首页 > 最新文献

Voprosy kiberbezopasnosti最新文献

英文 中文
Modeling of APT-Attacks Exploiting the Zerologon Vulnerability 利用Zerologon漏洞的apt攻击建模
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-6-47-61
Sergey A. Budnikov, Ekaterina Butrik, S. Soloviev
Purpose: the need to assess the effectiveness of the security systems for significant objects of critical information infrastructure determines the need to develop simple and adequate mathematical models of computer attacks. The use of mathematical modeling methods in the design of security system of significant object allows without significant cost and impact on the functioning of the object to justify the requirements to the system as a whole or its individual parts. The purpose of the present paper is to develop a model of the process of multistage targeted computer attack that exploits the Zerologon vulnerability, based on the representation of the attack by a Markov random process with discrete states and continuous time. Methods: methods of Markov process theory, probability theory, computational mathematics and graph theory are used in the model to formalize the attack. Novelty: application of methods of computational mathematics for functional analysis of the results of Kolmogorov’s system of equations allows to solve the problem of maximizing the time of stable operation of critical information infrastructure during computer attacks against it, using the known methods of analysis of continuous functions. Result: formulated a general statement of the problem of modeling the process of a multistage targeted computer attack using a system of Kolmogorov equations, describing the probabilities of being in conflict states of the security system with the intruder. By the Adams method implemented in Mathcad environment, numerical solutions depending on time were obtained. We introduce a security system performance index as a ratio of probability of triggering the security system and blocking intruder’s actions during the attack to the probability of successful completion of the attack. We give an example of research of computer attack realization in a typical information infrastructure, including a corporate network with domain architecture and an automated control system of some technological process. 1 For the considered example defined the optimal values of time parameters of security system. When implementing protective measures with reasonable probabilistic-time characteristics proved an increase in time of stable operation of critical information infrastructure from 11 to 189 hours.
目的:评估关键信息基础设施重要对象的安全系统有效性的需要决定了开发简单和适当的计算机攻击数学模型的需要。在重要对象的安全系统设计中使用数学建模方法,可以在不产生重大成本和对对象功能影响的情况下,证明对整个系统或其各个部分的要求是合理的。本文的目的是建立一个利用Zerologon漏洞的多阶段目标计算机攻击过程模型,该模型基于具有离散状态和连续时间的马尔可夫随机过程的攻击表示。方法:在模型中运用马尔可夫过程理论、概率论、计算数学和图论等方法对攻击进行形式化。新颖性:应用计算数学方法对Kolmogorov方程组的结果进行泛函分析,利用已知的连续函数分析方法,可以解决计算机攻击关键信息基础设施时最大限度地稳定运行时间的问题。结果:用柯尔莫哥洛夫方程系统,描述了安全系统与入侵者处于冲突状态的概率,对多阶段目标计算机攻击过程的建模问题,提出了一个一般性的表述。利用在Mathcad环境下实现的Adams方法,得到了随时间变化的数值解。我们引入了一个安全系统性能指标,作为在攻击期间触发安全系统和阻止入侵者动作的概率与成功完成攻击的概率之比。本文给出了一个典型信息基础设施中计算机攻击实现的研究实例,该基础设施包括具有域结构的企业网络和一些工艺过程的自动化控制系统。对于所考虑的示例,定义了安全系统时间参数的最优值。实施合理的概率-时间特征保护措施后,关键信息基础设施的稳定运行时间从11小时增加到189小时。
{"title":"Modeling of APT-Attacks Exploiting the Zerologon Vulnerability","authors":"Sergey A. Budnikov, Ekaterina Butrik, S. Soloviev","doi":"10.21681/2311-3456-2021-6-47-61","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-6-47-61","url":null,"abstract":"Purpose: the need to assess the effectiveness of the security systems for significant objects of critical information infrastructure determines the need to develop simple and adequate mathematical models of computer attacks. The use of mathematical modeling methods in the design of security system of significant object allows without significant cost and impact on the functioning of the object to justify the requirements to the system as a whole or its individual parts. The purpose of the present paper is to develop a model of the process of multistage targeted computer attack that exploits the Zerologon vulnerability, based on the representation of the attack by a Markov random process with discrete states and continuous time. Methods: methods of Markov process theory, probability theory, computational mathematics and graph theory are used in the model to formalize the attack. Novelty: application of methods of computational mathematics for functional analysis of the results of Kolmogorov’s system of equations allows to solve the problem of maximizing the time of stable operation of critical information infrastructure during computer attacks against it, using the known methods of analysis of continuous functions. Result: formulated a general statement of the