首页 > 最新文献

Voprosy kiberbezopasnosti最新文献

英文 中文
Algorithms to Reveal Communication Groups 显示通信组的算法
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-4-61-71
Dmitry Leschyov, Daniel Suchkov, S. Khaykova, A. Chepovskiy
{"title":"Algorithms to Reveal Communication Groups","authors":"Dmitry Leschyov, Daniel Suchkov, S. Khaykova, A. Chepovskiy","doi":"10.21681/2311-3456-2019-4-61-71","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-4-61-71","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121553807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Assessment of Current Threats to Information Security Using Transformer Technology 利用变压器技术评估当前对信息安全的威胁
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-2-27-38
V. Vasilyev, A. Vulfin, Nailya Kuchkarova
Purpose: development of an automated system for assessing current threats to the security of software of industrial automation systems based on the technology of Transformers. Methods: comparison of the set of identified software vulnerabilities, corresponding tactics (techniques) and relevant threats to information security by assessing the semantic proximity metrics of their text descriptions using Text Mining technology based on transformers models. Practical relevance: an automated system for assessing current software security threats has been developed, which makes it possible to compare and rank information and cyber security threats for identified vulnerabilities from the FSTEC of Russia Information Security Threats Databank, to automate the selection of techniques and tactics for constructing threat scenarios. The results of the comparative analysis show that the use of this system makes it possible to simplify the procedure for selecting potential threats and comparing vulnerabilities to them, in addition, a possible set of tactics and techniques is automatically generated, which makes it possible to reduce the time spent on building scenarios for the implementation of threats.
目的:开发基于变压器技术的自动化系统,用于评估当前工业自动化系统软件安全威胁。方法:利用基于变形模型的文本挖掘技术,通过评估文本描述的语义接近度量,比较已识别的软件漏洞集、相应的策略(技术)和相关的信息安全威胁。实际意义:开发了用于评估当前软件安全威胁的自动化系统,该系统可以对俄罗斯FSTEC信息安全威胁数据库中已识别漏洞的信息和网络安全威胁进行比较和排名,从而自动选择构建威胁场景的技术和策略。对比分析结果表明,该系统的使用可以简化潜在威胁的选择和漏洞的比较过程,并自动生成一套可能的战术和技术,从而可以减少构建威胁实施场景所花费的时间。
{"title":"Assessment of Current Threats to Information Security Using Transformer Technology","authors":"V. Vasilyev, A. Vulfin, Nailya Kuchkarova","doi":"10.21681/2311-3456-2022-2-27-38","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-2-27-38","url":null,"abstract":"Purpose: development of an automated system for assessing current threats to the security of software of industrial automation systems based on the technology of Transformers. Methods: comparison of the set of identified software vulnerabilities, corresponding tactics (techniques) and relevant threats to information security by assessing the semantic proximity metrics of their text descriptions using Text Mining technology based on transformers models. Practical relevance: an automated system for assessing current software security threats has been developed, which makes it possible to compare and rank information and cyber security threats for identified vulnerabilities from the FSTEC of Russia Information Security Threats Databank, to automate the selection of techniques and tactics for constructing threat scenarios. The results of the comparative analysis show that the use of this system makes it possible to simplify the procedure for selecting potential threats and comparing vulnerabilities to them, in addition, a possible set of tactics and techniques is automatically generated, which makes it possible to reduce the time spent on building scenarios for the implementation of threats.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125143378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation of Complex Objects Network Infrastructure to Solve The Problem of Counteraction to Cyber Attacks 复杂对象网络基础设施仿真解决网络攻击对抗问题
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-2-13-20
D. Lavrova, D. Zegzhda, E. Zaitceva
{"title":"Simulation of Complex Objects Network Infrastructure to Solve The Problem of Counteraction to Cyber Attacks","authors":"D. Lavrova, D. Zegzhda, E. Zaitceva","doi":"10.21681/2311-3456-2019-2-13-20","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-2-13-20","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129716128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Probabilistic Representations of Conditions for Timely Response to Computer Attack Threats 计算机攻击威胁及时响应条件的概率表示
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-6-59-68
S. Kondakov, T. Meshcheryakova, Skryl’ Sergey, A. Stadnik, A. Suvorov
