首页 > 最新文献

Voprosy kiberbezopasnosti最新文献

英文 中文
Model of the Process of Conducting Computer Attacks Using Special Information Influences 利用特殊信息影响进行计算机攻击的过程模型
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-5-12-20
S. Kondakov, Ilya Rud
Purpose of work: development of a model of the process of conducting a computer attack. Research method: theory of complex systems, comparative analysis within the framework of system analysis and synthesis. Result: it is shown that the application of the proposed model of the process of conducting computer attacks allows you to fully describe the process, taking into account its inherent features and characteristics. The use in the model of information from the MITRE ATTACK database of Mitre, which contains a description of the tactics, techniques and methods used by cybercriminals, allows you to reduce the level of abstraction and describe specific scenarios for conducting complex targeted computer attacks with the maximum approximation to practice. The developed model is supposed to be used to form scenarios of computer attacks when assessing the security of information systems.
工作目的:开发计算机攻击过程的模型。研究方法:复杂系统理论、系统分析与综合框架内的比较分析。结果表明,应用所提出的计算机攻击过程模型可以充分描述该过程,并考虑到其固有的特征和特征。使用MITRE的MITRE攻击数据库中的信息模型,其中包含对网络犯罪分子使用的战术,技术和方法的描述,允许您降低抽象级别并描述进行复杂目标计算机攻击的具体场景,并最大限度地接近实践。该模型可用于信息系统安全评估中计算机攻击场景的形成。
{"title":"Model of the Process of Conducting Computer Attacks Using Special Information Influences","authors":"S. Kondakov, Ilya Rud","doi":"10.21681/2311-3456-2021-5-12-20","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-5-12-20","url":null,"abstract":"Purpose of work: development of a model of the process of conducting a computer attack. Research method: theory of complex systems, comparative analysis within the framework of system analysis and synthesis. Result: it is shown that the application of the proposed model of the process of conducting computer attacks allows you to fully describe the process, taking into account its inherent features and characteristics. The use in the model of information from the MITRE ATTACK database of Mitre, which contains a description of the tactics, techniques and methods used by cybercriminals, allows you to reduce the level of abstraction and describe specific scenarios for conducting complex targeted computer attacks with the maximum approximation to practice. The developed model is supposed to be used to form scenarios of computer attacks when assessing the security of information systems.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128127755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Main Cryptographic Mechanisms for Protection of Data, Transmitted to Cloud Services and Storage Area Networks 保护传输到云服务和存储区域网络的数据的主要加密机制
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2020-03-66-75
S. Minakov
. The purpose: development of the technology of cryptographic protection of information in third-party cloud services or storage area networks by using standartizated interfaces, protocols and block ciphers algorithms. Method: system analysis of degradation security information level by data recycling with cloud computing. Research and analysis a science papers of cryptology theory and practice, describe limitations of homomorphic encryption. Cryptosystem synthesis is with analogy methods, hash and block ciphers algorithms. The result : new cryptographic system «Utro» (Eng. – Morrow) for real-time protection of confidential data, transmitted to third-party cloud services or storage area networks. The paper is described main cryptographic mechanisms like
。目的:通过使用标准化接口、协议和分组密码算法,开发第三方云服务或存储区域网络中信息的加密保护技术。方法:利用云计算进行数据回收,对安全信息等级退化进行系统分析。研究分析了密码学的理论与实践,描述了同态加密的局限性。密码系统综合采用类比法、哈希和分组密码算法。其结果是:新的密码系统«Utro»。用于实时保护机密数据,传输到第三方云服务或存储区域网络。本文描述了主要的加密机制,如
