首页 > 最新文献

Voprosy kiberbezopasnosti最新文献

英文 中文
On the Analogy of the Problems of Optimizing the Choice of Information Security Controls with Some Problems of Communication Theory 信息安全控制措施优化选择问题与通信理论若干问题的类比
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-5-30-35
V. Gribunin, A. Timonov
Purpose of the article: optimization of the choice of information security tools in a multi-level automated system, taking into account higher levels, quality indicators of information security tools, as well as the general financial budget. Demonstration of analogies of solving these problems with known problems from communication theory. Research method: optimal choice of information security tools based on risk analysis and the Lagrange multiplier method; Optimal bit budget allocation based on the Waterfilling optimization algorithm. Optimal placement of information security tools in a multilevel automated system based on bisectional search. Obtained result: the article shows analogies between some problems of communication theory and the optimal choice of information security tools. The well-known problem of the optimal choice of information security tools is solved using the rate-distortion theory, the well-known problem of the optimal budget allocation for their purchase is solved by analogy with the problem of distributing the power of transmitters. For the first time, the problem posed for the optimal placement of information security tools in a multilevel automated system was solved by analogy with the problem of distributing the total bit budget between quantizers.
本文的目的:优化多层次自动化系统中信息安全工具的选择,考虑到更高层次的信息安全工具的质量指标,以及一般的财务预算。用交际理论中的已知问题来解决这些问题的类比论证。研究方法:基于风险分析和拉格朗日乘数法的信息安全工具优化选择;基于注水优化算法的最优比特预算分配。基于对分搜索的多级自动化系统中信息安全工具的优化配置。得到的结果是:本文展示了通信理论的一些问题与信息安全工具的最佳选择之间的相似性。利用率失真理论解决了众所周知的信息安全工具的最优选择问题,用发射机功率分配问题类比解决了众所周知的信息安全工具的最优预算分配问题。首次将多级自动化系统中信息安全工具的最佳配置问题类比为在量化器之间分配总比特预算的问题。
{"title":"On the Analogy of the Problems of Optimizing the Choice of Information Security Controls with Some Problems of Communication Theory","authors":"V. Gribunin, A. Timonov","doi":"10.21681/2311-3456-2021-5-30-35","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-5-30-35","url":null,"abstract":"Purpose of the article: optimization of the choice of information security tools in a multi-level automated system, taking into account higher levels, quality indicators of information security tools, as well as the general financial budget. Demonstration of analogies of solving these problems with known problems from communication theory. Research method: optimal choice of information security tools based on risk analysis and the Lagrange multiplier method; Optimal bit budget allocation based on the Waterfilling optimization algorithm. Optimal placement of information security tools in a multilevel automated system based on bisectional search. Obtained result: the article shows analogies between some problems of communication theory and the optimal choice of information security tools. The well-known problem of the optimal choice of information security tools is solved using the rate-distortion theory, the well-known problem of the optimal budget allocation for their purchase is solved by analogy with the problem of distributing the power of transmitters. For the first time, the problem posed for the optimal placement of information security tools in a multilevel automated system was solved by analogy with the problem of distributing the total bit budget between quantizers.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"374 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124683253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A METHOD OF PARAMETRIC SYNTHESIS OF CRYPTO-CODE STRUCTURES FOR MONITORING AND RESTORING THE INTEGRITY OF INFORMATION 一种用于监控和恢复信息完整性的密码结构的参数合成方法
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2023-2-36-51
S. Dichenko, Dmitry Samoilenko, O. Finko, Konstantin Ryumshin