{"title":"Probabilistic Representations of Conditions for Timely Response to Computer Attack Threats","authors":"S. Kondakov, T. Meshcheryakova, Skryl’ Sergey, A. Stadnik, A. Suvorov","doi":"10.21681/2311-3456-2019-6-59-68","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-6-59-68","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128022685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Quantum Resilience Estimation Method Blockchain 量子弹性估计方法区块链
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-3-2-22
Alexei Petrenko, S. Petrenko
Abstract Purpose of work is the development of a new method for estimating the quantum resilience of modern blockchain platforms based on the effective solution of cryptanalysis problems for asymmetric encryption schemes (RSA, El-Gamal) and digital signature (DSA, ECDSA or RSA-PSS), based on computationally difficult problems of factorization and discrete logarithm. Research method is the use of quantum algorithms providing exponential gain (eg Shor’s algorithm) and quadratic gain (eg Grover’s algorithm). Due to the fact that the class of problems solved by quantum algorithms in polynomial time cannot yet be significantly expanded, more attention is paid to cryptanalysis based on the quantum Shor algorithm and other polynomial algorithms. Results of the study include a classification of well-known algorithms and software packages for cryptanalysis of asymmetric encryption schemes (RSA, El-Gamal) and digital signature (DSA, ECDSA or RSA-PSS) based on computationally difficult problems of factorization and discrete logarithm has been built. A promising method for solving problems of cryptanalysis of asymmetric encryption schemes (RSA, ElGamal) and digital signature (DSA, ECDSA or RSA-PSS) of known blockchain platforms in polynomial time in a quantum computing model is proposed. Algorithms for solving problems of quantum cryptanalysis of two-key cryptography schemes of known blockchain platforms in polynomial time are developed, taking into account the security of the discrete algorithm (DLP) and the discrete elliptic curve algorithm (ECDLP). A structural and functional diagram of the software package for quantum cryptanalysis of modern blockchain platforms “Kvant-K”, adapted to work in a hybrid computing environment of the IBM Q quantum computer (20 and 100 qubits) and the IBM BladeCenter (2022) supercomputer, has been designed. A methodology has been developed for using the “Kvant-K” software package to assess the quantum stability of blockchain platforms: InnoChain (Innopolis University), Waves Enterprise (Waves, Vostok), Hyperledger Fabric (Linux, IBM), Corda Enterprise, Bitfury Exonum, Blockchain Industrial Alliance, Exonum (Bitfury CIS), NodesPlus (b41), Masterchain (Sberbank), Microsoft Azure Blockchain, Enterprise Ethereum Alliance, etc. Practical relevance: The developed new solution for computationally difficult problems of factorization and discrete logarithm, given over finite commutative (and non-commutative) associative algebras, in a quantum model of computing in polynomial time. It is essential that the obtained scientific results formed the basis for the development of the corresponding software and hardware complex “Kvant-K”, which was tested in a hybrid computing environment (quantum computer IBM Q (20 and 100 qubits) and/or 5th generation supercomputer: IBM BladeCenter (2022), RCS based on FPGA Virtex UltraScale (2020), RFNC-VNIIEF (2022) and SKIF P-0.5 (2021). An appropriate method for estimating the quantum stability of these b
工作目的是基于有效解决非对称加密方案(RSA, El-Gamal)和数字签名(DSA, ECDSA或RSA- pss)的密码分析问题,基于分解和离散对数的计算难题,开发一种估计现代区块链平台量子弹性的新方法。研究方法是利用量子算法提供指数增益(如肖尔算法)和二次增益(如格罗弗算法)。由于量子算法在多项式时间内解决的问题类别尚未得到显著扩展,因此基于量子Shor算法和其他多项式算法的密码分析受到了更多的关注。研究结果包括基于分解和离散对数的计算困难问题的非对称加密方案(RSA, El-Gamal)和数字签名(DSA, ECDSA或RSA- pss)的密码分析的知名算法和软件包的分类。提出了一种在量子计算模型中多项式时间内解决已知区块链平台的非对称加密方案(RSA, ElGamal)和数字签名(DSA, ECDSA或RSA- pss)的密码分析问题的有前途的方法。考虑离散算法(DLP)和离散椭圆曲线算法(ECDLP)的安全性,提出了在多项式时间内求解已知区块链平台双密钥加密方案量子密码分析问题的算法。设计了适用于IBM Q量子计算机(20和100量子位)和IBM BladeCenter(2022)超级计算机混合计算环境的现代区块链平台“Kvant-K”量子密码分析软件包的结构和功能图。已经开发了一种方法,用于使用“Kvant-K”软件包来评估区块链平台的量子稳定性:InnoChain (Innopolis University), Waves Enterprise (Waves, Vostok), Hyperledger Fabric (Linux, IBM), Corda Enterprise, Bitfury Exonum,区块链工业联盟,Exonum (Bitfury CIS), NodesPlus (b41), Masterchain (Sberbank),微软Azure区块链,企业以太坊联盟等。实际意义:在多项式时间计算的量子模型中,为因式分解和离散对数的计算困难问题开发了新的解决方案,给出了有限交换(和非交换)关联代数。至关重要的是,获得的科学成果为开发相应的软硬件综合体“Kvant-K”奠定了基础,该综合体在混合计算环境(量子计算机IBM Q(20和100量子位)和/或第五代超级计算机:IBM BladeCenter(2022)、基于FPGA Virtex UltraScale的RCS(2020)、RFNC-VNIIEF(2022)和SKIF P-0.5(2021))中进行了测试。基于作者的量子密码分析模型、方法和算法,开发并测试了一种合适的方法来估计这些区块链平台的量子稳定性。关键词:区块链和分布式账本技术(DLT)、SMART合约、区块链安全威胁模型、量子安全威胁、密码攻击、量子密码分析、量子和后量子密码、量子算法Shor、Grover和Simon算法、量子傅立叶变换、因数分解和离散对数问题、后量子密码、区块链平台的量子弹性。
