Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2019-4-61-71
Dmitry Leschyov, Daniel Suchkov, S. Khaykova, A. Chepovskiy
{"title":"Algorithms to Reveal Communication Groups","authors":"Dmitry Leschyov, Daniel Suchkov, S. Khaykova, A. Chepovskiy","doi":"10.21681/2311-3456-2019-4-61-71","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-4-61-71","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121553807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2019-5-34-41
S. Migalin, A. Skuratov, A. Los
{"title":"Study the Possibility of Developing a Universal Tool for Tunneling TCP-traffic the DNS Protocol","authors":"S. Migalin, A. Skuratov, A. Los","doi":"10.21681/2311-3456-2019-5-34-41","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-5-34-41","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116051820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2019-1-59-68
V. Leontiev, E. Gordeev
{"title":"On the Algebraic Immunity of Coding Systems","authors":"V. Leontiev, E. Gordeev","doi":"10.21681/2311-3456-2019-1-59-68","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-1-59-68","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114859384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2019-4-94-104
G. Gradoselskaya, T. Scheglova, Ilya Karpov
{"title":"Mapping of Politically Active Groups on Facebook: Dynamics of 2013-2018","authors":"G. Gradoselskaya, T. Scheglova, Ilya Karpov","doi":"10.21681/2311-3456-2019-4-94-104","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-4-94-104","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116758466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2019-1-35-44
E. Basan, A. Basan, O. Makarevich, Lyudmila Babenko
{"title":"Studying the Impact of Active Network Attacks on a Mobile Robots Group","authors":"E. Basan, A. Basan, O. Makarevich, Lyudmila Babenko","doi":"10.21681/2311-3456-2019-1-35-44","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-1-35-44","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121400566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2022-2-27-38
V. Vasilyev, A. Vulfin, Nailya Kuchkarova
Purpose: development of an automated system for assessing current threats to the security of software of industrial automation systems based on the technology of Transformers. Methods: comparison of the set of identified software vulnerabilities, corresponding tactics (techniques) and relevant threats to information security by assessing the semantic proximity metrics of their text descriptions using Text Mining technology based on transformers models. Practical relevance: an automated system for assessing current software security threats has been developed, which makes it possible to compare and rank information and cyber security threats for identified vulnerabilities from the FSTEC of Russia Information Security Threats Databank, to automate the selection of techniques and tactics for constructing threat scenarios. The results of the comparative analysis show that the use of this system makes it possible to simplify the procedure for selecting potential threats and comparing vulnerabilities to them, in addition, a possible set of tactics and techniques is automatically generated, which makes it possible to reduce the time spent on building scenarios for the implementation of threats.
{"title":"Assessment of Current Threats to Information Security Using Transformer Technology","authors":"V. Vasilyev, A. Vulfin, Nailya Kuchkarova","doi":"10.21681/2311-3456-2022-2-27-38","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-2-27-38","url":null,"abstract":"Purpose: development of an automated system for assessing current threats to the security of software of industrial automation systems based on the technology of Transformers. Methods: comparison of the set of identified software vulnerabilities, corresponding tactics (techniques) and relevant threats to information security by assessing the semantic proximity metrics of their text descriptions using Text Mining technology based on transformers models. Practical relevance: an automated system for assessing current software security threats has been developed, which makes it possible to compare and rank information and cyber security threats for identified vulnerabilities from the FSTEC of Russia Information Security Threats Databank, to automate the selection of techniques and tactics for constructing threat scenarios. The results of the comparative analysis show that the use of this system makes it possible to simplify the procedure for selecting potential threats and comparing vulnerabilities to them, in addition, a possible set of tactics and techniques is automatically generated, which makes it possible to reduce the time spent on building scenarios for the implementation of threats.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125143378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2019-6-59-68
S. Kondakov, T. Meshcheryakova, Skryl’ Sergey, A. Stadnik, A. Suvorov
{"title":"Probabilistic Representations of Conditions for Timely Response to Computer Attack Threats","authors":"S. Kondakov, T. Meshcheryakova, Skryl’ Sergey, A. Stadnik, A. Suvorov","doi":"10.21681/2311-3456-2019-6-59-68","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-6-59-68","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128022685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2019-2-13-20