{"title":"The Main Cryptographic Mechanisms for Protection of Data, Transmitted to Cloud Services and Storage Area Networks","authors":"S. Minakov","doi":"10.21681/2311-3456-2020-03-66-75","DOIUrl":"https://doi.org/10.21681/2311-3456-2020-03-66-75","url":null,"abstract":". The purpose: development of the technology of cryptographic protection of information in third-party cloud services or storage area networks by using standartizated interfaces, protocols and block ciphers algorithms. Method: system analysis of degradation security information level by data recycling with cloud computing. Research and analysis a science papers of cryptology theory and practice, describe limitations of homomorphic encryption. Cryptosystem synthesis is with analogy methods, hash and block ciphers algorithms. The result : new cryptographic system «Utro» (Eng. – Morrow) for real-time protection of confidential data, transmitted to third-party cloud services or storage area networks. The paper is described main cryptographic mechanisms like","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125753313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RECOGNITION OF CYBER THREATS ON THE ADAPTIVE NETWORK TOPOLOGY OF LARGE-SCALE SYSTEMS BASED ON A RECURRENT NEURAL NETWORK 基于递归神经网络的大规模系统自适应网络拓扑网络威胁识别
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-6-93-99
E. Pavlenko, Nikita Gololobov, D. Lavrova, Andrey Kozachok
The purpose of the article: the development of a method for recognizing cyber threats in adaptive network topologies of large-scale systems based on a recurrent neural network with a long short-term memory. Main research methods: system analysis of existing recognition methods, theoretical formalization, experiment Result: The approach showed a satisfactory efficiency of cyber threat recognition, and the results of the research made it possible to put forward proposals for the further development of this area. Scientific novelty: A model of adaptive network topology is formulated and a new way of recognizing cyber threats on the adaptive network topology of large-scale systems is proposed.
本文的目的:基于具有长短期记忆的递归神经网络,开发一种识别大规模系统自适应网络拓扑中的网络威胁的方法。主要研究方法:对现有识别方法进行系统分析,理论形式化,实验结果:该方法显示了令人满意的网络威胁识别效率,研究结果为该领域的进一步发展提出了建议。新颖性:建立了自适应网络拓扑模型,提出了一种基于大规模系统自适应网络拓扑的网络威胁识别新方法。
{"title":"RECOGNITION OF CYBER THREATS ON THE ADAPTIVE NETWORK TOPOLOGY OF LARGE-SCALE SYSTEMS BASED ON A RECURRENT NEURAL NETWORK","authors":"E. Pavlenko, Nikita Gololobov, D. Lavrova, Andrey Kozachok","doi":"10.21681/2311-3456-2022-6-93-99","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-6-93-99","url":null,"abstract":"The purpose of the article: the development of a method for recognizing cyber threats in adaptive network topologies of large-scale systems based on a recurrent neural network with a long short-term memory. Main research methods: system analysis of existing recognition methods, theoretical formalization, experiment Result: The approach showed a satisfactory efficiency of cyber threat recognition, and the results of the research made it possible to put forward proposals for the further development of this area. Scientific novelty: A model of adaptive network topology is formulated and a new way of recognizing cyber threats on the adaptive network topology of large-scale systems is proposed.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121531468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RESEARCH OF METHODS FOR MONITORING THE LEVEL OF INFORMATION SECURITY AT CRITICAL INFORMATION INFRASTRUCTURE FACILITIES 关键信息基础设施信息安全水平监测方法研究
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-6-40-52
I. Livshitz, Andrew Baksheev
Purpose of work is to analyze the existing practices of performing security analysis and IT-security audit (NIST, OWASP, Cobit, OSSTMM, PTES and GOST R ISO/IEC), used to obtain objective and reliable data for operational security assessments of the CII objects and development of an IT-security audit model for CII objects. Research method: methods of analysis and structural decomposition from the theory of system analysis, identifying signs essential for optimizing the process of IT-security audit for CII objects. Research result: include the detailed analysis and comparison of the existing best practices for performing security analysis and IT-security audit (NIST, OWASP, Cobit, OSSTMM, PTES and GOST R ISO/IEC) for CII objects. A model of IT-security audit for CII objects has been developed. Scientific novelty: an IT-security audit model for CII facilities, characterized by the possibility of a “dual” mode for a full cycle of ensuring the safety of CII facilities – a full national conditional mode and a combined conditional mode, which allows, if necessary, to include additional functional blocks
