首页 > 最新文献

Voprosy kiberbezopasnosti最新文献

英文 中文
Main Problem Directions in the Field of Domestic Element Base of Supercomputers 国产超级计算机元库领域的主要问题方向
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-4-02-12
A. Adamov, D. Fomin, L. Eisymont
{"title":"Main Problem Directions in the Field of Domestic Element Base of Supercomputers","authors":"A. Adamov, D. Fomin, L. Eisymont","doi":"10.21681/2311-3456-2019-4-02-12","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-4-02-12","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124989755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
ON MODELS AND METHODS OF PROBABILISTIC ANALYSIS OF INFORMATION SECURITY IN STANDARDIZED PROCESSES OF SYSTEM ENGINEERING 系统工程标准化过程中信息安全的概率分析模型与方法
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-6-71-82
A. Kostogryzov
Purpose: rational and description of the methodological apparatus of system engineering in terms of risk prediction, taking into account the requirements for information protection. Research methods include: methods of probability theory, risk-oriented models for predictive analysis of standardized processes of system engineering. Result: interrelated models and methods systematized for use in the planning and implementation of standardized processes of system engineering are described. Their use makes it possible to analyze the impact of information security in terms of predicted risks. Methods and models are implemented in a set of system engineering standards and analytically support the effective implementation of agreement, organizational project- enabling, technical management and technical processes according to GOST R 57193 (ISO/IEC/IEEE 15288) in relation to systems for various purposes (a total of 30 processes). The proposed models and methods of system analysis of information security in standardized processes of system engineering develop established approaches to risk prediction, ensuring and improving system security. The use of the proposed models and methods in the life cycle of systems helps to identify «bottlenecks», rational ways to reduce risks in the implemented standardized processes, taking into account the requirements for information protection, supports the making decisions in analytical problems of system engineering. Scientific novelty: the proposed methodological apparatus develops the existing approaches to risk prediction, ensuring and improving systems security. The ideas are implemented in the national standards GOST R 59329 – GOST R 59357. They allow enterprises to move to the pragmatic implementation of a risk-based approach using the analytical capabilities of solving inverse problems of effective security control, based on the specified level of acceptable risk.
目的:考虑到信息保护的要求,从风险预测的角度对系统工程的方法设备进行理性和描述。研究方法包括:概率论方法、面向风险的系统工程标准化过程预测分析模型。结果:描述了系统工程标准化过程的规划和实施中使用的相关模型和方法。它们的使用使得根据预测的风险来分析信息安全的影响成为可能。方法和模型在一套系统工程标准中实施,并根据GOST R 57193 (ISO/IEC/IEEE 15288),分析支持协议、组织项目启用、技术管理和技术过程的有效实施,这些过程与各种目的的系统(总共30个过程)有关。提出了系统工程标准化过程中信息安全系统分析的模型和方法,建立了风险预测、保障和提高系统安全性的方法。在系统生命周期中使用所建议的模型和方法有助于识别“瓶颈”,在实施的标准化过程中合理地减少风险,考虑到信息保护的要求,支持在系统工程的分析问题中做出决策。科学新颖性:提出的方法装置发展了现有的风险预测方法,确保和提高系统安全性。这些想法在国家标准GOST R 59329 - GOST R 59357中得到了实施。它们允许企业根据指定的可接受风险级别,使用解决有效安全控制的逆向问题的分析能力,转向基于风险的方法的实用实现。
{"title":"ON MODELS AND METHODS OF PROBABILISTIC ANALYSIS OF INFORMATION SECURITY IN STANDARDIZED PROCESSES OF SYSTEM ENGINEERING","authors":"A. Kostogryzov","doi":"10.21681/2311-3456-2022-6-71-82","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-6-71-82","url":null,"abstract":"Purpose: rational and description of the methodological apparatus of system engineering in terms of risk prediction, taking into account the requirements for information protection. Research methods include: methods of probability theory, risk-oriented models for predictive analysis of standardized processes of system engineering. Result: interrelated models and methods systematized for use in the planning and implementation of standardized processes of system engineering are