problem of modeling the process of a multistage targeted computer attack using a system of Kolmogorov equations, describing the probabilities of being in conflict states of the security system with the intruder. By the Adams method implemented in Mathcad environment, numerical solutions depending on time were obtained. We introduce a security system performance index as a ratio of probability of triggering the security system and blocking intruder’s actions during the attack to the probability of successful completion of the attack. We give an example of research of computer attack realization in a typical information infrastructure, including a corporate network with domain architecture and an automated control system of some technological process. 1 For the considered example defined the optimal values of time parameters of security system. When implementing protective measures with reasonable probabilistic-time characteristics proved an increase in time of stable operation of critical information infrastructure from 11 to 189 hours.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132143669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modern GPGPU Alternative Perspective Universal and Specialized Processors-Accelerators 现代GPGPU替代视角通用和专用处理器加速器
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-4-13-21
A. Adamov, P. Pavlukhin, Dmitriy Bikonov, Alexey Eisymont, L. Eisymont
{"title":"Modern GPGPU Alternative Perspective Universal and Specialized Processors-Accelerators","authors":"A. Adamov, P. Pavlukhin, Dmitriy Bikonov, Alexey Eisymont, L. Eisymont","doi":"10.21681/2311-3456-2019-4-13-21","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-4-13-21","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115376716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PREDICTION OF THE PROFILE FUNCTIONING OF A COMPUTER SYSTEM BASED ON MULTIVALUED PATTERNS 基于多值模式的计算机系统的轮廓功能预测
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-6-53-70
O. Sheluhin, D. Rakovskiy
Purpose of work is to create a new algorithm for predicting anomalous states of computer systems (CS) using the mathematical apparatus of multivalued dependencies (Multivalued Dependencies Prognosus Algorithm, MDPA), which are categorical concepts. The research method is the analysis of historical data using the mathematical apparatus of multivalued dependencies. Objects of study are theoretical and practical issues of solving and visualizing information security problems. Results of the study. A methodology and algorithm for predicting the state of CS have been developed. The boundaries of the input parameters of the algorithm are derived and justified. The boundaries of the input parameters need to be pre-configured for the correct generation of the prognosis. A software implementation of the proposed prediction algorithm has been developed. The efficiency of the algorithm has been tested on real experimental data. A spatial analysis of the prediction results was carried out. The main disadvantage of the proposed algorithm is the need to fine-tune the input parameters for each set of “historical data”. Scientific significance. The scope of application of multivalued dependencies has been expanded; a new algorithm for predicting anomalous states of CS, which are categorical concepts, has been proposed. The developed prediction algorithm can be generalized to any subject area containing historical data of any type
工作的目的是创建一个新的算法来预测计算机系统的异常状态(CS)使用多值依赖的数学装置(多值依赖预测算法,MDPA),这是一个范畴概念。研究方法是利用多值依赖关系的数学装置对历史数据进行分析。研究对象是解决和可视化信息安全问题的理论和实践问题。研究结果。本文提出了一种预测CS状态的方法和算法。推导并证明了算法输入参数的边界。为了正确生成预测,需要预先配置输入参数的边界。提出了一种预测算法的软件实现。在实际实验数据上验证了该算法的有效性。对预测结果进行了空间分析。该算法的主要缺点是需要对每组“历史数据”的输入参数进行微调。科学意义。多值依赖关系的应用范围得到了扩展;提出了一种预测CS异常状态的新算法,CS异常状态属于范畴概念。所开发的预测算法可以推广到包含任何类型历史数据的任何主题领域
{"title":"PREDICTION OF THE PROFILE FUNCTIONING OF A COMPUTER SYSTEM BASED ON MULTIVALUED PATTERNS","authors":"O. Sheluhin, D. Rakovskiy","doi":"10.21681/2311-3456-2022-6-53-70","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-6-53-70","url":null,"abstract":"Purpose of work is to create a new algorithm for predicting anomalous states of computer systems (CS) using the mathematical apparatus of multivalued dependencies (Multivalued Dependencies Prognosus Algorithm, MDPA), which are categorical concepts. The research method is the analysis of historical data using the mathematical apparatus of multivalued dependencies. Objects of study are theoretical and practical issues of solving and visualizing information security problems. Results of the study. A methodology and algorithm for predicting the state of CS have been developed. The boundaries of the input parameters of the algorithm are derived and justified. The boundaries