工作目的是分析执行安全分析和it -安全审计的现有实践(NIST, OWASP, Cobit, OSSTMM, PTES和GOST R ISO/IEC),用于获取客观可靠的数据,用于CII对象的操作安全评估和CII对象的it -安全审计模型的开发。研究方法:从系统分析理论出发,采用分析和结构分解的方法,找出CII对象it安全审计流程优化所必需的标志。研究结果:包括对CII对象执行安全分析和it安全审计的现有最佳实践(NIST、OWASP、Cobit、OSSTMM、PTES和GOST R ISO/IEC)的详细分析和比较。已经开发了用于CII对象的it安全审计模型。科学新颖性:一种CII设施的it安全审计模式,其特点是在确保CII设施安全的整个周期中可能采用“双重”模式——一种完整的国家条件模式和一种组合条件模式,必要时允许包括额外的功能块
{"title":"RESEARCH OF METHODS FOR MONITORING THE LEVEL OF INFORMATION SECURITY AT CRITICAL INFORMATION INFRASTRUCTURE FACILITIES","authors":"I. Livshitz, Andrew Baksheev","doi":"10.21681/2311-3456-2022-6-40-52","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-6-40-52","url":null,"abstract":"Purpose of work is to analyze the existing practices of performing security analysis and IT-security audit (NIST, OWASP, Cobit, OSSTMM, PTES and GOST R ISO/IEC), used to obtain objective and reliable data for operational security assessments of the CII objects and development of an IT-security audit model for CII objects. Research method: methods of analysis and structural decomposition from the theory of system analysis, identifying signs essential for optimizing the process of IT-security audit for CII objects. Research result: include the detailed analysis and comparison of the existing best practices for performing security analysis and IT-security audit (NIST, OWASP, Cobit, OSSTMM, PTES and GOST R ISO/IEC) for CII objects. A model of IT-security audit for CII objects has been developed. Scientific novelty: an IT-security audit model for CII facilities, characterized by the possibility of a “dual” mode for a full cycle of ensuring the safety of CII facilities – a full national conditional mode and a combined conditional mode, which allows, if necessary, to include additional functional blocks","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133994106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of a Research Apparatus for Assessing the Effectiveness of Measures to Ensure the Protection of Personal Data 发展一套研究仪器,以评估保障个人资料的措施的成效
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-5-45-51
S. Kondakov, Kirill Chudin
The purpose of the article: to investigate the prerequisites for the development of a methodological apparatus for ensuring the protection of personal data in the activities of the personnel body of the state secret protection service. Research method. system analysis, synergetics. The result: the procedure for the formation of the appropriate research environment is formulated, the stages of formation of the concept of building a research apparatus for assessing the effectiveness of measures to ensure the protection of personal data in the activities of the personnel body of the state secret protection service are given. The concept of building a research apparatus for assessing the characteristics of measures to ensure the protection of personal data in the activities of the personnel body of the state secret protection service is proposed, which allows forming an environment for an adequate assessment of the effectiveness of such measures, as well as determining a set of hypotheses and analogies necessary for setting and solving the problem of increasing the adequacy of assessing the effectiveness of measures to ensure the protection of personal data in the activities of the personnel body of the state secret protection service as a task of developing mathematical models of the characteristics of threats to the security of personal data and the processes of their protection.