described. Their use makes it possible to analyze the impact of information security in terms of predicted risks. Methods and models are implemented in a set of system engineering standards and analytically support the effective implementation of agreement, organizational project- enabling, technical management and technical processes according to GOST R 57193 (ISO/IEC/IEEE 15288) in relation to systems for various purposes (a total of 30 processes). The proposed models and methods of system analysis of information security in standardized processes of system engineering develop established approaches to risk prediction, ensuring and improving system security. The use of the proposed models and methods in the life cycle of systems helps to identify «bottlenecks», rational ways to reduce risks in the implemented standardized processes, taking into account the requirements for information protection, supports the making decisions in analytical problems of system engineering. Scientific novelty: the proposed methodological apparatus develops the existing approaches to risk prediction, ensuring and improving systems security. The ideas are implemented in the national standards GOST R 59329 – GOST R 59357. They allow enterprises to move to the pragmatic implementation of a risk-based approach using the analytical capabilities of solving inverse problems of effective security control, based on the specified level of acceptable risk.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121578321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigation of the Symmetric Diagram of the Digital Signature Developed on the Basis of the Algorithm "GOST R 34.12-2015" 基于“GOST R 34.12-2015”算法的数字签名对称图研究
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2018-2-52-58
L. Babenko, A. José
{"title":"Investigation of the Symmetric Diagram of the Digital Signature Developed on the Basis of the Algorithm \"GOST R 34.12-2015\"","authors":"L. Babenko, A. José","doi":"10.21681/2311-3456-2018-2-52-58","DOIUrl":"https://doi.org/10.21681/2311-3456-2018-2-52-58","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131445844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Legal Aspects of Modern Cybersecurity and Cybercrime Counteraction 现代网络安全和打击网络犯罪的法律问题
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2023-1-58-74
A. Kartskhiya, G. Makarenko
The article analyses contemporary legal aspects and current cybersecurity issues, cybercrime features of Rus- sian and foreign law of information and communication technologies. The research methods consist of comparative legal analysis of contemporary Russian and foreign legislation and law enforcement practice, as well as, a formal and logical study of a conceptual apparatus, content and struc- ture of the research object. The study results enable the authors to formulate the awareness of cybercrime legal content, that includes not only offenses committed by using computer technology, but other information and communication equipment and tools, including software either. The rapid spread of cybercrime, the emergence of new forms of organized crime using the global Internet, intended and well-organized cyber attacks on a critical infrastructure of states and private companies indicate the formation of a special area of crime - cybersecurity crime and information technol- ogy, which goes beyond a common insight of crime of information technology and communications. Therefore, the authors came to certain conclusions to conceptualize theoretical and methodological principles, develop the foundations of law and order of cybersecurity, clarify the conceptual apparatus and specifics of legal regulation of cybersecurity in public and private law, as well as the formation of a new line of criminology of cybercrime. The scientific novelty of the study consists of a conceptual justification of a cybercrime countering, as an ele- ment of national cybersecurity, as well as, the substantiation of a specific line of criminology - cybercriminology.