The purpose of the work is to develop a method for monitoring and restoring the integrity of information in secure multidimensional data storage systems that ensures the stability of the systems under consideration under the destructive influences of an intruder and disturbances in the operating environment. Research method: in the course of the research, the scientific and methodological apparatus of the theory of algebraic systems was used in conjunction with the methods of cryptographic information protection and the mathematical apparatus of coding theory to implement the procedures of crypto-code transformations. Models of reliable data storage systems were studied to justify the feasibility of procedures for ensuring the confirmed integrity of the processed information. Results of the study: a method for formalized representation of information in secure multidimensional data storage systems used in the interests of information and analytical systems, which makes it possible to visually describe the developed structures for monitoring and restoring data integrity under the destructive influences of an intruder and disturbances in the operating environment. A mathematical model of the process of monitoring and restoring data integrity based on crypto-code transformations based on the aggregation of cryptographic methods and methods of error-correcting coding is presented. Combining well-known classical solutions to ensure data integrity will reduce the introduced redundancy, as well as expand the functionality of secure information and analytical systems, which consists in confirming the reliability of restoring the integrity of distorted or lost data without additional costs of their repeated control by cryptographic methods. The proposed model takes into account the structure of multidimensional representation of information in the considered data storage systems of information and analytical systems. Scientific novelty: the developed method of parametric synthesis of crypto-code structures for monitoring and restoring the integrity of information in secure multidimensional data storage systems differs from the known ones by obtaining optimal crypto-code structures due to the rational aggregation of cryptographic and code transformations in the parameter space of the considered data storage systems. Crypto-code structures formed on the basis of building multidimensional hash codes and performing transformations in extended Galois fields provide cryptographic control and restoration of information integrity with the possibility of flexible introduction of redundancy and confirmation with cryptographic reliability of information integrity after the restoration procedure
这项工作的目的是开发一种监测和恢复安全多维数据存储系统中信息完整性的方法,以确保所考虑的系统在入侵者的破坏性影响和操作环境中的干扰下的稳定性。研究方法:在研究过程中,结合密码学信息保护的方法和编码理论的数学装置,运用代数系统理论的科学方法装置,实现了密码学转换的过程。研究了可靠数据存储系统的模型,以证明确保已处理信息的确认完整性的程序的可行性。研究结果:一种在信息和分析系统中使用的安全多维数据存储系统中对信息进行形式化表示的方法,可以直观地描述已开发的结构,用于在入侵者和操作环境干扰的破坏性影响下监测和恢复数据完整性。提出了一种基于密码学方法和纠错编码方法聚合的基于密码转换的数据完整性监控和恢复过程的数学模型。结合众所周知的经典解决方案来确保数据完整性将减少引入的冗余,并扩展安全信息和分析系统的功能,这包括确认恢复扭曲或丢失数据的完整性的可靠性,而不需要通过加密方法重复控制它们的额外成本。该模型考虑了信息和分析系统的数据存储系统中信息的多维表示结构。科学新颖性:所开发的用于监控和恢复安全多维数据存储系统中信息完整性的密码结构参数综合方法与已知方法不同,它通过在所考虑的数据存储系统的参数空间中合理地聚集密码和代码转换来获得最佳密码结构。建立多维哈希码并在扩展伽罗瓦域中进行转换的基础上形成的密码学结构提供了信息完整性的密码控制和恢复,并且可以灵活地引入冗余,并在恢复过程后以密码可靠性确认信息完整性
{"title":"A METHOD OF PARAMETRIC SYNTHESIS OF CRYPTO-CODE STRUCTURES FOR MONITORING AND RESTORING THE INTEGRITY OF INFORMATION","authors":"S. Dichenko, Dmitry Samoilenko, O. Finko, Konstantin Ryumshin","doi":"10.21681/2311-3456-2023-2-36-51","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-2-36-51","url":null,"abstract":"The purpose of the work is to develop a method for monitoring and restoring the integrity of information in secure multidimensional data storage systems that ensures the stability of the systems under consideration under the destructive influences of an intruder and disturbances in the operating environment. Research method: in the course of the research, the scientific and methodological apparatus of the theory of algebraic systems was used in conjunction with the methods of cryptographic information protection and the mathematical apparatus of coding theory to implement the procedures of crypto-code transformations. Models of reliable data storage systems were studied to justify the feasibility of procedures for ensuring the confirmed integrity of the processed information. Results of the study: a method for formalized representation of information in secure multidimensional data storage systems used in the interests of information and analytical systems, which makes it possible to visually describe the developed structures for monitoring and restoring data integrity under the destructive influences of an intruder and disturbances in the operating environment. A mathematical model of the process of monitoring and restoring data integrity based on crypto-code