这篇文章的目的是:研究开发一种确保在国家保密局人事机构活动中保护个人数据的方法装置的先决条件。研究方法。系统分析,协同作用。结果:制定了形成适当研究环境的程序,给出了建立研究机构概念的形成阶段,以评估确保在国家保密局人员机构活动中保护个人数据的措施的有效性。提出了建立一个研究机构的概念,以评估确保在国家机密保护机构的人员活动中保护个人数据的措施的特点,从而形成一个充分评估这些措施有效性的环境。以及确定一套必要的假设和类比,以确定和解决增加评估措施有效性的充分性的问题,以确保在国家秘密保护部门的人员机构的活动中保护个人数据,作为建立个人数据安全威胁特征及其保护过程的数学模型的任务。
{"title":"Development of a Research Apparatus for Assessing the Effectiveness of Measures to Ensure the Protection of Personal Data","authors":"S. Kondakov, Kirill Chudin","doi":"10.21681/2311-3456-2021-5-45-51","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-5-45-51","url":null,"abstract":"The purpose of the article: to investigate the prerequisites for the development of a methodological apparatus for ensuring the protection of personal data in the activities of the personnel body of the state secret protection service. Research method. system analysis, synergetics. The result: the procedure for the formation of the appropriate research environment is formulated, the stages of formation of the concept of building a research apparatus for assessing the effectiveness of measures to ensure the protection of personal data in the activities of the personnel body of the state secret protection service are given. The concept of building a research apparatus for assessing the characteristics of measures to ensure the protection of personal data in the activities of the personnel body of the state secret protection service is proposed, which allows forming an environment for an adequate assessment of the effectiveness of such measures, as well as determining a set of hypotheses and analogies necessary for setting and solving the problem of increasing the adequacy of assessing the effectiveness of measures to ensure the protection of personal data in the activities of the personnel body of the state secret protection service as a task of developing mathematical models of the characteristics of threats to the security of personal data and the processes of their protection.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134188590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SELECTING THE MOST DANGEROUS VULNERABILITIES FOR PROSPECTIVE INFORMATION SYSTEMS FOR CRITICAL APPLICATIONS 为关键应用的潜在信息系统选择最危险的漏洞
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-1-66-75
Vitaliy Gryzunov, Anna Grishecko, Dmitriy Sipovich
Abstract The development of information systems of critical application is ahead of changes in regulatory documents of regulators and educational programs of universities. Purpose of work: to determine the most dangerous vulnerabilities for promising information systems of critical application (IS CA). Research method: application of the analysis hierarcihes method to compile a hierarchy of alternatives, including the type of platform for a promising IS CA, aspects of information security, types of vulnerabilities. Conducting a survey of experts using a point assessment. Converting results to a matrix of pairwise comparisons. Getting local and global priorities of alternatives. Result of the study: 25 experts of different ages and with different work experience were interviewed. From the point of view of the interviewed specialists, the best type of platform for a prospective distributed information system of critical application is edge computing. Availability, authenticity and integrity are highlighted as the most important aspects of information security. The most dangerous are the vulnerabilities associated with: 1) incomplete verification of input (input) data, buffer overflow, the possibility of injections, injection of arbitrary code, cross-site scripting, injection of operating system commands, etc.; 2) identification, authentication, granting access and privilege escalation; 3) incorrect configuration of software parameters, management of system resources, access to service information. Less dangerous are vulnerabilities that use the health of hardware and reduce its resistance to the actions of technical means of reconnaissance and electronic warfare. The results can be used to prioritize the procurement of information security products, to update the regulatory framework of regulators and training programs for training information security specialists.