文章分析了当代法律方面和当前网络安全问题、俄罗斯和外国信息通信技术法的网络犯罪特点。研究方法包括对当代俄罗斯和外国立法和执法实践的比较法律分析,以及对研究对象的概念工具、内容和结构的形式和逻辑研究。研究结果使作者能够制定对网络犯罪法律内容的认识,这不仅包括使用计算机技术犯下的罪行,还包括其他信息和通信设备和工具,包括软件。网络犯罪的迅速蔓延,利用全球互联网的有组织犯罪新形式的出现,对国家和私营公司关键基础设施的有预谋和有组织的网络攻击表明,形成了一个特殊的犯罪领域——网络安全犯罪和信息技术,这超出了对信息技术和通信犯罪的一般认识。在此基础上,笔者对网络安全的理论原则和方法论原则进行了概念化,梳理了网络安全的法律秩序基础,厘清了网络安全的公法和私法法律规制的概念机构和具体内容,形成了网络犯罪的犯罪学新线。该研究的科学新颖性包括对网络犯罪打击作为国家网络安全要素的概念辩护,以及对犯罪学的特定路线-网络犯罪学的证实。
{"title":"Legal Aspects of Modern Cybersecurity and Cybercrime Counteraction","authors":"A. Kartskhiya, G. Makarenko","doi":"10.21681/2311-3456-2023-1-58-74","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-1-58-74","url":null,"abstract":"The article analyses contemporary legal aspects and current cybersecurity issues, cybercrime features of Rus- sian and foreign law of information and communication technologies. The research methods consist of comparative legal analysis of contemporary Russian and foreign legislation and law enforcement practice, as well as, a formal and logical study of a conceptual apparatus, content and struc- ture of the research object. The study results enable the authors to formulate the awareness of cybercrime legal content, that includes not only offenses committed by using computer technology, but other information and communication equipment and tools, including software either. The rapid spread of cybercrime, the emergence of new forms of organized crime using the global Internet, intended and well-organized cyber attacks on a critical infrastructure of states and private companies indicate the formation of a special area of crime - cybersecurity crime and information technol- ogy, which goes beyond a common insight of crime of information technology and communications. Therefore, the authors came to certain conclusions to conceptualize theoretical and methodological principles, develop the foundations of law and order of cybersecurity, clarify the conceptual apparatus and specifics of legal regulation of cybersecurity in public and private law, as well as the formation of a new line of criminology of cybercrime. The scientific novelty of the study consists of a conceptual justification of a cybercrime countering, as an ele- ment of national cybersecurity, as well as, the substantiation of a specific line of criminology - cybercriminology.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128141152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Text Analysis Approach for Identifying Psychological Characteristics (with Aggressiveness as an Example) 心理特征识别的文本分析方法(以攻击性为例)
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-4-72-79
A. Kovalev, Julia Kuznetsova, A. Minin, M. Penkina, I. Smirnov, M. Stankevich, N. Chudova
{"title":"Text Analysis Approach for Identifying Psychological Characteristics (with Aggressiveness as an Example)","authors":"A. Kovalev, Julia Kuznetsova, A. Minin, M. Penkina, I. Smirnov, M. Stankevich, N. Chudova","doi":"10.21681/2311-3456-2019-4-72-79","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-4-72-79","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134408885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hybrid Crypto-Code Method for Monitoring and Recovery of Data Integrity for Protected Information and Analytical Systems 受保护信息和分析系统数据完整性监测和恢复的混合密码方法
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-6-17-36
S. Dichenko, O. Finko
{"title":"Hybrid Crypto-Code Method for Monitoring and Recovery of Data Integrity for Protected Information and Analytical Systems","authors":"S. Dichenko, O. Finko","doi":"10.21681/2311-3456-2019-6-17-36","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-6-17-36","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131985716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Formalization of the Problem of Creating a Data Transmission System in a Robotic System Operating in Conditions of Antagonistic Cyber-Electromagnetic Activity 在对抗网络电磁活动条件下工作的机器人系统中创建数据传输系统问题的形式化
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-6-113-122
V. Golovskoy, Y. Chernuha, D. Semenyuk
{"title":"Formalization of the Problem of Creating a Data Transmission System in a Robotic System Operating in Conditions of Antagonistic Cyber-Electromagnetic Activity","authors":"V. Golovskoy, Y. Chernuha, D. Semenyuk","doi":"10.21681/2311-3456-2019-6-113-122","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-6-113-122","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132170449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Subsystem for Prevention of Computer Attacks Against Objects of Critical Information Infrastructure: Analysis of Functioning and Implementation 关键信息基础设施对象计算机攻击防范子系统:功能与实现分析