of the input parameters need to be pre-configured for the correct generation of the prognosis. A software implementation of the proposed prediction algorithm has been developed. The efficiency of the algorithm has been tested on real experimental data. A spatial analysis of the prediction results was carried out. The main disadvantage of the proposed algorithm is the need to fine-tune the input parameters for each set of “historical data”. Scientific significance. The scope of application of multivalued dependencies has been expanded; a new algorithm for predicting anomalous states of CS, which are categorical concepts, has been proposed. The developed prediction algorithm can be generalized to any subject area containing historical data of any type","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116910476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Development of the Faculty of Integrated Safety of Fuel and Energy Complex in the Context of Changes in the Industry and the Country 工业和国家变化背景下燃料和能源综合安全学院的发展
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-3-4-10
S. Grinyaev, O. Mishina, I. Samarin
{"title":"Development of the Faculty of Integrated Safety of Fuel and Energy Complex in the Context of Changes in the Industry and the Country","authors":"S. Grinyaev, O. Mishina, I. Samarin","doi":"10.21681/2311-3456-2019-3-4-10","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-3-4-10","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122142881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Problem Issues of the Application of Security Analytical Means of Cyber-Physical Systems of FEC Enterprises FEC企业网络物理系统安全分析手段应用的问题与问题
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-5-26-33
N. Nashivochnikov, Gazinformservice Llc, A. Bolshakov, Yuri Nikolashin, A. Lukashin
{"title":"Problem Issues of the Application of Security Analytical Means of Cyber-Physical Systems of FEC Enterprises","authors":"N. Nashivochnikov, Gazinformservice Llc, A. Bolshakov, Yuri Nikolashin, A. Lukashin","doi":"10.21681/2311-3456-2019-5-26-33","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-5-26-33","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117180820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modern Trends of Cyber-Threats and Transformation of the Concept of Cybersecurity in the Conditions of Digitalization of the System of Law 法律体系数字化条件下网络威胁的现代趋势与网络安全观念的转变
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-3-18-23
Alexander Karzhia, G. Makarenko, Mikhail Sergin, Fbu Scli
{"title":"Modern Trends of Cyber-Threats and Transformation of the Concept of Cybersecurity in the Conditions of Digitalization of the System of Law","authors":"Alexander Karzhia, G. Makarenko, Mikhail Sergin, Fbu Scli","doi":"10.21681/2311-3456-2019-3-18-23","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-3-18-23","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125987400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Model for Quantifying the Agent of a Complex Network in Conditions of Incomplete Awareness 不完全意识条件下复杂网络主体的量化模型
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-6-26-35
A. Kalashnikov, Konstantin Bugajskij
Purpose of the article: development of a mechanism for quantitative evaluation of elements of complex information systems in conditions of insufficient information about the presence of vulnerabilities. Research method: mathematical modeling of uncertainty estimation based on binary convolution and Kolmogorov complexity. Data banks on vulnerabilities and weaknesses are used as initial data for modeling. The result: it is shown that the operation of an element of a complex network can be represented by data transformation procedures, which consist of a sequence of operations in time, described by weaknesses and related vulnerabilities. Each operation can be evaluated at a qualitative level in terms of the severity of the consequences in the event of the implementation of potential weaknesses. The use of binary convolution and universal coding makes it possible to translate qualitative estimates into a binary sequence – a word in the alphabet {0,1}. The sequence of such words — as the uncertainty function — describes the possible negative consequences of implementing data transformation procedures due to the presence of weaknesses in an element of a complex system. It is proposed to use the Kolmogorov complexity to quantify the uncertainty function. The use of a Turing machine for calculating the uncertainty function provides a universal mechanism for evaluating elements of complex information systems from the point of view of information security, regardless of their software and hardware implementation.