D. Lavrova, D. Zegzhda, E. Zaitceva
{"title":"Simulation of Complex Objects Network Infrastructure to Solve The Problem of Counteraction to Cyber Attacks","authors":"D. Lavrova, D. Zegzhda, E. Zaitceva","doi":"10.21681/2311-3456-2019-2-13-20","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-2-13-20","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129716128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2019-6-02-03
Yu. E. Kuznecov
{"title":"Krasnodar Higher Military University of Name General of Army S.M. Shtemenko - 90 Years!","authors":"Yu. E. Kuznecov","doi":"10.21681/2311-3456-2019-6-02-03","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-6-02-03","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131060313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2023-2-23-35
N. Sidnyaev, E. Sineva
The purpose of the research is to develop the concept of systematization of the knowledge base and solving problems of information cybersecurity of systems and when making search decisions based on the construction of a structured semantic content model of terms of a scientific and theoretical nature describing complex active systems. Research methods: statistical analysis, hypothesis testing methods, machine learning methods, reliability models, evaluation type models used in testing reliability indicators, parameters of behavioral systems. The result obtained: The result obtained: experimental results of the application of reliability evaluation models and consent criteria to different sizes of knowledge bases are discussed and the evaluation of the results of measuring the reliability index on these components, taking into account the failure rate, is given. The description of generalized algorithms for the functioning of evaluation and forecasting components, as well as their applicability to solving problems in the field of information security, is given. A general model of a spatial network is proposed, within the framework of which the subject carries out risk management by effectively, in one sense or another, distributing the homogeneous resource at his disposal between its nodes. For the implementation of decision-making, more optimistic criteria than the minimax criterion are recommended. Scientific novelty: consists in the development of mathematical models to maintain the logical and physical integrity of the knowledge bases of cybersystems using the desirability function and consent criteria. The basic requirements for ensuring reliable behavior and operability of an information system using oriented databases are highlighted and described. It is postulated that the best information system reliability is achieved through the use of automated monitoring systems using knowledge bases for continuous monitoring and periodic analysis of cybersystem objects with tracking the dynamics of changes in the event space.
{"title":"CONSTRUCTION OF COMPOSITE CRITERIA FOR OPTIMIZATION OF TERMS AND GENERALIZED INDICATOR OF KNOWLEDGE BASES OF INTELLIGENT SYSTEMS","authors":"N. Sidnyaev, E. Sineva","doi":"10.21681/2311-3456-2023-2-23-35","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-2-23-35","url":null,"abstract":"The purpose of the research is to develop the concept of systematization of the knowledge base and solving problems of information cybersecurity of systems and when making search decisions based on the construction of a structured semantic content model of terms of a scientific and theoretical nature describing complex active systems. Research methods: statistical analysis, hypothesis testing methods, machine learning methods, reliability models, evaluation type models used in testing reliability indicators, parameters of behavioral systems. The result obtained: The result obtained: experimental results of the application of reliability evaluation models and consent criteria to different sizes of knowledge bases are discussed and the evaluation of the results of measuring the reliability index on these components, taking into account the failure rate, is given. The description of generalized algorithms for the functioning of evaluation and forecasting components, as well as their applicability to solving problems in the field of information security, is given. A general model of a spatial network is proposed, within the framework of which the subject carries out risk management by effectively, in one sense or another, distributing the homogeneous resource at his disposal between its nodes. For the implementation of decision-making, more optimistic criteria than the minimax criterion are recommended. Scientific novelty: consists in the development of mathematical models to maintain the logical and physical integrity of the knowledge bases of cybersystems using the desirability function and consent criteria. The basic requirements for ensuring reliable behavior and operability of an information system using oriented databases are highlighted and described. It is postulated that the best information system reliability is achieved through the use of automated monitoring systems using knowledge bases for continuous monitoring and periodic analysis of cybersystem objects with tracking the dynamics of changes in the event space.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129009160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}