Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2019-6-17-36
S. Dichenko, O. Finko
{"title":"Hybrid Crypto-Code Method for Monitoring and Recovery of Data Integrity for Protected Information and Analytical Systems","authors":"S. Dichenko, O. Finko","doi":"10.21681/2311-3456-2019-6-17-36","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-6-17-36","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131985716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2019-4-72-79
A. Kovalev, Julia Kuznetsova, A. Minin, M. Penkina, I. Smirnov, M. Stankevich, N. Chudova
{"title":"Text Analysis Approach for Identifying Psychological Characteristics (with Aggressiveness as an Example)","authors":"A. Kovalev, Julia Kuznetsova, A. Minin, M. Penkina, I. Smirnov, M. Stankevich, N. Chudova","doi":"10.21681/2311-3456-2019-4-72-79","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-4-72-79","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134408885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2019-6-113-122
V. Golovskoy, Y. Chernuha, D. Semenyuk
{"title":"Formalization of the Problem of Creating a Data Transmission System in a Robotic System Operating in Conditions of Antagonistic Cyber-Electromagnetic Activity","authors":"V. Golovskoy, Y. Chernuha, D. Semenyuk","doi":"10.21681/2311-3456-2019-6-113-122","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-6-113-122","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132170449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2023-1-13-27
Igor Kotenko, I. Saenko, R. Zakharchenko, Dmitry Velichko
The purpose of the article: conducting a system analysis of the requirements for the subsystem for preventing computer attacks on critical information infrastructure in order to substantiate the directions for further improved scientific and methodological apparatus for the full functioning of the subsystem for preventing computer attacks. Research method: theoretical and systematic analysis of the requirements of legal acts, scientific publications, protection technologies and means of their implementation in departmental systems for detecting and counteringcomputer attacks.The result obtained: the rationale for the need to build mechanisms for preventing computer attacks on critical information infrastructure objects and the requirements for the subsystem for preventing computer attacks was carried out, an approach was proposed to prevent computer attacks at the stages of reconnaissance by an attacker of critical information infrastructure objects, based on the introduction of a security event correlation mechanism with automatic adaptation to the analyzed information infrastructure and the functions it performs at the current time and a detailed specification of the correlation rules.Scope of the proposed approach: a subsystem for preventing computer attacks of departmental systems for detecting and countering computer attacks, which should identify and prevent attempts to conduct computer attacks on critical information infrastructure objects in advance.The scientific novelty consists in a comprehensive analysis of the need to build mechanisms for preventing computer attacks on critical information infrastructure objects, an analysis of the requirements for the computer attack prevention subsystem, its functions and means of implementation. It is shown that the functions of preventing computer attacks in domestic technical solutions are not fully implemented, and that there is a substitution of the concept of “subsystem for preventing computer attacks” by the concept of “control and technical measures”. It is substantiated that for the implementation of the functions of preventing computer attacks, there is a technological backlog in the form of a ready-made technology based on the technology for building SIEM systems. It is shown that there is a need to refine the scientific and methodological apparatus for implementing computer warning functions based on artificial intelligence methods and big data technologies.Contribution: Kotenko I.V. - analysis of the functionality of the subsystem for preventing computer attacks, setting the task and proposals for developing the functionality of the subsystem for preventing computer attacks on critical information infrastructure objects; Saenko I.B. - analysis of the subsystem for preventing computer attacks in the general context of the theory of information security, substantiation of the implementation of the functions of preventing computer attacks based on the technology of building SIEM systems a
{"title":"Subsystem for Prevention of Computer Attacks Against Objects of Critical Information Infrastructure: Analysis of Functioning and Implementation","authors":"Igor Kotenko, I. Saenko, R. Zakharchenko, Dmitry Velichko","doi":"10.21681/2311-3456-2023-1-13-27","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-1-13-27","url":null,"abstract":"The purpose of the article: conducting a system analysis of the requirements for the subsystem for preventing computer attacks on critical information infrastructure in order to substantiate the directions for further improved scientific and methodological apparatus for the full functioning of the subsystem for preventing computer attacks. Research method: theoretical and systematic analysis of the requirements of legal acts, scientific publications, protection technologies and means of their implementation in departmental systems for detecting and counteringcomputer attacks.The result obtained: the rationale for the need to build mechanisms for preventing computer attacks on critical information infrastructure objects and the requirements for the subsystem for preventing computer attacks was carried out, an approach was proposed to prevent computer attacks at the stages of reconnaissance by an attacker of critical information infrastructure objects, based on the introduction of a security event correlation mechanism with automatic adaptation to the analyzed information infrastructure and the functions it performs at the current time and a detailed specification of the correlation rules.Scope of the proposed approach: a subsystem for preventing computer attacks of departmental systems for detecting and countering computer attacks, which should identify and prevent attempts to conduct computer attacks on critical information infrastructure objects in advance.The scientific novelty consists in a comprehensive analysis of the need to build mechanisms for preventing computer attacks on critical information infrastructure objects, an analysis of the requirements for the computer attack prevention subsystem, its functions and means of implementation. It is shown that the functions of preventing computer attacks in domestic technical solutions are not