本文的目的:开发一种机制,在关于脆弱性存在的信息不足的情况下对复杂信息系统的要素进行定量评估。研究方法:基于二元卷积和Kolmogorov复杂度的不确定性估计数学建模。利用漏洞和弱点数据库作为建模的初始数据。结果表明,复杂网络中某一元素的操作可以用数据转换过程来表示,数据转换过程由一系列时间上的操作组成,这些操作由弱点和相关漏洞描述。在执行潜在弱点的情况下,可以根据后果的严重程度在质量一级对每项行动进行评估。使用二进制卷积和通用编码可以将定性估计转换为二进制序列-字母表中的一个单词{0,1}。这些词的序列——如不确定性函数——描述了由于复杂系统中某个元素存在弱点而实施数据转换过程可能产生的负面后果。提出了用Kolmogorov复杂度来量化不确定性函数的方法。使用图灵机计算不确定性函数提供了一种从信息安全的角度评估复杂信息系统元素的通用机制,而不管它们的软件和硬件实现如何。
{"title":"A Model for Quantifying the Agent of a Complex Network in Conditions of Incomplete Awareness","authors":"A. Kalashnikov, Konstantin Bugajskij","doi":"10.21681/2311-3456-2021-6-26-35","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-6-26-35","url":null,"abstract":"Purpose of the article: development of a mechanism for quantitative evaluation of elements of complex information systems in conditions of insufficient information about the presence of vulnerabilities. Research method: mathematical modeling of uncertainty estimation based on binary convolution and Kolmogorov complexity. Data banks on vulnerabilities and weaknesses are used as initial data for modeling. The result: it is shown that the operation of an element of a complex network can be represented by data transformation procedures, which consist of a sequence of operations in time, described by weaknesses and related vulnerabilities. Each operation can be evaluated at a qualitative level in terms of the severity of the consequences in the event of the implementation of potential weaknesses. The use of binary convolution and universal coding makes it possible to translate qualitative estimates into a binary sequence – a word in the alphabet {0,1}. The sequence of such words — as the uncertainty function — describes the possible negative consequences of implementing data transformation procedures due to the presence of weaknesses in an element of a complex system. It is proposed to use the Kolmogorov complexity to quantify the uncertainty function. The use of a Turing machine for calculating the uncertainty function provides a universal mechanism for evaluating elements of complex information systems from the point of view of information security, regardless of their software and hardware implementation.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127132493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Draft of the Third National Standard of Russia for Fast Automatic Learning of Large Correlation Neural Networks on Small Training Samples of Biometric Data 俄罗斯生物特征数据小样本快速自动学习大相关神经网络国家标准第三稿
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-3-84-93
A. Ivanov, A. Sulavko
The aim of the study is to show that a biometrics-to-access code converter based on large networks of correlation neurons makes it possible to obtain an even longer key at the output while ensuring the protection of biometric data from compromise. The research method is the use of large «wide» neural networks with automatic learning for the implementation of the biometric authentication procedure, ensuring the protection of biometric personal data from compromise. Results of the study - the first national standard GOST R 52633.5 for the automatic training of neuron networks was focused only on a physically secure, trusted computing environment. The protection of the parameters of the trained neural network converters biometrics-code using cryptographic methods led to the need to use short keys and passwords for biometric-cryptographic authentication. It is proposed to build special correlation neurons in the meta-space of Bayes-Minkowski features of a higher dimension. An experiment was carried out to verify the patterns of kkeystroke dynamics using a biometrics-to-code converter based on the data set of the AIConstructor project. In the meta-space of features, the probability of a verification error turned out to be less (EER = 0.0823) than in the original space of