transformations based on the aggregation of cryptographic methods and methods of error-correcting coding is presented. Combining well-known classical solutions to ensure data integrity will reduce the introduced redundancy, as well as expand the functionality of secure information and analytical systems, which consists in confirming the reliability of restoring the integrity of distorted or lost data without additional costs of their repeated control by cryptographic methods. The proposed model takes into account the structure of multidimensional representation of information in the considered data storage systems of information and analytical systems. Scientific novelty: the developed method of parametric synthesis of crypto-code structures for monitoring and restoring the integrity of information in secure multidimensional data storage systems differs from the known ones by obtaining optimal crypto-code structures due to the rational aggregation of cryptographic and code transformations in the parameter space of the considered data storage systems. Crypto-code structures formed on the basis of building multidimensional hash codes and performing transformations in extended Galois fields provide cryptographic control and restoration of information integrity with the possibility of flexible introduction of redundancy and confirmation with cryptographic reliability of information integrity after the restoration procedure","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114456767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum Resilience Estimation Method Blockchain 量子弹性估计方法区块链
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-3-2-22
Alexei Petrenko, S. Petrenko
Abstract Purpose of work is the development of a new method for estimating the quantum resilience of modern blockchain platforms based on the effective solution of cryptanalysis problems for asymmetric encryption schemes (RSA, El-Gamal) and digital signature (DSA, ECDSA or RSA-PSS), based on computationally difficult problems of factorization and discrete logarithm. Research method is the use of quantum algorithms providing exponential gain (eg Shor’s algorithm) and quadratic gain (eg Grover’s algorithm). Due to the fact that the class of problems solved by quantum algorithms in polynomial time cannot yet be significantly expanded, more attention is paid to cryptanalysis based on the quantum Shor algorithm and other polynomial algorithms. Results of the study include a classification of well-known algorithms and software packages for cryptanalysis of asymmetric encryption schemes (RSA, El-Gamal) and digital signature (DSA, ECDSA or RSA-PSS) based on computationally difficult problems of factorization and discrete logarithm has been built. A promising method for solving problems of cryptanalysis of asymmetric encryption schemes (RSA, ElGamal) and digital signature (DSA, ECDSA or RSA-PSS) of known blockchain platforms in polynomial time in a quantum computing model is proposed. Algorithms for solving problems of quantum cryptanalysis of two-key cryptography schemes of known blockchain platforms in polynomial time are developed, taking into account the security of the discrete algorithm (DLP) and the discrete elliptic curve algorithm (ECDLP). A structural and functional diagram of the software package for quantum cryptanalysis of modern blockchain platforms “Kvant-K”, adapted to work in a hybrid computing environment of the IBM Q quantum computer (20 and 100 qubits) and the IBM BladeCenter (2022) supercomputer, has been designed. A methodology has been developed for using the “Kvant-K” software package to assess the quantum stability of blockchain platforms: InnoChain (Innopolis University), Waves Enterprise (Waves, Vostok), Hyperledger Fabric (Linux, IBM), Corda Enterprise, Bitfury Exonum, Blockchain Industrial Alliance, Exonum (Bitfury CIS), NodesPlus (b41), Masterchain (Sberbank), Microsoft Azure Blockchain, Enterprise Ethereum Alliance, etc. Practical relevance: The developed new solution for computationally difficult problems of factorization and discrete logarithm, given over finite commutative (and non-commutative) associative algebras, in a quantum model of computing in polynomial time. It is essential that the obtained scientific results formed the basis for the development of the corresponding software and hardware complex “Kvant-K”, which was tested in a hybrid computing environment (quantum computer IBM Q (20 and 100 qubits) and/or 5th generation supercomputer: IBM BladeCenter (2022), RCS based on FPGA Virtex UltraScale (2020), RFNC-VNIIEF (2022) and SKIF P-0.5 (2021). An appropriate method for estimating the quantum stability of these b
