Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2021-5-12-20
S. Kondakov, Ilya Rud
Purpose of work: development of a model of the process of conducting a computer attack. Research method: theory of complex systems, comparative analysis within the framework of system analysis and synthesis. Result: it is shown that the application of the proposed model of the process of conducting computer attacks allows you to fully describe the process, taking into account its inherent features and characteristics. The use in the model of information from the MITRE ATTACK database of Mitre, which contains a description of the tactics, techniques and methods used by cybercriminals, allows you to reduce the level of abstraction and describe specific scenarios for conducting complex targeted computer attacks with the maximum approximation to practice. The developed model is supposed to be used to form scenarios of computer attacks when assessing the security of information systems.
{"title":"Model of the Process of Conducting Computer Attacks Using Special Information Influences","authors":"S. Kondakov, Ilya Rud","doi":"10.21681/2311-3456-2021-5-12-20","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-5-12-20","url":null,"abstract":"Purpose of work: development of a model of the process of conducting a computer attack. Research method: theory of complex systems, comparative analysis within the framework of system analysis and synthesis. Result: it is shown that the application of the proposed model of the process of conducting computer attacks allows you to fully describe the process, taking into account its inherent features and characteristics. The use in the model of information from the MITRE ATTACK database of Mitre, which contains a description of the tactics, techniques and methods used by cybercriminals, allows you to reduce the level of abstraction and describe specific scenarios for conducting complex targeted computer attacks with the maximum approximation to practice. The developed model is supposed to be used to form scenarios of computer attacks when assessing the security of information systems.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128127755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2020-03-66-75
S. Minakov
. The purpose: development of the technology of cryptographic protection of information in third-party cloud services or storage area networks by using standartizated interfaces, protocols and block ciphers algorithms. Method: system analysis of degradation security information level by data recycling with cloud computing. Research and analysis a science papers of cryptology theory and practice, describe limitations of homomorphic encryption. Cryptosystem synthesis is with analogy methods, hash and block ciphers algorithms. The result : new cryptographic system «Utro» (Eng. – Morrow) for real-time protection of confidential data, transmitted to third-party cloud services or storage area networks. The paper is described main cryptographic mechanisms like
{"title":"The Main Cryptographic Mechanisms for Protection of Data, Transmitted to Cloud Services and Storage Area Networks","authors":"S. Minakov","doi":"10.21681/2311-3456-2020-03-66-75","DOIUrl":"https://doi.org/10.21681/2311-3456-2020-03-66-75","url":null,"abstract":". The purpose: development of the technology of cryptographic protection of information in third-party cloud services or storage area networks by using standartizated interfaces, protocols and block ciphers algorithms. Method: system analysis of degradation security information level by data recycling with cloud computing. Research and analysis a science papers of cryptology theory and practice, describe limitations of homomorphic encryption. Cryptosystem synthesis is with analogy methods, hash and block ciphers algorithms. The result : new cryptographic system «Utro» (Eng. – Morrow) for real-time protection of confidential data, transmitted to third-party cloud services or storage area networks. The paper is described main cryptographic mechanisms like","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125753313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2022-6-93-99
E. Pavlenko, Nikita Gololobov, D. Lavrova, Andrey Kozachok
The purpose of the article: the development of a method for recognizing cyber threats in adaptive network topologies of large-scale systems based on a recurrent neural network with a long short-term memory. Main research methods: system analysis of existing recognition methods, theoretical formalization, experiment Result: The approach showed a satisfactory efficiency of cyber threat recognition, and the results of the research made it possible to put forward proposals for the further development of this area. Scientific novelty: A model of adaptive network topology is formulated and a new way of recognizing cyber threats on the adaptive network topology of large-scale systems is proposed.