fully implemented, and that there is a substitution of the concept of “subsystem for preventing computer attacks” by the concept of “control and technical measures”. It is substantiated that for the implementation of the functions of preventing computer attacks, there is a technological backlog in the form of a ready-made technology based on the technology for building SIEM systems. It is shown that there is a need to refine the scientific and methodological apparatus for implementing computer warning functions based on artificial intelligence methods and big data technologies.Contribution: Kotenko I.V. - analysis of the functionality of the subsystem for preventing computer attacks, setting the task and proposals for developing the functionality of the subsystem for preventing computer attacks on critical information infrastructure objects; Saenko I.B. - analysis of the subsystem for preventing computer attacks in the general context of the theory of information security, substantiation of the implementation of the functions of preventing computer attacks based on the technology of building SIEM systems a","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133946304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2022-1-76-86
P. Zakalkin
The purpose of the study: to identify the main systems that control cyberspace and the key elements whose management will allow controlling a given segment of cyberspace. Research method: theory of complex systems; synergetic. Result: The paper considers the main control systems that play a key role in the management of cyberspace, highlights the structural elements of cyberspace and their interrelations with each other. Regional and local Internet registrars are considered, their coherence graph is presented, as well as the coherence graph by country. Based on the study, the author’s vision of the organizational structure of the cyberspace management system (in relation to domain names and IP addresses). Autonomous systems and traffic exchange points are considered, the structure of external connectivity of autonomous systems and its change over time are given on examples. The largest telecommunication alliances are presented, which have an impact on the activities of telecom operators (directly or indirectly) and, as a result, on the set of resources and services (as well as their cost) received by end users provided by telecommunication operators. Scientific novelty: the considered structure of the cyberspace management system made it possible to identify the main systems that control cyberspace and the key elements whose management will allow controlling a given segment of cyberspace.
{"title":"EVOLUTION OF CYBERSPACE MANAGEMENT SYSTEMS","authors":"P. Zakalkin","doi":"10.21681/2311-3456-2022-1-76-86","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-1-76-86","url":null,"abstract":"The purpose of the study: to identify the main systems that control cyberspace and the key elements whose management will allow controlling a given segment of cyberspace. Research method: theory of complex systems; synergetic. Result: The paper considers the main control systems that play a key role in the management of cyberspace, highlights the structural elements of cyberspace and their interrelations with each other. Regional and local Internet registrars are considered, their coherence graph is presented, as well as the coherence graph by country. Based on the study, the author’s vision of the organizational structure of the cyberspace management system (in relation to domain names and IP addresses). Autonomous systems and traffic exchange points are considered, the structure of external connectivity of autonomous systems and its change over time are given on examples. The largest telecommunication alliances are presented, which have an impact on the activities of telecom operators (directly or indirectly) and, as a result, on the set of resources and services (as well as their cost) received by end users provided by telecommunication operators. Scientific novelty: the considered structure of the cyberspace management system made it possible to identify the main systems that control cyberspace and the key elements whose management will allow controlling a given segment of cyberspace.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"11 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129190205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2019-4-22-34
Dmitry Bikonov, A. Puzikov, A. Sivtsov, L. Eisymont
{"title":"Three-Level Parallel Programming System for the Hybrid 21-Core Scalar-Vector Microprocessor NM6408MP","authors":"Dmitry Bikonov, A. Puzikov, A. Sivtsov, L. Eisymont","doi":"10.21681/2311-3456-2019-4-22-34","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-4-22-34","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"325 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128456097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2023-1-2-12
A. Markov
{"title":"Major milestone in open source security","authors":"A. Markov","doi":"10.21681/2311-3456-2023-1-2-12","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-1-2-12","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116661658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2021-1-80-89
S. Petrenko
Purpose of the article: development of tools for building a cyber-stable private cloud. The relevance of building a cyber-resilient private cloud is confirmed by the dynamics of growth in the market volume of relevant solutions. According to PRnewswire, the market for private cloud solutions will reach 183 billion USD by 2025. At the same time, the average annual growth rate of the CAGR will be 29.4% during the forecast period. According to the analytical company Grand view research, the global market for private cloud solutions in 2018 was estimated at 30.24 billion US dollars, and it is expected that in the period from 2019 to 2025, the CAGR will be 29.6%. Research methods: It uses a set of open-source solutions that applies the advanced cloud technologies, including distributed data processing models and methods, container orchestration technologies, softwaredefined data storage architecture, and a universal database. Results: Developed tools for building a cyber-stable private cloud. Considered a possible approach to building a cyber-resilient private cloud based on the well-known and proprietary models and methods of the artificial immune systems (AIS), as well as technologies for distributed data processing, container orchestration, and others. In addition, the unique centralized fault-tolerant logging and monitoring subsystem has been developed for the described platform, as well as an innovative cybersecurity subsystem based on the following original technologies.