工作目的是基于有效解决非对称加密方案(RSA, El-Gamal)和数字签名(DSA, ECDSA或RSA- pss)的密码分析问题,基于分解和离散对数的计算难题,开发一种估计现代区块链平台量子弹性的新方法。研究方法是利用量子算法提供指数增益(如肖尔算法)和二次增益(如格罗弗算法)。由于量子算法在多项式时间内解决的问题类别尚未得到显著扩展,因此基于量子Shor算法和其他多项式算法的密码分析受到了更多的关注。研究结果包括基于分解和离散对数的计算困难问题的非对称加密方案(RSA, El-Gamal)和数字签名(DSA, ECDSA或RSA- pss)的密码分析的知名算法和软件包的分类。提出了一种在量子计算模型中多项式时间内解决已知区块链平台的非对称加密方案(RSA, ElGamal)和数字签名(DSA, ECDSA或RSA- pss)的密码分析问题的有前途的方法。考虑离散算法(DLP)和离散椭圆曲线算法(ECDLP)的安全性,提出了在多项式时间内求解已知区块链平台双密钥加密方案量子密码分析问题的算法。设计了适用于IBM Q量子计算机(20和100量子位)和IBM BladeCenter(2022)超级计算机混合计算环境的现代区块链平台“Kvant-K”量子密码分析软件包的结构和功能图。已经开发了一种方法,用于使用“Kvant-K”软件包来评估区块链平台的量子稳定性:InnoChain (Innopolis University), Waves Enterprise (Waves, Vostok), Hyperledger Fabric (Linux, IBM), Corda Enterprise, Bitfury Exonum,区块链工业联盟,Exonum (Bitfury CIS), NodesPlus (b41), Masterchain (Sberbank),微软Azure区块链,企业以太坊联盟等。实际意义:在多项式时间计算的量子模型中,为因式分解和离散对数的计算困难问题开发了新的解决方案,给出了有限交换(和非交换)关联代数。至关重要的是,获得的科学成果为开发相应的软硬件综合体“Kvant-K”奠定了基础,该综合体在混合计算环境(量子计算机IBM Q(20和100量子位)和/或第五代超级计算机:IBM BladeCenter(2022)、基于FPGA Virtex UltraScale的RCS(2020)、RFNC-VNIIEF(2022)和SKIF P-0.5(2021))中进行了测试。基于作者的量子密码分析模型、方法和算法,开发并测试了一种合适的方法来估计这些区块链平台的量子稳定性。关键词:区块链和分布式账本技术(DLT)、SMART合约、区块链安全威胁模型、量子安全威胁、密码攻击、量子密码分析、量子和后量子密码、量子算法Shor、Grover和Simon算法、量子傅立叶变换、因数分解和离散对数问题、后量子密码、区块链平台的量子弹性。
{"title":"Quantum Resilience Estimation Method Blockchain","authors":"Alexei Petrenko, S. Petrenko","doi":"10.21681/2311-3456-2022-3-2-22","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-3-2-22","url":null,"abstract":"Abstract Purpose of work is the development of a new method for estimating the quantum resilience of modern blockchain platforms based on the effective solution of cryptanalysis problems for asymmetric encryption schemes (RSA, El-Gamal) and digital signature (DSA, ECDSA or RSA-PSS), based on computationally difficult problems of factorization and discrete logarithm. Research method is the use of quantum algorithms providing exponential gain (eg Shor’s algorithm) and quadratic gain (eg Grover’s algorithm). Due to the fact that the class of problems solved by quantum algorithms in polynomial time cannot yet be significantly expanded, more attention is paid to cryptanalysis based on the quantum Shor algorithm and other polynomial algorithms. Results of the study include a classification of well-known algorithms and software packages for cryptanalysis of asymmetric encryption schemes (RSA, El-Gamal) and digital signature (DSA, ECDSA or RSA-PSS) based on computationally difficult problems of factorization and discrete logarithm has been built. A promising method for solving problems of cryptanalysis of asymmetric encryption schemes (RSA, ElGamal) and digital signature (DSA, ECDSA or RSA-PSS) of known blockchain platforms in polynomial time in a quantum computing model is proposed. Algorithms for solving problems of quantum cryptanalysis of two-key cryptography schemes of known blockchain platforms in polynomial time are developed, taking into account the security of the discrete algorithm (DLP) and the discrete elliptic curve algorithm (ECDLP). A structural and functional diagram of the software package for quantum cryptanalysis of modern blockchain platforms “Kvant-K”, adapted to work in a hybrid computing environment of the IBM Q quantum computer (20 and 100 qubits) and the IBM BladeCenter (2022) supercomputer, has been designed. A methodology has been developed for using the “Kvant-K” software package to assess the quantum stability of blockchain platforms: InnoChain (Innopolis University), Waves Enterprise (Waves, Vostok), Hyperledger Fabric (Linux, IBM), Corda Enterprise, Bitfury Exonum, Blockchain Industrial Alliance, Exonum (Bitfury CIS), NodesPlus (b41), Masterchain (Sberbank), Microsoft Azure Blockchain, Enterprise Ethereum Alliance, etc. Practical relevance: The developed new solution for computationally difficult problems of factorization and discrete logarithm, given over finite commutative (and non-commutative) associative algebras, in a quantum model of computing in polynomial time. It is essential that the obtained scientific results formed the basis for the development of the corresponding software and hardware complex “Kvant-K”, which was tested in a hybrid computing environment (quantum computer IBM Q (20 and 100 qubits) and/or 5th generation supercomputer: IBM BladeCenter (2022), RCS based on FPGA Virtex UltraScale (2020), RFNC-VNIIEF (2022) and SKIF P-0.5 (2021). An appropriate method for estimating the quantum stability of these b","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120964237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Modern Tendencies of Development of the Technology «Blockchain» and Digital Currencies “区块链”技术与数字货币的现代发展趋势分析