features (EER = 0.0864), while in the protected execution mode of the biometrics-to-code converter, the key length can be increased by more than 19 times. Experiments have shown that the transition to the mat space of BayesMinkowski features does not lead to the manifestation of the “curse of dimension” problem if some of the original features have a noticeable or strong mutual correlation. The problem of ensuring the confidentiality of the parameters of trained neural network containers, from which the neural network converter biometrics-code is formed, is relevant not only for biometric authentication tasks. It seems possible to develop a standard for protecting artificial intelligence based on automatically trained networks of Bayesian-Minkowski correlation neurons.
该研究的目的是证明基于大型相关神经元网络的生物识别-访问代码转换器可以在确保保护生物识别数据不受损害的同时,在输出处获得更长的密钥。研究方法是使用具有自动学习的大型“宽”神经网络来实施生物识别认证程序,确保保护生物识别个人数据不受损害。研究结果-神经元网络自动训练的首个国家标准GOST R 52633.5仅关注物理安全,可信的计算环境。使用加密方法保护训练好的神经网络转换器的参数,导致需要使用短密钥和密码进行生物识别密码认证。提出在高维贝叶斯-闵可夫斯基特征元空间中构建特殊的相关神经元。基于AIConstructor项目的数据集,利用生物特征-代码转换器对击键动力学模式进行了验证实验。在特征元空间中,验证错误的概率(EER = 0.0823)小于原始特征元空间(EER = 0.0864),而在生物特征码转换器的受保护执行模式下,密钥长度可以增加19倍以上。实验表明,如果一些原始特征具有明显或较强的相互相关性,那么BayesMinkowski特征向垫子空间的过渡不会导致“维度诅咒”问题的表现。神经网络转换器生物识别码就是由训练好的神经网络容器构成的,如何保证容器参数的保密性不仅与生物识别认证任务有关。基于贝叶斯-闵可夫斯基相关神经元的自动训练网络,开发一种保护人工智能的标准似乎是可能的。
{"title":"Draft of the Third National Standard of Russia for Fast Automatic Learning of Large Correlation Neural Networks on Small Training Samples of Biometric Data","authors":"A. Ivanov, A. Sulavko","doi":"10.21681/2311-3456-2021-3-84-93","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-3-84-93","url":null,"abstract":"The aim of the study is to show that a biometrics-to-access code converter based on large networks of correlation neurons makes it possible to obtain an even longer key at the output while ensuring the protection of biometric data from compromise. The research method is the use of large «wide» neural networks with automatic learning for the implementation of the biometric authentication procedure, ensuring the protection of biometric personal data from compromise. Results of the study - the first national standard GOST R 52633.5 for the automatic training of neuron networks was focused only on a physically secure, trusted computing environment. The protection of the parameters of the trained neural network converters biometrics-code using cryptographic methods led to the need to use short keys and passwords for biometric-cryptographic authentication. It is proposed to build special correlation neurons in the meta-space of Bayes-Minkowski features of a higher dimension. An experiment was carried out to verify the patterns of kkeystroke dynamics using a biometrics-to-code converter based on the data set of the AIConstructor project. In the meta-space of features, the probability of a verification error turned out to be less (EER = 0.0823) than in the original space of features (EER = 0.0864), while in the protected execution mode of the biometrics-to-code converter, the key length can be increased by more than 19 times. Experiments have shown that the transition to the mat space of BayesMinkowski features does not lead to the manifestation of the “curse of dimension” problem if some of the original features have a noticeable or strong mutual correlation. The problem of ensuring the confidentiality of the parameters of trained neural network containers, from which the neural network converter biometrics-code is formed, is relevant not only for biometric authentication tasks. It seems possible to develop a standard for protecting artificial intelligence based on automatically trained networks of Bayesian-Minkowski correlation neurons.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132435929","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Assessment of Cyber Resilience Indices of Information Collection and Processing Systems in Electric Power Systems Based on Semi-Markov Models 基于半马尔可夫模型的电力系统信息采集与处理系统网络弹性指标评估