{"title":"RECOGNITION OF CYBER THREATS ON THE ADAPTIVE NETWORK TOPOLOGY OF LARGE-SCALE SYSTEMS BASED ON A RECURRENT NEURAL NETWORK","authors":"E. Pavlenko, Nikita Gololobov, D. Lavrova, Andrey Kozachok","doi":"10.21681/2311-3456-2022-6-93-99","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-6-93-99","url":null,"abstract":"The purpose of the article: the development of a method for recognizing cyber threats in adaptive network topologies of large-scale systems based on a recurrent neural network with a long short-term memory. Main research methods: system analysis of existing recognition methods, theoretical formalization, experiment Result: The approach showed a satisfactory efficiency of cyber threat recognition, and the results of the research made it possible to put forward proposals for the further development of this area. Scientific novelty: A model of adaptive network topology is formulated and a new way of recognizing cyber threats on the adaptive network topology of large-scale systems is proposed.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121531468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2022-6-40-52
I. Livshitz, Andrew Baksheev
Purpose of work is to analyze the existing practices of performing security analysis and IT-security audit (NIST, OWASP, Cobit, OSSTMM, PTES and GOST R ISO/IEC), used to obtain objective and reliable data for operational security assessments of the CII objects and development of an IT-security audit model for CII objects. Research method: methods of analysis and structural decomposition from the theory of system analysis, identifying signs essential for optimizing the process of IT-security audit for CII objects. Research result: include the detailed analysis and comparison of the existing best practices for performing security analysis and IT-security audit (NIST, OWASP, Cobit, OSSTMM, PTES and GOST R ISO/IEC) for CII objects. A model of IT-security audit for CII objects has been developed. Scientific novelty: an IT-security audit model for CII facilities, characterized by the possibility of a “dual” mode for a full cycle of ensuring the safety of CII facilities – a full national conditional mode and a combined conditional mode, which allows, if necessary, to include additional functional blocks
工作目的是分析执行安全分析和it -安全审计的现有实践(NIST, OWASP, Cobit, OSSTMM, PTES和GOST R ISO/IEC),用于获取客观可靠的数据,用于CII对象的操作安全评估和CII对象的it -安全审计模型的开发。研究方法:从系统分析理论出发,采用分析和结构分解的方法,找出CII对象it安全审计流程优化所必需的标志。研究结果:包括对CII对象执行安全分析和it安全审计的现有最佳实践(NIST、OWASP、Cobit、OSSTMM、PTES和GOST R ISO/IEC)的详细分析和比较。已经开发了用于CII对象的it安全审计模型。科学新颖性:一种CII设施的it安全审计模式,其特点是在确保CII设施安全的整个周期中可能采用“双重”模式——一种完整的国家条件模式和一种组合条件模式,必要时允许包括额外的功能块
{"title":"RESEARCH OF METHODS FOR MONITORING THE LEVEL OF INFORMATION SECURITY AT CRITICAL INFORMATION INFRASTRUCTURE FACILITIES","authors":"I. Livshitz, Andrew Baksheev","doi":"10.21681/2311-3456-2022-6-40-52","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-6-40-52","url":null,"abstract":"Purpose of work is to analyze the existing practices of performing security analysis and IT-security audit (NIST, OWASP, Cobit, OSSTMM, PTES and GOST R ISO/IEC), used to obtain objective and reliable data for operational security assessments of the CII objects and development of an IT-security audit model for CII objects. Research method: methods of analysis and structural decomposition from the theory of system analysis, identifying signs essential for optimizing the process of IT-security audit for CII objects. Research result: include the detailed analysis and comparison of the existing best practices for performing security analysis and IT-security audit (NIST, OWASP, Cobit, OSSTMM, PTES and GOST R ISO/IEC) for CII objects. A model of IT-security audit for CII objects has been developed. Scientific novelty: an IT-security audit model for CII facilities, characterized by the possibility of a “dual” mode for a full cycle of ensuring the safety of CII facilities – a full national conditional mode and a combined conditional mode, which allows, if necessary, to include additional functional blocks","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133994106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2021-5-45-51
S. Kondakov, Kirill Chudin
The purpose of the article: to investigate the prerequisites for the development of a methodological apparatus for ensuring the protection of personal data in the activities of the personnel body of the state secret protection service. Research method. system analysis, synergetics. The result: the procedure for the formation of the appropriate research environment is formulated, the stages of formation of the concept of building a research apparatus for assessing the effectiveness of measures to ensure the protection of personal data in the activities of the personnel body of the state secret protection service are given. The concept of building a research apparatus for assessing the characteristics of measures to ensure the protection of personal data in the activities of the personnel body of the state secret protection service is proposed, which allows forming an environment for an adequate assessment of the effectiveness of such measures, as well as determining a set of hypotheses and analogies necessary for setting and solving the problem of increasing the adequacy of assessing the effectiveness of measures to ensure the protection of personal data in the activities of the personnel body of the state secret protection service as a task of developing mathematical models of the characteristics of threats to the security of personal data and the processes of their protection.