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-5-57-62
R. Astrakhantsev, Alexey Los, R. Muhamadieva
{"title":"Analysis of Modern Tendencies of Development of the Technology «Blockchain» and Digital Currencies","authors":"R. Astrakhantsev, Alexey Los, R. Muhamadieva","doi":"10.21681/2311-3456-2019-5-57-62","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-5-57-62","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126615167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EVOLUTION OF CYBERSPACE MANAGEMENT SYSTEMS 网络空间管理制度的演变
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-1-76-86
P. Zakalkin
The purpose of the study: to identify the main systems that control cyberspace and the key elements whose management will allow controlling a given segment of cyberspace. Research method: theory of complex systems; synergetic. Result: The paper considers the main control systems that play a key role in the management of cyberspace, highlights the structural elements of cyberspace and their interrelations with each other. Regional and local Internet registrars are considered, their coherence graph is presented, as well as the coherence graph by country. Based on the study, the author’s vision of the organizational structure of the cyberspace management system (in relation to domain names and IP addresses). Autonomous systems and traffic exchange points are considered, the structure of external connectivity of autonomous systems and its change over time are given on examples. The largest telecommunication alliances are presented, which have an impact on the activities of telecom operators (directly or indirectly) and, as a result, on the set of resources and services (as well as their cost) received by end users provided by telecommunication operators. Scientific novelty: the considered structure of the cyberspace management system made it possible to identify the main systems that control cyberspace and the key elements whose management will allow controlling a given segment of cyberspace.
这项研究的目的是:确定控制网络空间的主要系统和关键要素,其管理将允许控制网络空间的给定部分。研究方法:复杂系统理论;协同作用的。结果:本文考虑了在网络空间管理中起关键作用的主要控制系统,突出了网络空间的结构要素及其相互关系。考虑了区域和本地互联网注册商,给出了它们的一致性图,以及国家的一致性图。在研究的基础上,作者对网络空间管理系统的组织结构(涉及域名和IP地址)进行了展望。考虑了自治系统和交通交换点,给出了自治系统的外部连通性结构及其随时间的变化。介绍了最大的电信联盟,它们对电信运营商的活动(直接或间接)产生影响,从而对电信运营商提供的最终用户获得的资源和服务(及其成本)产生影响。科学新颖性:网络空间管理系统的考虑结构使识别控制网络空间的主要系统和关键要素成为可能,其管理将允许控制网络空间的给定部分。
{"title":"EVOLUTION OF CYBERSPACE MANAGEMENT SYSTEMS","authors":"P. Zakalkin","doi":"10.21681/2311-3456-2022-1-76-86","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-1-76-86","url":null,"abstract":"The purpose of the study: to identify the main systems that control cyberspace and the key elements whose management will allow controlling a given segment of cyberspace. Research method: theory of complex systems; synergetic. Result: The paper considers the main control systems that play a key role in the management of cyberspace, highlights the structural elements of cyberspace and their interrelations with each other. Regional and local Internet registrars are considered, their coherence graph is presented, as well as the coherence graph by country. Based on the study, the author’s vision of the organizational structure of the cyberspace management system (in relation to domain names and IP addresses). Autonomous systems and traffic exchange points are considered, the structure of external connectivity of autonomous systems and its change over time are given on examples. The largest telecommunication alliances are presented, which have an impact on the activities of telecom operators (directly or indirectly) and, as a result, on the set of resources and services (as well as their cost) received by end users provided by telecommunication operators. Scientific novelty: the considered structure of the cyberspace management system made it possible to identify the main systems that control cyberspace and the key elements whose management will allow controlling a given segment of cyberspace.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"11 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129190205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Three-Level Parallel Programming System for the Hybrid 21-Core Scalar-Vector Microprocessor NM6408MP 混合21核标量矢量微处理器NM6408MP的三级并行编程系统