{"title":"Quantum Resilience Estimation Method Blockchain","authors":"Alexei Petrenko, S. Petrenko","doi":"10.21681/2311-3456-2022-3-2-22","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-3-2-22","url":null,"abstract":"Abstract Purpose of work is the development of a new method for estimating the quantum resilience of modern blockchain platforms based on the effective solution of cryptanalysis problems for asymmetric encryption schemes (RSA, El-Gamal) and digital signature (DSA, ECDSA or RSA-PSS), based on computationally difficult problems of factorization and discrete logarithm. Research method is the use of quantum algorithms providing exponential gain (eg Shor’s algorithm) and quadratic gain (eg Grover’s algorithm). Due to the fact that the class of problems solved by quantum algorithms in polynomial time cannot yet be significantly expanded, more attention is paid to cryptanalysis based on the quantum Shor algorithm and other polynomial algorithms. Results of the study include a classification of well-known algorithms and software packages for cryptanalysis of asymmetric encryption schemes (RSA, El-Gamal) and digital signature (DSA, ECDSA or RSA-PSS) based on computationally difficult problems of factorization and discrete logarithm has been built. A promising method for solving problems of cryptanalysis of asymmetric encryption schemes (RSA, ElGamal) and digital signature (DSA, ECDSA or RSA-PSS) of known blockchain platforms in polynomial time in a quantum computing model is proposed. Algorithms for solving problems of quantum cryptanalysis of two-key cryptography schemes of known blockchain platforms in polynomial time are developed, taking into account the security of the discrete algorithm (DLP) and the discrete elliptic curve algorithm (ECDLP). A structural and functional diagram of the software package for quantum cryptanalysis of modern blockchain platforms “Kvant-K”, adapted to work in a hybrid computing environment of the IBM Q quantum computer (20 and 100 qubits) and the IBM BladeCenter (2022) supercomputer, has been designed. A methodology has been developed for using the “Kvant-K” software package to assess the quantum stability of blockchain platforms: InnoChain (Innopolis University), Waves Enterprise (Waves, Vostok), Hyperledger Fabric (Linux, IBM), Corda Enterprise, Bitfury Exonum, Blockchain Industrial Alliance, Exonum (Bitfury CIS), NodesPlus (b41), Masterchain (Sberbank), Microsoft Azure Blockchain, Enterprise Ethereum Alliance, etc. Practical relevance: The developed new solution for computationally difficult problems of factorization and discrete logarithm, given over finite commutative (and non-commutative) associative algebras, in a quantum model of computing in polynomial time. It is essential that the obtained scientific results formed the basis for the development of the corresponding software and hardware complex “Kvant-K”, which was tested in a hybrid computing environment (quantum computer IBM Q (20 and 100 qubits) and/or 5th generation supercomputer: IBM BladeCenter (2022), RCS based on FPGA Virtex UltraScale (2020), RFNC-VNIIEF (2022) and SKIF P-0.5 (2021). An appropriate method for estimating the quantum stability of these b","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120964237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Modern Tendencies of Development of the Technology «Blockchain» and Digital Currencies “区块链”技术与数字货币的现代发展趋势分析
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-5-57-62
R. Astrakhantsev, Alexey Los, R. Muhamadieva
{"title":"Analysis of Modern Tendencies of Development of the Technology «Blockchain» and Digital Currencies","authors":"R. Astrakhantsev, Alexey Los, R. Muhamadieva","doi":"10.21681/2311-3456-2019-5-57-62","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-5-57-62","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126615167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CONSTRUCTION OF COMPOSITE CRITERIA FOR OPTIMIZATION OF TERMS AND GENERALIZED INDICATOR OF KNOWLEDGE BASES OF INTELLIGENT SYSTEMS 智能系统知识库术语优化综合准则及广义指标的构建
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2023-2-23-35
N. Sidnyaev, E. Sineva