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-6-2-11
I. Kolosok, L. Gurina
Purpose of the study: The study aims to design an algorithm for determining the cyber resilience indices of information collection, transmission, and processing systems (SCADA, WAMS) to control electric power systems. This algorithm makes it possible to factor in possible states and measures to restore such systems when cyber resilience is lost. Research methods include the probability theory, methods of power system reliability analysis, and Markov methods. Result of the research: The analysis of the reliability of WAMS, which is necessary for assessing the cyber resilience of the EPS, has been carried out. A cyber resilience model is proposed, on the basis of which an algorithm for determining the cyber resilience index of SCADA, WAMS systems with a low quality of measurement information used in EPS control has been developed. To take into account possible states of SCADA, WAMS systems and measures for their restoration (detection, mitigation and response) in case of violation of cyber resilience, the algorithm uses the tools of probability theory and Markov methods. The effectiveness of the application of the developed algorithm is confirmed by the example of calculating the WAMS cyber resilience index with a low quality of PMU data. The results obtained can be useful in making decisions on the formation of control actions on the EPS to ensure its cybersecurity in the context of cyber-attacks on information collection, transmission, and processing systems.
研究目的:设计一种用于控制电力系统的信息采集、传输和处理系统(SCADA、WAMS)的网络弹性指标确定算法。当网络恢复能力丧失时,该算法可以考虑可能的状态和恢复此类系统的措施。研究方法包括概率论、电力系统可靠性分析方法和马尔可夫方法。研究结果:对WAMS的可靠性进行了分析,这是评估EPS网络弹性所必需的。提出了一种网络弹性模型,在此基础上提出了一种确定EPS控制中测量信息质量较低的SCADA、WAMS系统网络弹性指数的算法。考虑到SCADA、WAMS系统的可能状态以及在违反网络弹性的情况下恢复(检测、缓解和响应)的措施,该算法使用概率论和马尔可夫方法工具。通过低质量PMU数据的WAMS网络弹性指数计算实例,验证了该算法应用的有效性。所得结果可用于在信息收集、传输和处理系统受到网络攻击的情况下,对EPS进行控制动作的形成决策,以确保其网络安全。
{"title":"Assessment of Cyber Resilience Indices of Information Collection and Processing Systems in Electric Power Systems Based on Semi-Markov Models","authors":"I. Kolosok, L. Gurina","doi":"10.21681/2311-3456-2021-6-2-11","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-6-2-11","url":null,"abstract":"Purpose of the study: The study aims to design an algorithm for determining the cyber resilience indices of information collection, transmission, and processing systems (SCADA, WAMS) to control electric power systems. This algorithm makes it possible to factor in possible states and measures to restore such systems when cyber resilience is lost. Research methods include the probability theory, methods of power system reliability analysis, and Markov methods. Result of the research: The analysis of the reliability of WAMS, which is necessary for assessing the cyber resilience of the EPS, has been carried out. A cyber resilience model is proposed, on the basis of which an algorithm for determining the cyber resilience index of SCADA, WAMS systems with a low quality of measurement information used in EPS control has been developed. To take into account possible states of SCADA, WAMS systems and measures for their restoration (detection, mitigation and response) in case of violation of cyber resilience, the algorithm uses the tools of probability theory and Markov methods. The effectiveness of the application of the developed algorithm is confirmed by the example of calculating the WAMS cyber resilience index with a low quality of PMU data. The results obtained can be useful in making decisions on the formation of control actions on the EPS to ensure its cybersecurity in the context of cyber-attacks on information collection, transmission, and processing systems.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131981431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ASSESSMENT AND PREDICTION OF THE COMPLEX OBJECTS STATE: APPLICATIOIN FOR INFORMATION SECURITY 复杂对象状态的评估与预测:在信息安全中的应用