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2023-1-13-27
Igor Kotenko, I. Saenko, R. Zakharchenko, Dmitry Velichko
The purpose of the article: conducting a system analysis of the requirements for the subsystem for preventing computer attacks on critical information infrastructure in order to substantiate the directions for further improved scientific and methodological apparatus for the full functioning of the subsystem for preventing computer attacks. Research method: theoretical and systematic analysis of the requirements of legal acts, scientific publications, protection technologies and means of their implementation in departmental systems for detecting and counteringcomputer attacks.The result obtained: the rationale for the need to build mechanisms for preventing computer attacks on critical information infrastructure objects and the requirements for the subsystem for preventing computer attacks was carried out, an approach was proposed to prevent computer attacks at the stages of reconnaissance by an attacker of critical information infrastructure objects, based on the introduction of a security event correlation mechanism with automatic adaptation to the analyzed information infrastructure and the functions it performs at the current time and a detailed specification of the correlation rules.Scope of the proposed approach: a subsystem for preventing computer attacks of departmental systems for detecting and countering computer attacks, which should identify and prevent attempts to conduct computer attacks on critical information infrastructure objects in advance.The scientific novelty consists in a comprehensive analysis of the need to build mechanisms for preventing computer attacks on critical information infrastructure objects, an analysis of the requirements for the computer attack prevention subsystem, its functions and means of implementation. It is shown that the functions of preventing computer attacks in domestic technical solutions are not fully implemented, and that there is a substitution of the concept of “subsystem for preventing computer attacks” by the concept of “control and technical measures”. It is substantiated that for the implementation of the functions of preventing computer attacks, there is a technological backlog in the form of a ready-made technology based on the technology for building SIEM systems. It is shown that there is a need to refine the scientific and methodological apparatus for implementing computer warning functions based on artificial intelligence methods and big data technologies.Contribution: Kotenko I.V. - analysis of the functionality of the subsystem for preventing computer attacks, setting the task and proposals for developing the functionality of the subsystem for preventing computer attacks on critical information infrastructure objects; Saenko I.B. - analysis of the subsystem for preventing computer attacks in the general context of the theory of information security, substantiation of the implementation of the functions of preventing computer attacks based on the technology of building SIEM systems a
本文的目的是:对防止关键信息基础设施受到计算机攻击的子系统的需求进行系统分析,以确定进一步改进科学和方法设备的方向,使防止计算机攻击的子系统充分发挥作用。研究方法:从理论上和系统地分析部门系统中检测和打击计算机攻击的法律行为、科学出版物、保护技术及其实施手段的要求。得到的结果是:阐述了建立防止计算机攻击关键信息基础设施对象机制的基本原理和防止计算机攻击子系统的要求,提出了在攻击者对关键信息基础设施对象进行侦察阶段防止计算机攻击的方法;介绍了一种能够自动适应所分析的信息基础设施及其当前所执行的功能的安全事件关联机制,并详细规范了相关规则。建议方法的范围:一个防止部门系统的电脑攻击的分系统,用以侦测及对抗电脑攻击,该分系统应预先识别及防止对关键资讯基建对象进行电脑攻击的企图。科学的新颖性在于全面分析了构建计算机防范关键信息基础设施对象攻击机制的需求,分析了计算机防范攻击子系统的需求、功能和实现方式。研究表明,国内技术方案中防范计算机攻击的功能没有得到充分实现,“防范计算机攻击子系统”的概念被“控制与技术措施”的概念所替代。事实证明,为了实现防止计算机攻击的功能,在构建SIEM系统的技术基础上,存在以现成技术形式存在的技术积压。研究表明,需要完善基于人工智能方法和大数据技术实现计算机预警功能的科学和方法设备。贡献:Kotenko I.V. -分析了防止计算机攻击的子系统的功能,设定了任务和建议,以开发防止关键信息基础设施对象受到计算机攻击的子系统的功能;Saenko I.B. -在信息安全理论的大背景下,分析了防止计算机攻击的子系统,基于构建SIEM系统和大数据的技术,验证了防止计算机攻击功能的实现;Zakharchenko R.I.——分析技术解决方案,确保实现防止计算机攻击的子系统,Velichko D.V.——在关键信息基础设施对象的攻击者侦察阶段检测计算机攻击的方法。所有作者都参与了这篇文章的写作。