{"title":"Development of a Research Apparatus for Assessing the Effectiveness of Measures to Ensure the Protection of Personal Data","authors":"S. Kondakov, Kirill Chudin","doi":"10.21681/2311-3456-2021-5-45-51","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-5-45-51","url":null,"abstract":"The purpose of the article: to investigate the prerequisites for the development of a methodological apparatus for ensuring the protection of personal data in the activities of the personnel body of the state secret protection service. Research method. system analysis, synergetics. The result: the procedure for the formation of the appropriate research environment is formulated, the stages of formation of the concept of building a research apparatus for assessing the effectiveness of measures to ensure the protection of personal data in the activities of the personnel body of the state secret protection service are given. The concept of building a research apparatus for assessing the characteristics of measures to ensure the protection of personal data in the activities of the personnel body of the state secret protection service is proposed, which allows forming an environment for an adequate assessment of the effectiveness of such measures, as well as determining a set of hypotheses and analogies necessary for setting and solving the problem of increasing the adequacy of assessing the effectiveness of measures to ensure the protection of personal data in the activities of the personnel body of the state secret protection service as a task of developing mathematical models of the characteristics of threats to the security of personal data and the processes of their protection.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134188590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2022-1-66-75
Vitaliy Gryzunov, Anna Grishecko, Dmitriy Sipovich
Abstract The development of information systems of critical application is ahead of changes in regulatory documents of regulators and educational programs of universities. Purpose of work: to determine the most dangerous vulnerabilities for promising information systems of critical application (IS CA). Research method: application of the analysis hierarcihes method to compile a hierarchy of alternatives, including the type of platform for a promising IS CA, aspects of information security, types of vulnerabilities. Conducting a survey of experts using a point assessment. Converting results to a matrix of pairwise comparisons. Getting local and global priorities of alternatives. Result of the study: 25 experts of different ages and with different work experience were interviewed. From the point of view of the interviewed specialists, the best type of platform for a prospective distributed information system of critical application is edge computing. Availability, authenticity and integrity are highlighted as the most important aspects of information security. The most dangerous are the vulnerabilities associated with: 1) incomplete verification of input (input) data, buffer overflow, the possibility of injections, injection of arbitrary code, cross-site scripting, injection of operating system commands, etc.; 2) identification, authentication, granting access and privilege escalation; 3) incorrect configuration of software parameters, management of system resources, access to service information. Less dangerous are vulnerabilities that use the health of hardware and reduce its resistance to the actions of technical means of reconnaissance and electronic warfare. The results can be used to prioritize the procurement of information security products, to update the regulatory framework of regulators and training programs for training information security specialists.