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-6-2-21
K. Izrailov, M. Buinevich, Igor Kotenko, V. Desnitsky
The goal of the study is to create a method for estimating and predicting the state of objects with a non-trivial internal structure, multifunctional elements and complex relationships between them. An important feature of the goal is the independence of its solution from the area of operation of complex objects. The task of applying this approach in the field of information security is set. Research methods: system analysis, analytical modeling methods, statistical methods and machine learning methods, development of program code for the implementation of assessment and forecasting algorithms. Result: an ontological model of a generalized subject area is introduced that describes the main elements and their relationships. An analysis of the domestic scientific literature over the past few years and an analysis of the solutions existing in them are carried out, as well as their criteria-based comparison. The principles of constructing invariant methods of estimation and forecasting are developed. A scheme of a new method of estimation and forecasting is proposed. A description is given of generalized algorithms for the functioning of the assessment and prediction components, as well as their applicability for solving problems in the field of information security in the interests of countering network attacks.
研究的目的是建立一种对具有非平凡内部结构、多功能元素和复杂关系的物体状态进行估计和预测的方法。该目标的一个重要特征是其解独立于复杂对象的操作区域。提出了在信息安全领域应用该方法的任务。研究方法:系统分析、分析建模方法、统计方法和机器学习方法,开发用于实施评估和预测算法的程序代码。结果:引入了一个广义学科领域的本体论模型,该模型描述了学科领域的主要要素及其相互关系。对近年来国内的科学文献进行了分析,并对其中存在的解决方案进行了分析,并对其进行了基于准则的比较。给出了构造不变估计和预测方法的原理。提出了一种新的估计和预测方法的方案。描述了评估和预测组件功能的广义算法,以及它们在解决信息安全领域问题以对抗网络攻击方面的适用性。
{"title":"ASSESSMENT AND PREDICTION OF THE COMPLEX OBJECTS STATE: APPLICATIOIN FOR INFORMATION SECURITY","authors":"K. Izrailov, M. Buinevich, Igor Kotenko, V. Desnitsky","doi":"10.21681/2311-3456-2022-6-2-21","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-6-2-21","url":null,"abstract":"The goal of the study is to create a method for estimating and predicting the state of objects with a non-trivial internal structure, multifunctional elements and complex relationships between them. An important feature of the goal is the independence of its solution from the area of operation of complex objects. The task of applying this approach in the field of information security is set. Research methods: system analysis, analytical modeling methods, statistical methods and machine learning methods, development of program code for the implementation of assessment and forecasting algorithms. Result: an ontological model of a generalized subject area is introduced that describes the main elements and their relationships. An analysis of the domestic scientific literature over the past few years and an analysis of the solutions existing in them are carried out, as well as their criteria-based comparison. The principles of constructing invariant methods of estimation and forecasting are developed. A scheme of a new method of estimation and forecasting is proposed. A description is given of generalized algorithms for the functioning of the assessment and prediction components, as well as their applicability for solving problems in the field of information security in the interests of countering network attacks.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"227 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114076355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Voprosy kiberbezopasnosti
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1