关键应用信息系统的发展是超前于监管部门规范性文件和高校教育计划变化的。工作目的:确定有前途的关键应用信息系统(IS CA)最危险的漏洞。研究方法:应用层次分析法对备选方案进行层次分析,包括有前景的IS CA的平台类型、信息安全方面、漏洞类型等。使用积分评估法对专家进行调查。将结果转换为两两比较的矩阵。获得本地和全球的优先选择。研究结果:访谈了25位不同年龄、不同工作经历的专家。从受访专家的角度来看,关键应用的分布式信息系统的最佳平台类型是边缘计算。可用性、真实性和完整性被强调为信息安全最重要的方面。最危险的是与以下相关的漏洞:1)输入(输入)数据验证不完整、缓冲区溢出、可能注入、注入任意代码、跨站点脚本、注入操作系统命令等;2)识别、认证、授予访问权限和权限升级;3)软件参数配置错误,管理系统资源,获取服务信息。不那么危险的是利用硬件的健康并降低其对侦察和电子战技术手段行动的抵抗力的漏洞。研究结果可用于优先考虑信息安全产品的采购,更新监管机构的监管框架和培训信息安全专家的培训计划。
{"title":"SELECTING THE MOST DANGEROUS VULNERABILITIES FOR PROSPECTIVE INFORMATION SYSTEMS FOR CRITICAL APPLICATIONS","authors":"Vitaliy Gryzunov, Anna Grishecko, Dmitriy Sipovich","doi":"10.21681/2311-3456-2022-1-66-75","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-1-66-75","url":null,"abstract":"Abstract The development of information systems of critical application is ahead of changes in regulatory documents of regulators and educational programs of universities. Purpose of work: to determine the most dangerous vulnerabilities for promising information systems of critical application (IS CA). Research method: application of the analysis hierarcihes method to compile a hierarchy of alternatives, including the type of platform for a promising IS CA, aspects of information security, types of vulnerabilities. Conducting a survey of experts using a point assessment. Converting results to a matrix of pairwise comparisons. Getting local and global priorities of alternatives. Result of the study: 25 experts of different ages and with different work experience were interviewed. From the point of view of the interviewed specialists, the best type of platform for a prospective distributed information system of critical application is edge computing. Availability, authenticity and integrity are highlighted as the most important aspects of information security. The most dangerous are the vulnerabilities associated with: 1) incomplete verification of input (input) data, buffer overflow, the possibility of injections, injection of arbitrary code, cross-site scripting, injection of operating system commands, etc.; 2) identification, authentication, granting access and privilege escalation; 3) incorrect configuration of software parameters, management of system resources, access to service information. Less dangerous are vulnerabilities that use the health of hardware and reduce its resistance to the actions of technical means of reconnaissance and electronic warfare. The results can be used to prioritize the procurement of information security products, to update the regulatory framework of regulators and training programs for training information security specialists.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132940818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Assessment of the Risk of a Cybersecurity Breach in a Commercial Bank (by the Example of an Attacks “Brute Force” and “Black Box” on ATMS) 商业银行网络安全漏洞风险评估(以自动柜员机“暴力破解”和“黑盒”攻击为例)
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-3-20-30
P. Revenkov, A. Berdyugin, P. Makeev
Abstract. During the XX–XXI century there was a development of technologies, which resulted in the creation of a global financial system that allows you to quickly make money transactions in opposite points of the Earth. The progress of digital transformation of society and, in particular, financial and economic systems leads to the complication of the problems of information security of competing entities. By focusing on scientific research, we can achieve success in these areas. The purpose of the study: to increase the level of security of banking services for individuals and legal entities in accordance with the recommendations of information security standards by analyzing the risk of information security violations in electronic banking technologies (on the example of the “Brute force” and “Black box” attacks). Research methods: empirical methods of scientific knowledge (observation, measurement, experiment), theoretical methods (analysis, synthesis, induction, deduction, abstraction, formalization), graphical interpretation of information, probability theory methods and computer programming. The result of the study: standards for effective management of information security management at the enterprise are considered. The advantage of social engineering methods over the “Brute force” method of PIN codes is shown quantitatively. The time characteristics of its commission and protective measures against attacks of the “Black box” type are analyzed. A method for improving the effectiveness of the response and protection of ATMS from attacks of the “Black box” type is proposed.