{"title":"Subsystem for Prevention of Computer Attacks Against Objects of Critical Information Infrastructure: Analysis of Functioning and Implementation","authors":"Igor Kotenko, I. Saenko, R. Zakharchenko, Dmitry Velichko","doi":"10.21681/2311-3456-2023-1-13-27","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-1-13-27","url":null,"abstract":"The purpose of the article: conducting a system analysis of the requirements for the subsystem for preventing computer attacks on critical information infrastructure in order to substantiate the directions for further improved scientific and methodological apparatus for the full functioning of the subsystem for preventing computer attacks. Research method: theoretical and systematic analysis of the requirements of legal acts, scientific publications, protection technologies and means of their implementation in departmental systems for detecting and counteringcomputer attacks.The result obtained: the rationale for the need to build mechanisms for preventing computer attacks on critical information infrastructure objects and the requirements for the subsystem for preventing computer attacks was carried out, an approach was proposed to prevent computer attacks at the stages of reconnaissance by an attacker of critical information infrastructure objects, based on the introduction of a security event correlation mechanism with automatic adaptation to the analyzed information infrastructure and the functions it performs at the current time and a detailed specification of the correlation rules.Scope of the proposed approach: a subsystem for preventing computer attacks of departmental systems for detecting and countering computer attacks, which should identify and prevent attempts to conduct computer attacks on critical information infrastructure objects in advance.The scientific novelty consists in a comprehensive analysis of the need to build mechanisms for preventing computer attacks on critical information infrastructure objects, an analysis of the requirements for the computer attack prevention subsystem, its functions and means of implementation. It is shown that the functions of preventing computer attacks in domestic technical solutions are not fully implemented, and that there is a substitution of the concept of “subsystem for preventing computer attacks” by the concept of “control and technical measures”. It is substantiated that for the implementation of the functions of preventing computer attacks, there is a technological backlog in the form of a ready-made technology based on the technology for building SIEM systems. It is shown that there is a need to refine the scientific and methodological apparatus for implementing computer warning functions based on artificial intelligence methods and big data technologies.Contribution: Kotenko I.V. - analysis of the functionality of the subsystem for preventing computer attacks, setting the task and proposals for developing the functionality of the subsystem for preventing computer attacks on critical information infrastructure objects; Saenko I.B. - analysis of the subsystem for preventing computer attacks in the general context of the theory of information security, substantiation of the implementation of the functions of preventing computer attacks based on the technology of building SIEM systems a","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133946304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Providing Safe Routing in Wireless Self-Organizing Networks 在无线自组织网络中提供安全路由
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-2-52-62
Sabina Volkov, E. Gordeev
Purpose of the study: development of a distributed routing algorithm to ensure security in wireless self-organizing networks from intruder attacks on the network. Methods: application of algorithms, graph theory, discrete optimization and heuristic approaches based on the results of numerical experiments. Results: the paper proposes a modified distributed routing algorithm for self-organizing networks. The algorithm, presented in this paper, is based on a distributed version of Dijkstra’s algorithm, designed to detect the shortest paths without loops on a graph under conditions of changing the weight of its edges. The loop freedom in this case is achieved by storing at each node an additional table containing the penultimate nodes on the shortest routes to all nodes, which allows the node to build a tree of shortest routes with itself as a root. In the modification of the algorithm, these tables are used by the nodes to check the correspondence of the declared route and the return route, which makes it possible to recognize and exclude from the network an intruder who carries out attacks to disrupt the correct routing mechanism. The effectiveness of the proposed algorithm for protection against routing attacks, in particular, black hole attacks, is confirmed by the results of testing on a program model.