The purpose of the research is to develop the concept of systematization of the knowledge base and solving problems of information cybersecurity of systems and when making search decisions based on the construction of a structured semantic content model of terms of a scientific and theoretical nature describing complex active systems. Research methods: statistical analysis, hypothesis testing methods, machine learning methods, reliability models, evaluation type models used in testing reliability indicators, parameters of behavioral systems. The result obtained: The result obtained: experimental results of the application of reliability evaluation models and consent criteria to different sizes of knowledge bases are discussed and the evaluation of the results of measuring the reliability index on these components, taking into account the failure rate, is given. The description of generalized algorithms for the functioning of evaluation and forecasting components, as well as their applicability to solving problems in the field of information security, is given. A general model of a spatial network is proposed, within the framework of which the subject carries out risk management by effectively, in one sense or another, distributing the homogeneous resource at his disposal between its nodes. For the implementation of decision-making, more optimistic criteria than the minimax criterion are recommended. Scientific novelty: consists in the development of mathematical models to maintain the logical and physical integrity of the knowledge bases of cybersystems using the desirability function and consent criteria. The basic requirements for ensuring reliable behavior and operability of an information system using oriented databases are highlighted and described. It is postulated that the best information system reliability is achieved through the use of automated monitoring systems using knowledge bases for continuous monitoring and periodic analysis of cybersystem objects with tracking the dynamics of changes in the event space.
该研究的目的是发展系统化知识库的概念,并在构建描述复杂活动系统的科学和理论性质术语的结构化语义内容模型的基础上解决系统的信息网络安全问题,并在做出搜索决策时解决问题。研究方法:统计分析、假设检验方法、机器学习方法、可靠性模型、用于测试可靠性指标、行为系统参数的评价型模型。得到的结果:讨论了可靠性评价模型和同意准则在不同知识库规模下的应用实验结果,并给出了考虑故障率的构件可靠性指标测量结果的评价。给出了评估和预测组件功能的广义算法及其在解决信息安全领域问题中的适用性。提出了一个空间网络的一般模型,在这个框架内,主体通过在节点之间有效地分配同质资源来进行风险管理。对于决策的实施,建议采用比极大极小准则更乐观的准则。科学新颖性:包括数学模型的发展,以保持网络系统知识基础的逻辑和物理完整性,使用可取性函数和同意标准。强调并描述了确保使用面向数据库的信息系统的可靠行为和可操作性的基本要求。假设最佳的信息系统可靠性是通过使用自动化监控系统实现的,该系统使用知识库对网络系统对象进行连续监控和周期性分析,并跟踪事件空间中的动态变化。
{"title":"CONSTRUCTION OF COMPOSITE CRITERIA FOR OPTIMIZATION OF TERMS AND GENERALIZED INDICATOR OF KNOWLEDGE BASES OF INTELLIGENT SYSTEMS","authors":"N. Sidnyaev, E. Sineva","doi":"10.21681/2311-3456-2023-2-23-35","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-2-23-35","url":null,"abstract":"The purpose of the research is to develop the concept of systematization of the knowledge base and solving problems of information cybersecurity of systems and when making search decisions based on the construction of a structured semantic content model of terms of a scientific and theoretical nature describing complex active systems. Research methods: statistical analysis, hypothesis testing methods, machine learning methods, reliability models, evaluation type models used in testing reliability indicators, parameters of behavioral systems. The result obtained: The result obtained: experimental results of the application of reliability evaluation models and consent criteria to different sizes of knowledge bases are discussed and the evaluation of the results of measuring the reliability index on these components, taking into account the failure rate, is given. The description of generalized algorithms for the functioning of evaluation and forecasting components, as well as their applicability to solving problems in the field of information security, is given. A general model of a spatial network is proposed, within the framework of which the subject carries out risk management by effectively, in one sense or another, distributing the homogeneous resource at his disposal between its nodes. For the implementation of decision-making, more optimistic criteria than the minimax criterion are recommended. Scientific novelty: consists in the development of mathematical models to maintain the logical and physical integrity of the knowledge bases of cybersystems using the desirability function and consent criteria. The basic requirements for ensuring reliable behavior and operability of an information system using oriented databases are highlighted and described. It is postulated that the best information system reliability is achieved through the use of automated monitoring systems using knowledge bases for continuous monitoring and periodic analysis of cybersystem objects with tracking the dynamics of changes in the event space.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129009160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Providing Safe Routing in Wireless Self-Organizing Networks 在无线自组织网络中提供安全路由