摘要在20 - 21世纪,技术的发展导致了全球金融体系的建立,这使得你可以在地球的两端快速进行货币交易。社会,特别是金融和经济系统数字化转型的进展导致竞争实体的信息安全问题复杂化。通过注重科学研究,我们可以在这些领域取得成功。研究的目的是:通过分析电子银行技术中违反信息安全的风险(以“暴力破解”和“黑盒”攻击为例),根据信息安全标准的建议,提高个人和法人的银行服务的安全水平。研究方法:科学知识的经验方法(观察、测量、实验),理论方法(分析、综合、归纳、演绎、抽象、形式化),信息的图形化解释,概率论方法和计算机编程。研究的结果是:考虑企业信息安全管理的有效管理标准。社会工程方法相对于PIN码的“蛮力”方法的优势是定量显示的。分析了其运行的时间特征和针对“黑匣子”型攻击的防护措施。提出了一种提高atm系统对“黑匣子”攻击的响应和防护效率的方法。
{"title":"Assessment of the Risk of a Cybersecurity Breach in a Commercial Bank (by the Example of an Attacks “Brute Force” and “Black Box” on ATMS)","authors":"P. Revenkov, A. Berdyugin, P. Makeev","doi":"10.21681/2311-3456-2021-3-20-30","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-3-20-30","url":null,"abstract":"Abstract. During the XX–XXI century there was a development of technologies, which resulted in the creation of a global financial system that allows you to quickly make money transactions in opposite points of the Earth. The progress of digital transformation of society and, in particular, financial and economic systems leads to the complication of the problems of information security of competing entities. By focusing on scientific research, we can achieve success in these areas. The purpose of the study: to increase the level of security of banking services for individuals and legal entities in accordance with the recommendations of information security standards by analyzing the risk of information security violations in electronic banking technologies (on the example of the “Brute force” and “Black box” attacks). Research methods: empirical methods of scientific knowledge (observation, measurement, experiment), theoretical methods (analysis, synthesis, induction, deduction, abstraction, formalization), graphical interpretation of information, probability theory methods and computer programming. The result of the study: standards for effective management of information security management at the enterprise are considered. The advantage of social engineering methods over the “Brute force” method of PIN codes is shown quantitatively. The time characteristics of its commission and protective measures against attacks of the “Black box” type are analyzed. A method for improving the effectiveness of the response and protection of ATMS from attacks of the “Black box” type is proposed.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134131597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES 物联网设备的安全和隐私测量系统
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-5-28-46
E. Fedorchenko, E. Novikova, Igor Kotenko, D. Gaifulina, O. Tushkanova, D. Levshun, A. Meleshko, I. Murenin, Maxim Kolomeec
The purpose of the article: elimination of the gap in existing need in the set of clear and objective security and privacy metrics for the IoT devices users and manufacturers and an absence of such a set incorporating the interconnected security and privacy metrics, the algorithms for their calculation and generation of the integral clear and objective score by the development of the security and privacy measuring system for the IoT devices. Research method: theoretical and system analysis for determination and classification of the security and privacy metrics, semantic analysis for generating of the semantic model of personal data processing scenarios, analytical modeling methods for generating of the attack traces, log analysis methods, statistical methods and machine learning methods for searching of the anomalies in device behavior, development of the database and software implementing the proposed security and privacy measuring system. The result obtained: the security and privacy measuring system for the IoT devices users and manufacturers is proposed. The proposed system allows automated calculation of the security and privacy metrics based on the available data on the device and generation of the integral security and privacy score. The hierarchy of security and privacy metrics is developed in the scope of the proposed system. The proposed metrics are calculated using static and dynamic data on the device and its behavior. Original algorithms for calculation of the outlined metrics are developed, including the algorithms for calculation of the integral security and privacy score. The architecture of the security measuring system is developed. It integrates the components implementing the developed algorithms for metrics calculation. The system operation is demonstrated on the case study. The area of use of