{"title":"SELECTING THE MOST DANGEROUS VULNERABILITIES FOR PROSPECTIVE INFORMATION SYSTEMS FOR CRITICAL APPLICATIONS","authors":"Vitaliy Gryzunov, Anna Grishecko, Dmitriy Sipovich","doi":"10.21681/2311-3456-2022-1-66-75","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-1-66-75","url":null,"abstract":"Abstract The development of information systems of critical application is ahead of changes in regulatory documents of regulators and educational programs of universities. Purpose of work: to determine the most dangerous vulnerabilities for promising information systems of critical application (IS CA). Research method: application of the analysis hierarcihes method to compile a hierarchy of alternatives, including the type of platform for a promising IS CA, aspects of information security, types of vulnerabilities. Conducting a survey of experts using a point assessment. Converting results to a matrix of pairwise comparisons. Getting local and global priorities of alternatives. Result of the study: 25 experts of different ages and with different work experience were interviewed. From the point of view of the interviewed specialists, the best type of platform for a prospective distributed information system of critical application is edge computing. Availability, authenticity and integrity are highlighted as the most important aspects of information security. The most dangerous are the vulnerabilities associated with: 1) incomplete verification of input (input) data, buffer overflow, the possibility of injections, injection of arbitrary code, cross-site scripting, injection of operating system commands, etc.; 2) identification, authentication, granting access and privilege escalation; 3) incorrect configuration of software parameters, management of system resources, access to service information. Less dangerous are vulnerabilities that use the health of hardware and reduce its resistance to the actions of technical means of reconnaissance and electronic warfare. The results can be used to prioritize the procurement of information security products, to update the regulatory framework of regulators and training programs for training information security specialists.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132940818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2021-3-20-30
P. Revenkov, A. Berdyugin, P. Makeev
Abstract. During the XX–XXI century there was a development of technologies, which resulted in the creation of a global financial system that allows you to quickly make money transactions in opposite points of the Earth. The progress of digital transformation of society and, in particular, financial and economic systems leads to the complication of the problems of information security of competing entities. By focusing on scientific research, we can achieve success in these areas. The purpose of the study: to increase the level of security of banking services for individuals and legal entities in accordance with the recommendations of information security standards by analyzing the risk of information security violations in electronic banking technologies (on the example of the “Brute force” and “Black box” attacks). Research methods: empirical methods of scientific knowledge (observation, measurement, experiment), theoretical methods (analysis, synthesis, induction, deduction, abstraction, formalization), graphical interpretation of information, probability theory methods and computer programming. The result of the study: standards for effective management of information security management at the enterprise are considered. The advantage of social engineering methods over the “Brute force” method of PIN codes is shown quantitatively. The time characteristics of its commission and protective measures against attacks of the “Black box” type are analyzed. A method for improving the effectiveness of the response and protection of ATMS from attacks of the “Black box” type is proposed.
{"title":"Assessment of the Risk of a Cybersecurity Breach in a Commercial Bank (by the Example of an Attacks “Brute Force” and “Black Box” on ATMS)","authors":"P. Revenkov, A. Berdyugin, P. Makeev","doi":"10.21681/2311-3456-2021-3-20-30","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-3-20-30","url":null,"abstract":"Abstract. During the XX–XXI century there was a development of technologies, which resulted in the creation of a global financial system that allows you to quickly make money transactions in opposite points of the Earth. The progress of digital transformation of society and, in particular, financial and economic systems leads to the complication of the problems of information security of competing entities. By focusing on scientific research, we can achieve success in these areas. The purpose of the study: to increase the level of security of banking services for individuals and legal entities in accordance with the recommendations of information security standards by analyzing the risk of information security violations in electronic banking technologies (on the example of the “Brute force” and “Black box” attacks). Research methods: empirical methods of scientific knowledge (observation, measurement, experiment), theoretical methods (analysis, synthesis, induction, deduction, abstraction, formalization), graphical interpretation of information, probability theory methods and computer programming. The result of the study: standards for effective management of information security management at the enterprise are considered. The advantage of social engineering methods over the “Brute force” method of PIN codes is shown quantitatively. The time characteristics of its commission and protective measures against attacks of the “Black box” type are analyzed. A method for improving the effectiveness of the response and protection of ATMS from attacks of the “Black box” type is proposed.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134131597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2022-5-28-46