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-4-22-34
Dmitry Bikonov, A. Puzikov, A. Sivtsov, L. Eisymont
{"title":"Three-Level Parallel Programming System for the Hybrid 21-Core Scalar-Vector Microprocessor NM6408MP","authors":"Dmitry Bikonov, A. Puzikov, A. Sivtsov, L. Eisymont","doi":"10.21681/2311-3456-2019-4-22-34","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-4-22-34","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"325 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128456097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Major milestone in open source security 开源安全的重要里程碑
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2023-1-2-12
A. Markov
{"title":"Major milestone in open source security","authors":"A. Markov","doi":"10.21681/2311-3456-2023-1-2-12","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-1-2-12","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116661658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-Healing Cloud Computing 自修复云计算
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-1-80-89
S. Petrenko
Purpose of the article: development of tools for building a cyber-stable private cloud. The relevance of building a cyber-resilient private cloud is confirmed by the dynamics of growth in the market volume of relevant solutions. According to PRnewswire, the market for private cloud solutions will reach 183 billion USD by 2025. At the same time, the average annual growth rate of the CAGR will be 29.4% during the forecast period. According to the analytical company Grand view research, the global market for private cloud solutions in 2018 was estimated at 30.24 billion US dollars, and it is expected that in the period from 2019 to 2025, the CAGR will be 29.6%. Research methods: It uses a set of open-source solutions that applies the advanced cloud technologies, including distributed data processing models and methods, container orchestration technologies, softwaredefined data storage architecture, and a universal database. Results: Developed tools for building a cyber-stable private cloud. Considered a possible approach to building a cyber-resilient private cloud based on the well-known and proprietary models and methods of the artificial immune systems (AIS), as well as technologies for distributed data processing, container orchestration, and others. In addition, the unique centralized fault-tolerant logging and monitoring subsystem has been developed for the described platform, as well as an innovative cybersecurity subsystem based on the following original technologies.
本文的目的:开发用于构建网络稳定私有云的工具。相关解决方案市场容量的动态增长证实了构建具有网络弹性的私有云的重要性。据美通社报道,到2025年,私有云解决方案的市场规模将达到1830亿美元。同时,在预测期内,复合年增长率的年均增长率将为29.4%。根据分析公司Grand view的研究,2018年全球私有云解决方案市场估计为302.4亿美元,预计2019年至2025年期间,复合年增长率将达到29.6%。研究方法:采用一套开源解决方案,采用先进的云技术,包括分布式数据处理模型和方法、容器编排技术、软件定义数据存储架构和通用数据库。结果:开发了构建网络稳定私有云的工具。考虑了基于人工免疫系统(AIS)的知名和专有模型和方法,以及分布式数据处理、容器编排等技术,构建具有网络弹性的私有云的可能方法。此外,针对所描述的平台开发了独特的集中式容错日志与监控子系统,以及基于以下原始技术的创新网络安全子系统。
{"title":"Self-Healing Cloud Computing","authors":"S. Petrenko","doi":"10.21681/2311-3456-2021-1-80-89","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-1-80-89","url":null,"abstract":"Purpose of the article: development of tools for building a cyber-stable private cloud. The relevance of building a cyber-resilient private cloud is confirmed by the dynamics of growth in the market volume of relevant solutions. According to PRnewswire, the market for private cloud solutions will reach 183 billion USD by 2025. At the same time, the average annual growth rate of the CAGR will be 29.4% during the forecast period. According to the analytical company Grand view research, the global market for private cloud solutions in 2018 was estimated at 30.24 billion US dollars, and it is expected that in the period from 2019 to 2025, the CAGR will be 29.6%. Research methods: It uses a set of open-source solutions that applies the advanced cloud technologies, including distributed data processing models and methods, container orchestration technologies, softwaredefined data storage architecture, and a universal database. Results: Developed tools for building a cyber-stable private cloud. Considered a possible approach to building a cyber-resilient private cloud based on the well-known and proprietary models and methods of the artificial immune systems (AIS), as well as technologies for distributed data processing, container orchestration, and others. In addition, the unique centralized fault-tolerant logging and monitoring subsystem has been developed for the described platform, as well as an innovative cybersecurity subsystem based on the following original technologies.