the proposed approach - the developed security and privacy measuring system can be used by the IoT devices manufacturers to analyse their security and privacy, and to provide the users with simple and clear security and privacy metrics. Novelty: the hierarchy of static and dynamic security and privacy metrics for the Internet of Things is developed; the approach to security and privacy assessment for the Internet of Things on the basis of the developed metrics and available data is proposed; novel algorithms for metrics calculation are developed; novel algorithms for integral metrics calculation considering available data are developed. Contribution: Fedorchenko E. – development of the approach, metrics hierarchy, and system architecture, problem statement for the components and their development, Novikova E. – the component for calculation of privacy risks, the component for calculation of integral risk scores, Kotenko I. – project management, problem statement, system architecture, Gaifulina D. – the component for event logs processing and integration, Tushkanova O., Murenin I. – the component for calculation of the dynamic risks sco
本文的目的是:通过开发物联网设备安全与隐私测量系统,消除物联网设备用户和制造商对一套清晰客观的安全与隐私指标的现有需求差距,以及缺乏一套包含互联安全与隐私指标及其计算算法和生成完整清晰客观评分的安全与隐私指标。研究方法:用于确定和分类安全和隐私度量的理论和系统分析,用于生成个人数据处理场景语义模型的语义分析,用于生成攻击痕迹的分析建模方法,用于搜索设备行为异常的日志分析方法,统计方法和机器学习方法,以及实现所提出的安全和隐私度量系统的数据库和软件的开发。结果:提出了面向物联网设备用户和制造商的安全与隐私测量系统。所提议的系统允许基于设备上的可用数据自动计算安全和隐私指标,并生成整体安全和隐私评分。安全性和隐私度量的层次结构是在提议的系统范围内开发的。建议的度量是使用设备及其行为的静态和动态数据计算的。开发了用于计算概述指标的原始算法,包括用于计算积分安全和隐私得分的算法。给出了安全测量系统的总体结构。它集成了实现已开发的度量计算算法的组件。通过案例分析,演示了系统的运行情况。建议方法的使用领域-开发的安全和隐私测量系统可被物联网设备制造商用于分析其安全和隐私,并为用户提供简单明了的安全和隐私指标。新颖性:开发了物联网静态和动态安全和隐私指标的层次结构;提出了基于已开发指标和现有数据的物联网安全和隐私评估方法;开发了新的度量计算算法;提出了考虑可用数据的积分度量计算的新算法。贡献:Fedorchenko e -方法、度量层次和系统架构的开发、组件及其开发的问题陈述、Novikova e -隐私风险计算组件、积分风险评分计算组件、Kotenko i -项目管理、问题陈述、系统架构、Gaifulina d -事件日志处理和集成组件、Tushkanova O、Murenin I. -使用统计方法和机器学习计算动态风险评分的组件,Levshun D. - metrics数据库,计算静态风险评分的组件,Meleshko A. -可读性评估组件,Kolomeets M. -基于*.apk文件的隐私风险评估组件,考虑攻击痕迹的动态风险评分计算组件。所有作者都参与了这篇文章的写作。
{"title":"THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES","authors":"E. Fedorchenko, E. Novikova, Igor Kotenko, D. Gaifulina, O. Tushkanova, D. Levshun, A. Meleshko, I. Murenin, Maxim Kolomeec","doi":"10.21681/2311-3456-2022-5-28-46","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-5-28-46","url":null,"abstract":"The purpose of the article: elimination of the gap in existing need in the set of clear and objective security and privacy metrics for the IoT devices users and manufacturers and an absence of such a set incorporating the interconnected security and privacy metrics, the algorithms for their calculation and generation of the integral clear and objective score by the development of the security and privacy measuring system for the IoT devices. Research method: theoretical and system analysis for determination and classification of the security and privacy metrics, semantic analysis for generating of the semantic model of personal data processing scenarios, analytical modeling methods for generating of the attack traces, log analysis methods, statistical methods and machine learning methods for searching of the anomalies in device behavior, development of the database and software implementing the proposed security and privacy measuring system. The result obtained: the security and privacy measuring system for the IoT devices users and manufacturers is proposed. The proposed system allows automated calculation of the security and privacy metrics based on the available data on the device and generation of the integral security and privacy score. The hierarchy of security and privacy metrics is developed in the scope of the proposed system. The proposed metrics are calculated using static and dynamic data on the device and its behavior. Original algorithms for calculation of the outlined metrics are developed, including the algorithms for calculation of the integral security and privacy score. The architecture of the security measuring system is developed. It integrates the components implementing the developed algorithms for metrics calculation. The system operation is demonstrated on the case study. The area of use of the proposed approach - the developed security and privacy measuring system can be used by the IoT devices manufacturers to analyse their security and privacy, and to provide the users with simple and clear security and privacy metrics. Novelty: the hierarchy of static and dynamic security and privacy metrics for the Internet of Things is developed; the approach to security and privacy assessment for the Internet of Things on the basis of the developed metrics and available data is proposed; novel algorithms for metrics calculation are developed; novel algorithms for integral metrics calculation considering available data are developed. Contribution: Fedorchenko E. – development of the approach, metrics hierarchy, and system architecture, problem statement for the components and their development, Novikova E. – the component for calculation of privacy risks, the component for calculation of integral risk scores, Kotenko I. – project management, problem statement, system architecture, Gaifulina D. – the component for event logs processing and integration, Tushkanova O., Murenin I. – the component for calculation of the dynamic risks sco","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129604987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Way to Ensure Universal Protection of Information Transmitted via Communication Channels 确保通过通信渠道传播的信息得到普遍保护的方法
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-3-45-50
M. Ivanov
{"title":"Way to Ensure Universal Protection of Information Transmitted via Communication Channels","authors":"M. Ivanov","doi":"10.21681/2311-3456-2019-3-45-50","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-3-45-50","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133172092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research of the Passive Information Protection Device in the Acoustoelectric Leakage Channels Using Matlab Environment 基于Matlab环境的声电泄漏通道无源信息保护装置研究
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-5-75-86
A. Horev, Oksana Lukmanova, Dmitry Surovenkov
Purpose: design of the passive device of the speech information protection from acoustoelectric leakage channels and study of the characteristics of protection device using a virtual laboratory bench developed in the Matlab environment. Methods: mathematical modeling using Matlab environment. Practical relevance: designed in the Matlab modeling environment: an equivalent circuit of the telephone set, which makes it possible to simulate acoustoelectric information leakage channels, schematic diagrams of passive protection devices for telephone sets that implement protection methods: limiting low-amplitude signals, filtering high-frequency injection signals and disabling acoustoelectric transducers, a virtual laboratory stand for research of the characteristics of protective device. Using a virtual laboratory stand, the main characteristics of the developed protection devices were studied and their performance was assessed when connected to the telephone network.
目的:利用Matlab环境下开发的虚拟实验台,设计语音信息防声电泄漏通道的无源保护装置,研究保护装置的特性。方法:利用Matlab环境进行数学建模。实际意义:在Matlab建模环境下设计了电话机等效电路,实现了声电信息泄漏通道的模拟;电话机无源保护装置原理图,实现了限制低幅信号、滤波高频注入信号、禁用声电换能器等保护方法;利用虚拟实验室台架,研究了所开发的保护装置的主要特性,并对其接入电话网络时的性能进行了评估。
{"title":"Research of the Passive Information Protection Device in the Acoustoelectric Leakage Channels Using Matlab Environment","authors":"A. Horev, Oksana Lukmanova, Dmitry Surovenkov","doi":"10.21681/2311-3456-2021-5-75-86","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-5-75-86","url":null,"abstract":"Purpose: design of the passive device of the speech information protection from acoustoelectric leakage channels and study of the characteristics of protection device using a virtual laboratory bench developed in the Matlab environment. Methods: mathematical modeling using Matlab environment. Practical relevance: designed in the Matlab modeling environment: an equivalent circuit of the telephone set, which makes it possible to simulate acoustoelectric information leakage channels, schematic diagrams of passive protection devices for telephone sets that implement protection methods: limiting low-amplitude signals, filtering high-frequency injection signals and disabling acoustoelectric transducers, a virtual laboratory stand for research of the characteristics of protective device. Using a virtual laboratory stand, the main characteristics of the developed protection devices were studied and their performance was assessed when connected to the telephone network.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130065059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Voprosy kiberbezopasnosti
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1