E. Fedorchenko, E. Novikova, Igor Kotenko, D. Gaifulina, O. Tushkanova, D. Levshun, A. Meleshko, I. Murenin, Maxim Kolomeec
The purpose of the article: elimination of the gap in existing need in the set of clear and objective security and privacy metrics for the IoT devices users and manufacturers and an absence of such a set incorporating the interconnected security and privacy metrics, the algorithms for their calculation and generation of the integral clear and objective score by the development of the security and privacy measuring system for the IoT devices. Research method: theoretical and system analysis for determination and classification of the security and privacy metrics, semantic analysis for generating of the semantic model of personal data processing scenarios, analytical modeling methods for generating of the attack traces, log analysis methods, statistical methods and machine learning methods for searching of the anomalies in device behavior, development of the database and software implementing the proposed security and privacy measuring system. The result obtained: the security and privacy measuring system for the IoT devices users and manufacturers is proposed. The proposed system allows automated calculation of the security and privacy metrics based on the available data on the device and generation of the integral security and privacy score. The hierarchy of security and privacy metrics is developed in the scope of the proposed system. The proposed metrics are calculated using static and dynamic data on the device and its behavior. Original algorithms for calculation of the outlined metrics are developed, including the algorithms for calculation of the integral security and privacy score. The architecture of the security measuring system is developed. It integrates the components implementing the developed algorithms for metrics calculation. The system operation is demonstrated on the case study. The area of use of the proposed approach - the developed security and privacy measuring system can be used by the IoT devices manufacturers to analyse their security and privacy, and to provide the users with simple and clear security and privacy metrics. Novelty: the hierarchy of static and dynamic security and privacy metrics for the Internet of Things is developed; the approach to security and privacy assessment for the Internet of Things on the basis of the developed metrics and available data is proposed; novel algorithms for metrics calculation are developed; novel algorithms for integral metrics calculation considering available data are developed. Contribution: Fedorchenko E. – development of the approach, metrics hierarchy, and system architecture, problem statement for the components and their development, Novikova E. – the component for calculation of privacy risks, the component for calculation of integral risk scores, Kotenko I. – project management, problem statement, system architecture, Gaifulina D. – the component for event logs processing and integration, Tushkanova O., Murenin I. – the component for calculation of the dynamic risks sco
本文的目的是:通过开发物联网设备安全与隐私测量系统,消除物联网设备用户和制造商对一套清晰客观的安全与隐私指标的现有需求差距,以及缺乏一套包含互联安全与隐私指标及其计算算法和生成完整清晰客观评分的安全与隐私指标。研究方法:用于确定和分类安全和隐私度量的理论和系统分析,用于生成个人数据处理场景语义模型的语义分析,用于生成攻击痕迹的分析建模方法,用于搜索设备行为异常的日志分析方法,统计方法和机器学习方法,以及实现所提出的安全和隐私度量系统的数据库和软件的开发。结果:提出了面向物联网设备用户和制造商的安全与隐私测量系统。所提议的系统允许基于设备上的可用数据自动计算安全和隐私指标,并生成整体安全和隐私评分。安全性和隐私度量的层次结构是在提议的系统范围内开发的。建议的度量是使用设备及其行为的静态和动态数据计算的。开发了用于计算概述指标的原始算法,包括用于计算积分安全和隐私得分的算法。给出了安全测量系统的总体结构。它集成了实现已开发的度量计算算法的组件。通过案例分析,演示了系统的运行情况。建议方法的使用领域-开发的安全和隐私测量系统可被物联网设备制造商用于分析其安全和隐私,并为用户提供简单明了的安全和隐私指标。新颖性:开发了物联网静态和动态安全和隐私指标的层次结构;提出了基于已开发指标和现有数据的物联网安全和隐私评估方法;开发了新的度量计算算法;提出了考虑可用数据的积分度量计算的新算法。贡献:Fedorchenko e -方法、度量层次和系统架构的开发、组件及其开发的问题陈述、Novikova e -隐私风险计算组件、积分风险评分计算组件、Kotenko i -项目管理、问题陈述、系统架构、Gaifulina d -事件日志处理和集成组件、Tushkanova O、Murenin I. -使用统计方法和机器学习计算动态风险评分的组件,Levshun D. - metrics数据库,计算静态风险评分的组件,Meleshko A. -可读性评估组件,Kolomeets M. -基于*.apk文件的隐私风险评估组件,考虑攻击痕迹的动态风险评分计算组件。所有作者都参与了这篇文章的写作。
{"title":"THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES","authors":"E. Fedorchenko, E. Novikova, Igor Kotenko, D. Gaifulina, O. Tushkanova, D. Levshun, A. Meleshko, I. Murenin, Maxim Kolomeec","doi":"10.21681/2311-3456-2022-5-28-46","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-5-28-46","url":null,"abstract":"The purpose of the article: elimination of the gap in existing need in the set of clear and objective security and privacy metrics for the IoT devices users and manufacturers and an absence of such a set incorporating the interconnected security and privacy metrics, the algorithms for their calculation and generation of the integral clear and objective score by the development of the security and privacy measuring system for the IoT devices. Research method: theoretical and system analysis