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-2-52-62
Sabina Volkov, E. Gordeev
Purpose of the study: development of a distributed routing algorithm to ensure security in wireless self-organizing networks from intruder attacks on the network. Methods: application of algorithms, graph theory, discrete optimization and heuristic approaches based on the results of numerical experiments. Results: the paper proposes a modified distributed routing algorithm for self-organizing networks. The algorithm, presented in this paper, is based on a distributed version of Dijkstra’s algorithm, designed to detect the shortest paths without loops on a graph under conditions of changing the weight of its edges. The loop freedom in this case is achieved by storing at each node an additional table containing the penultimate nodes on the shortest routes to all nodes, which allows the node to build a tree of shortest routes with itself as a root. In the modification of the algorithm, these tables are used by the nodes to check the correspondence of the declared route and the return route, which makes it possible to recognize and exclude from the network an intruder who carries out attacks to disrupt the correct routing mechanism. The effectiveness of the proposed algorithm for protection against routing attacks, in particular, black hole attacks, is confirmed by the results of testing on a program model.
研究目的:开发一种分布式路由算法,以确保无线自组织网络的安全,免受入侵者的攻击。方法:应用算法、图论、离散优化和基于数值实验结果的启发式方法。结果:提出了一种改进的自组织网络分布式路由算法。本文提出的算法基于Dijkstra算法的分布式版本,旨在在改变其边权的条件下检测图上没有环路的最短路径。在这种情况下,循环自由是通过在每个节点上存储一个额外的表来实现的,该表包含到所有节点的最短路由上的倒数第二个节点,这允许节点以自己为根构建最短路由树。在算法的修改中,节点使用这些表来检查声明路由和返回路由的对应关系,从而可以识别并排除网络中进行攻击以破坏正确路由机制的入侵者。在一个程序模型上的测试结果证实了该算法对路由攻击,特别是黑洞攻击的有效性。
{"title":"Providing Safe Routing in Wireless Self-Organizing Networks","authors":"Sabina Volkov, E. Gordeev","doi":"10.21681/2311-3456-2022-2-52-62","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-2-52-62","url":null,"abstract":"Purpose of the study: development of a distributed routing algorithm to ensure security in wireless self-organizing networks from intruder attacks on the network. Methods: application of algorithms, graph theory, discrete optimization and heuristic approaches based on the results of numerical experiments. Results: the paper proposes a modified distributed routing algorithm for self-organizing networks. The algorithm, presented in this paper, is based on a distributed version of Dijkstra’s algorithm, designed to detect the shortest paths without loops on a graph under conditions of changing the weight of its edges. The loop freedom in this case is achieved by storing at each node an additional table containing the penultimate nodes on the shortest routes to all nodes, which allows the node to build a tree of shortest routes with itself as a root. In the modification of the algorithm, these tables are used by the nodes to check the correspondence of the declared route and the return route, which makes it possible to recognize and exclude from the network an intruder who carries out attacks to disrupt the correct routing mechanism. The effectiveness of the proposed algorithm for protection against routing attacks, in particular, black hole attacks, is confirmed by the results of testing on a program model.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133835602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mapping of Politically Active Groups on Facebook: Dynamics of 2013-2018 Facebook上政治活跃群体的映射:2013-2018年的动态
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-4-94-104
G. Gradoselskaya, T. Scheglova, Ilya Karpov
{"title":"Mapping of Politically Active Groups on Facebook: Dynamics of 2013-2018","authors":"G. Gradoselskaya, T. Scheglova, Ilya Karpov","doi":"10.21681/2311-3456-2019-4-94-104","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-4-94-104","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116758466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Krasnodar Higher Military University of Name General of Army S.M. Shtemenko - 90 Years! 克拉斯诺达尔高等军事大学陆军将军S.M. Shtemenko - 90周年!
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-6-02-03
Yu. E. Kuznecov
{"title":"Krasnodar Higher Military University of Name General of Army S.M. Shtemenko - 90 Years!","authors":"Yu. E. Kuznecov","doi":"10.21681/2311-3456-2019-6-02-03","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-6-02-03","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131060313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Voprosy kiberbezopasnosti
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1