研究目的:开发一种分布式路由算法,以确保无线自组织网络的安全,免受入侵者的攻击。方法:应用算法、图论、离散优化和基于数值实验结果的启发式方法。结果:提出了一种改进的自组织网络分布式路由算法。本文提出的算法基于Dijkstra算法的分布式版本,旨在在改变其边权的条件下检测图上没有环路的最短路径。在这种情况下,循环自由是通过在每个节点上存储一个额外的表来实现的,该表包含到所有节点的最短路由上的倒数第二个节点,这允许节点以自己为根构建最短路由树。在算法的修改中,节点使用这些表来检查声明路由和返回路由的对应关系,从而可以识别并排除网络中进行攻击以破坏正确路由机制的入侵者。在一个程序模型上的测试结果证实了该算法对路由攻击,特别是黑洞攻击的有效性。
{"title":"Providing Safe Routing in Wireless Self-Organizing Networks","authors":"Sabina Volkov, E. Gordeev","doi":"10.21681/2311-3456-2022-2-52-62","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-2-52-62","url":null,"abstract":"Purpose of the study: development of a distributed routing algorithm to ensure security in wireless self-organizing networks from intruder attacks on the network. Methods: application of algorithms, graph theory, discrete optimization and heuristic approaches based on the results of numerical experiments. Results: the paper proposes a modified distributed routing algorithm for self-organizing networks. The algorithm, presented in this paper, is based on a distributed version of Dijkstra’s algorithm, designed to detect the shortest paths without loops on a graph under conditions of changing the weight of its edges. The loop freedom in this case is achieved by storing at each node an additional table containing the penultimate nodes on the shortest routes to all nodes, which allows the node to build a tree of shortest routes with itself as a root. In the modification of the algorithm, these tables are used by the nodes to check the correspondence of the declared route and the return route, which makes it possible to recognize and exclude from the network an intruder who carries out attacks to disrupt the correct routing mechanism. The effectiveness of the proposed algorithm for protection against routing attacks, in particular, black hole attacks, is confirmed by the results of testing on a program model.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133835602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A NEW APPROACH TO THE DEVELOPMENT OF MULTIDIMENSIONAL CRYPTOGRAPHY ALGORITHMS 一种开发多维密码算法的新方法
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2023-2-52-64
D. Moldovyan, N. Moldovyan
Purpose of work is the reduction in the size of the public key of public-key algorithms of multivariate cryptography based on the computational difficulty of solving systems of many power equations with many unknowns. Research method is use of non-linear mappings defined as exponentiation operations in finite extended fields GF(qm) represented in the form of finite algebras. The latter makes it possible to perform the exponentiation operation in the field GF(qm) by calculating the values of power polynomials over the field GF(q), which define a hardly reversible nonlinear mapping of the vector space over GF(q) with a secret trapdoor. Due to the use of nonlinear mappings of this type, it is possible to specify a public key in multidimensional cryptography algorithms in the form of a nonlinear mapping implemented as a calculation of the values of a set of polynomials of the third and sixth degree. At the same time, due to the use of masking linear mappings that do not lead to an increase in the number of terms in polynomials, the size of the public key is reduced in comparison with known analogue algorithms, in which the public key is represented by a set of polynomials of the second and third degrees. The proposed approach potentially expands the areas of practical application of post-quantum algorithms for public encryption and electronic digital signature, related to multidimensional cryptography, by significantly reducing the size of the public key. Results of the study are the main provisions of a new approach to the development of algorithms of multidimensional cryptography are formulated. Hardly invertible nonlinear mappings with a secret trapdoor are proposed in the form of exponentiation operations to the second and third powers in finite extended fields GF(qm), represented in a form of a finite algebra. A rationale is given for specifying a public key in a form that includes a superposition of two non-linear mappings performed as a calculation of a set of second and third degree polynomials defined over GF(q). Techniques for implementing mappings of this type are proposed and specific options for specifying the fields GF(qm) in the form of finite algebras are considered. An estimate of the size of the public key in the algorithms developed within the framework of the new approach is made. at a given security level.. Practical relevance includes the developed main provisions of a new method for constructing multidimensional cryptography algorithms based on the computational difficulty of solving systems of many power equations with many unknowns and related to post-quantum cryptoschemes. The proposed approach expands the areas of practical application of post-quantum algorithms of this type by significantly reducing the size of the public key, which provides the prerequisites for improving performance and reducing technical resources for their implementation