for determination and classification of the security and privacy metrics, semantic analysis for generating of the semantic model of personal data processing scenarios, analytical modeling methods for generating of the attack traces, log analysis methods, statistical methods and machine learning methods for searching of the anomalies in device behavior, development of the database and software implementing the proposed security and privacy measuring system. The result obtained: the security and privacy measuring system for the IoT devices users and manufacturers is proposed. The proposed system allows automated calculation of the security and privacy metrics based on the available data on the device and generation of the integral security and privacy score. The hierarchy of security and privacy metrics is developed in the scope of the proposed system. The proposed metrics are calculated using static and dynamic data on the device and its behavior. Original algorithms for calculation of the outlined metrics are developed, including the algorithms for calculation of the integral security and privacy score. The architecture of the security measuring system is developed. It integrates the components implementing the developed algorithms for metrics calculation. The system operation is demonstrated on the case study. The area of use of the proposed approach - the developed security and privacy measuring system can be used by the IoT devices manufacturers to analyse their security and privacy, and to provide the users with simple and clear security and privacy metrics. Novelty: the hierarchy of static and dynamic security and privacy metrics for the Internet of Things is developed; the approach to security and privacy assessment for the Internet of Things on the basis of the developed metrics and available data is proposed; novel algorithms for metrics calculation are developed; novel algorithms for integral metrics calculation considering available data are developed. Contribution: Fedorchenko E. – development of the approach, metrics hierarchy, and system architecture, problem statement for the components and their development, Novikova E. – the component for calculation of privacy risks, the component for calculation of integral risk scores, Kotenko I. – project management, problem statement, system architecture, Gaifulina D. – the component for event logs processing and integration, Tushkanova O., Murenin I. – the component for calculation of the dynamic risks sco","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129604987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2019-3-45-50
M. Ivanov
{"title":"Way to Ensure Universal Protection of Information Transmitted via Communication Channels","authors":"M. Ivanov","doi":"10.21681/2311-3456-2019-3-45-50","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-3-45-50","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133172092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.21681/2311-3456-2021-5-75-86
A. Horev, Oksana Lukmanova, Dmitry Surovenkov
Purpose: design of the passive device of the speech information protection from acoustoelectric leakage channels and study of the characteristics of protection device using a virtual laboratory bench developed in the Matlab environment. Methods: mathematical modeling using Matlab environment. Practical relevance: designed in the Matlab modeling environment: an equivalent circuit of the telephone set, which makes it possible to simulate acoustoelectric information leakage channels, schematic diagrams of passive protection devices for telephone sets that implement protection methods: limiting low-amplitude signals, filtering high-frequency injection signals and disabling acoustoelectric transducers, a virtual laboratory stand for research of the characteristics of protective device. Using a virtual laboratory stand, the main characteristics of the developed protection devices were studied and their performance was assessed when connected to the telephone network.
{"title":"Research of the Passive Information Protection Device in the Acoustoelectric Leakage Channels Using Matlab Environment","authors":"A. Horev, Oksana Lukmanova, Dmitry Surovenkov","doi":"10.21681/2311-3456-2021-5-75-86","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-5-75-86","url":null,"abstract":"Purpose: design of the passive device of the speech information protection from acoustoelectric leakage channels and study of the characteristics of protection device using a virtual laboratory bench developed in the Matlab environment. Methods: mathematical modeling using Matlab environment. Practical relevance: designed in the Matlab modeling environment: an equivalent circuit of the telephone set, which makes it possible to simulate acoustoelectric information leakage channels, schematic diagrams of passive protection devices for telephone sets that implement protection methods: limiting low-amplitude signals, filtering high-frequency injection signals and disabling acoustoelectric transducers, a virtual laboratory stand for research of the characteristics of protective device. Using a virtual laboratory stand, the main characteristics of the developed protection devices were studied and their performance was assessed when connected to the telephone network.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130065059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}