{"title":"Self-Healing Cloud Computing","authors":"S. Petrenko","doi":"10.21681/2311-3456-2021-1-80-89","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-1-80-89","url":null,"abstract":"Purpose of the article: development of tools for building a cyber-stable private cloud. The relevance of building a cyber-resilient private cloud is confirmed by the dynamics of growth in the market volume of relevant solutions. According to PRnewswire, the market for private cloud solutions will reach 183 billion USD by 2025. At the same time, the average annual growth rate of the CAGR will be 29.4% during the forecast period. According to the analytical company Grand view research, the global market for private cloud solutions in 2018 was estimated at 30.24 billion US dollars, and it is expected that in the period from 2019 to 2025, the CAGR will be 29.6%. Research methods: It uses a set of open-source solutions that applies the advanced cloud technologies, including distributed data processing models and methods, container orchestration technologies, softwaredefined data storage architecture, and a universal database. Results: Developed tools for building a cyber-stable private cloud. Considered a possible approach to building a cyber-resilient private cloud based on the well-known and proprietary models and methods of the artificial immune systems (AIS), as well as technologies for distributed data processing, container orchestration, and others. In addition, the unique centralized fault-tolerant logging and monitoring subsystem has been developed for the described platform, as well as an innovative cybersecurity subsystem based on the following original technologies.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126886244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2023-1-82-92
O. Atakishchev, V. Gribunin, Igor Borisenkov, Mikhail Lysachev
The purpose of the work is to analyze the features of the application of the integrated metagrammar approach of hierarchy analysis to solve the problem of structural-parametric synthesis of information security systems of automated control systems of low-power nuclear power plants.Research method: in order to achieve the goal of the work, the metagrammar approach of hierarchy analysis was used, which is an integration of the metagrammar approach and the Saati hierarchy analysis method.The result of the research: the metagrammar approach of hierarchy analysis is presented in the paper, the features of its application to solve the problem of structural-parametric synthesis of information security systems of automated control systems of low-power nuclear power plants are considered in detail.The scientific novelty lies in the development and analysis of the scientific and applied features of a new integrated metagrammar approach to hierarchy analysis, which allows the synthesis of complex structured information security systems in conditions of partial uncertainty.
{"title":"Metagrammatic Approach to the Analysis of Hierarchies for Synthesis of Security Systems nuclear Power Plants","authors":"O. Atakishchev, V. Gribunin, Igor Borisenkov, Mikhail Lysachev","doi":"10.21681/2311-3456-2023-1-82-92","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-1-82-92","url":null,"abstract":"The purpose of the work is to analyze the features of the application of the integrated metagrammar approach of hierarchy analysis to solve the problem of structural-parametric synthesis of information security systems of automated control systems of low-power nuclear power plants.Research method: in order to achieve the goal of the work, the metagrammar approach of hierarchy analysis was used, which is an integration of the metagrammar approach and the Saati hierarchy analysis method.The result of the research: the metagrammar approach of hierarchy analysis is presented in the paper, the features of its application to solve the problem of structural-parametric synthesis of information security systems of automated control systems of low-power nuclear power plants are considered in detail.The scientific novelty lies in the development and analysis of the scientific and applied features of a new integrated metagrammar approach to hierarchy analysis, which allows the synthesis of complex structured information security systems in conditions of partial uncertainty.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"31 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120984522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}