some problems on cellular automata and their generalizations to the class of NP-complete problems, as well as to some other complexity classes, are also considered.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133546554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Voprosy kiberbezopasnosti
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1