工作的目的是基于求解多未知数多幂方程系统的计算难度,减小多元密码学公钥算法的公钥大小。研究方法是利用有限扩展域GF(qm)中以有限代数形式表示的幂运算来定义非线性映射。后者通过计算场GF(q)上的幂多项式的值,使得在场GF(qm)中执行幂运算成为可能,它定义了GF(q)上具有秘密活门的向量空间的几乎可逆的非线性映射。由于使用这种类型的非线性映射,可以在多维密码学算法中以非线性映射的形式指定公钥,该非线性映射实现为对一组三次和六次多项式的值进行计算。同时,由于使用屏蔽线性映射,不会导致多项式中项数的增加,与已知的模拟算法相比,公钥的大小减小了,其中公钥由一组二阶和三度多项式表示。所提出的方法通过显著减小公钥的大小,潜在地扩展了与多维密码学相关的公共加密和电子数字签名的后量子算法的实际应用领域。研究结果为多维密码学算法的开发提供了一种新的途径。在有限扩展域GF(qm)上,用有限代数的形式给出了具有秘密陷门的难可逆非线性映射的二次和三次幂运算形式。给出了以一种形式指定公钥的基本原理,该形式包括两个非线性映射的叠加,作为在GF(q)上定义的一组二次和三次多项式的计算。提出了实现这种类型映射的技术,并考虑了以有限代数形式指定域GF(qm)的特定选项。对在新方法框架内开发的算法中的公钥大小进行了估计。在给定的安全级别…实际意义包括开发了一种新的方法来构建多维密码算法的主要条款,该方法基于求解具有许多未知数的多功率方程系统的计算难度,并与后量子密码方案相关。所提出的方法通过显著减小公钥的大小,扩展了这种类型的后量子算法的实际应用领域,这为提高性能和减少实现的技术资源提供了先决条件
{"title":"A NEW APPROACH TO THE DEVELOPMENT OF MULTIDIMENSIONAL CRYPTOGRAPHY ALGORITHMS","authors":"D. Moldovyan, N. Moldovyan","doi":"10.21681/2311-3456-2023-2-52-64","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-2-52-64","url":null,"abstract":"Purpose of work is the reduction in the size of the public key of public-key algorithms of multivariate cryptography based on the computational difficulty of solving systems of many power equations with many unknowns. Research method is use of non-linear mappings defined as exponentiation operations in finite extended fields GF(qm) represented in the form of finite algebras. The latter makes it possible to perform the exponentiation operation in the field GF(qm) by calculating the values of power polynomials over the field GF(q), which define a hardly reversible nonlinear mapping of the vector space over GF(q) with a secret trapdoor. Due to the use of nonlinear mappings of this type, it is possible to specify a public key in multidimensional cryptography algorithms in the form of a nonlinear mapping implemented as a calculation of the values of a set of polynomials of the third and sixth degree. At the same time, due to the use of masking linear mappings that do not lead to an increase in the number of terms in polynomials, the size of the public key is reduced in comparison with known analogue algorithms, in which the public key is represented by a set of polynomials of the second and third degrees. The proposed approach potentially expands the areas of practical application of post-quantum algorithms for public encryption and electronic digital signature, related to multidimensional cryptography, by significantly reducing the size of the public key. Results of the study are the main provisions of a new approach to the development of algorithms of multidimensional cryptography are formulated. Hardly invertible nonlinear mappings with a secret trapdoor are proposed in the form of exponentiation operations to the second and third powers in finite extended fields GF(qm), represented in a form of a finite algebra. A rationale is given for specifying a public key in a form that includes a superposition of two non-linear mappings performed as a calculation of a set of second and third degree polynomials defined over GF(q). Techniques for implementing mappings of this type are proposed and specific options for specifying the fields GF(qm) in the form of finite algebras are considered. An estimate of the size of the public key in the algorithms developed within the framework of the new approach is made. at a given security level.. Practical relevance includes the developed main provisions of a new method for constructing multidimensional cryptography algorithms based on the computational difficulty of solving systems of many power equations with many unknowns and related to post-quantum cryptoschemes. The proposed approach expands the areas of practical application of post-quantum algorithms of this type by significantly reducing the size of the public key, which provides the prerequisites for improving performance and reducing technical resources for their implementation","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117252709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Voprosy kiberbezopasnosti
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1