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126886244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Metagrammatic Approach to the Analysis of Hierarchies for Synthesis of Security Systems nuclear Power Plants 核电厂安全系统综合层次分析的元元方法
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2023-1-82-92
O. Atakishchev, V. Gribunin, Igor Borisenkov, Mikhail Lysachev
The purpose of the work is to analyze the features of the application of the integrated metagrammar approach of hierarchy analysis to solve the problem of structural-parametric synthesis of information security systems of automated control systems of low-power nuclear power plants.Research method: in order to achieve the goal of the work, the metagrammar approach of hierarchy analysis was used, which is an integration of the metagrammar approach and the Saati hierarchy analysis method.The result of the research: the metagrammar approach of hierarchy analysis is presented in the paper, the features of its application to solve the problem of structural-parametric synthesis of information security systems of automated control systems of low-power nuclear power plants are considered in detail.The scientific novelty lies in the development and analysis of the scientific and applied features of a new integrated metagrammar approach to hierarchy analysis, which allows the synthesis of complex structured information security systems in conditions of partial uncertainty.
本工作的目的是分析应用层次分析法的综合元语法方法解决小功率核电站自动化控制系统信息安全系统结构参数综合问题的特点。研究方法:为了达到工作的目的,采用了层次分析法的元语法方法,这是元语法方法和Saati层次分析法的结合。研究结果:提出了层次分析法的元语法方法,详细讨论了其在解决小功率核电站自动化控制系统信息安全系统结构参数综合问题中的应用特点。科学的新颖性在于开发和分析了一种新的综合元语法层次分析方法的科学和应用特点,该方法允许在部分不确定条件下综合复杂的结构化信息安全系统。
{"title":"Metagrammatic Approach to the Analysis of Hierarchies for Synthesis of Security Systems nuclear Power Plants","authors":"O. Atakishchev, V. Gribunin, Igor Borisenkov, Mikhail Lysachev","doi":"10.21681/2311-3456-2023-1-82-92","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-1-82-92","url":null,"abstract":"The purpose of the work is to analyze the features of the application of the integrated metagrammar approach of hierarchy analysis to solve the problem of structural-parametric synthesis of information security systems of automated control systems of low-power nuclear power plants.Research method: in order to achieve the goal of the work, the metagrammar approach of hierarchy analysis was used, which is an integration of the metagrammar approach and the Saati hierarchy analysis method.The result of the research: the metagrammar approach of hierarchy analysis is presented in the paper, the features of its application to solve the problem of structural-parametric synthesis of information security systems of automated control systems of low-power nuclear power plants are considered in detail.The scientific novelty lies in the development and analysis of the scientific and applied features of a new integrated metagrammar approach to hierarchy analysis, which allows the synthesis of complex structured information security systems in conditions of partial uncertainty.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"31 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120984522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile banking: Information Security Risk Assessment 手机银行:信息安全风险评估
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-2-21-28
P. Revenkov, Dmitry Krupenko
{"title":"Mobile banking: Information Security Risk Assessment","authors":"P. Revenkov, Dmitry Krupenko","doi":"10.21681/2311-3456-2019-2-21-28","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-2-21-28","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128012346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Voprosy kiberbezopasnosti
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1