首页 > 最新文献

Voprosy kiberbezopasnosti最新文献

英文 中文
Detector for Hidden Executable Code in Windows Memory 在Windows内存中隐藏的可执行代码检测器
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-5-75-82
Vladisalv Poddubnyy, Igor Korkin
{"title":"Detector for Hidden Executable Code in Windows Memory","authors":"Vladisalv Poddubnyy, Igor Korkin","doi":"10.21681/2311-3456-2019-5-75-82","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-5-75-82","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130136815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Model and Parametric Optimization of Proactive Protection of the Email Service from Network Intelligence 网络智能下电子邮件服务主动防护模型及参数优化
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-2-69-81
A. Gorbachev
The purpose of the study: to increase the security of the e-mail service of information systems in the conditions of network intelligence. Methods used: methods of mathematical statistics, random processes research, mathematical programming, heuristic optimization algorithms were used to achieve the research goal. The result of the study: a semi-Markov model of proactive protection of the e-mail service from network intelligence has been developed, which allows determining the probabilistic and temporal characteristics of the process of transmitting e-mail messages. Based on traffic analysis, statistical hypotheses about the types of distributions of the time of occurrence of events, under the influence of which the system under study evolves in a discrete set of states, are verified, point and interval estimates of the values of the parameters of these distributions are performed. The solution of the system of linear integral Volterra equations with integral kernels of the difference type was carried out using numerical methods of the Laplace transform. The problem of vector optimization is solved to determine the optimal parameters for configuring e-mail messages, allowing to maximize the effectiveness of the protection of the e-mail service, the robustness of the simulated system and minimize overhead costs under appropriate restrictions. The extremum of the objective functions was found using a bioinspired particle swarm algorithm. Scalarization of Pareto-optimal estimates was carried out using the ideal point method. Scientific novelty: it consists in developing a model and solving the problem of optimizing the parameters of the e-mail service in the conditions of network intelligence using the mathematical apparatus of semi-Markov processes, numerical methods of Laplace transformation, parametric evaluation of statistical characteristics of the model, scalarization of a multi-criteria optimization problem by the ideal point method and search for the extremum of objective functions using the particle swarm algorithm.
研究目的:提高网络智能化条件下信息系统电子邮件服务的安全性。采用的方法:采用数理统计、随机过程研究、数学规划、启发式优化算法等方法来实现研究目标。研究的结果是:开发了电子邮件服务免受网络情报主动保护的半马尔可夫模型,该模型允许确定传输电子邮件消息过程的概率和时间特征。在流量分析的基础上,验证了事件发生时间的分布类型的统计假设,并对这些分布的参数值进行了点估计和区间估计。在这些分布的影响下,所研究的系统在一组离散状态中演化。采用拉普拉斯变换的数值方法,求解了差分型积分核的线性积分Volterra方程组。通过向量优化问题确定配置电子邮件消息的最优参数,使电子邮件服务保护的有效性最大化,仿真系统的鲁棒性最大化,并在适当的限制下最小化开销成本。利用仿生粒子群算法求出目标函数的极值。利用理想点法对pareto最优估计进行了标量化。科学新颖:利用半马尔可夫过程的数学装置、拉普拉斯变换的数值方法、模型统计特性的参数化评价、理想点法的多准则优化问题标化和粒子群算法的目标函数极值搜索,建立了网络智能条件下的电子邮件服务参数优化模型,并解决了该问题。
{"title":"Model and Parametric Optimization of Proactive Protection of the Email Service from Network Intelligence","authors":"A. Gorbachev","doi":"10.21681/2311-3456-2022-2-69-81","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-2-69-81","url":null,"abstract":"The purpose of the study: to increase the security of the e-mail service of information systems in the conditions of network intelligence. Methods used: methods of mathematical statistics, random processes research, mathematical programming, heuristic optimization algorithms were used to achieve the research goal. The result of the study: a semi-Markov model of proactive protection of the e-mail service from network intelligence has been developed, which allows determining the probabilistic and temporal characteristics of the process of transmitting e-mail messages. Based on traffic analysis, statistical hypotheses about the types of distributions of the time of occurrence of events, under the influence of which the system under study evolves in a discrete set of states, are verified, point and interval estimates of the values of the parameters of these distributions are performed. The solution of the system of linear integral Volterra equations with integral kernels of the difference type was carried out using numerical methods of the Laplace transform. The problem of vector optimization is solved to determine the optimal parameters for configuring e-mail messages, allowing to maximize the effectiveness of the protection of the e-mail service, the robustness of the simulated system and minimize overhead costs under appropriate restrictions. The extremum of the objective functions was found using a bioinspired particle swarm algorithm. Scalarization of Pareto-optimal estimates was carried out using the ideal point method. Scientific novelty: it consists in developing a model and solving the problem of optimizing the parameters of the e-mail service in the conditions of network intelligence using the mathematical apparatus of semi-Markov processes, numerical methods of Laplace transformation, parametric evaluation of statistical characteristics of the model, scalarization of a multi-criteria optimization problem by the ideal point method and search for the extremum of objective functions using the particle swarm algorithm.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131364303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Methods of Theory of Fuzzy Sets to Assess the Risk of Violations of Critical Properties Protected Resources Automated Control System 模糊集理论方法在保护资源自动化控制系统关键属性违规风险评估中的应用
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-1-18-24
A. Bratchenko, I. Butusov, Arsen Kobalyan, A. Romanov
{"title":"Application of Methods of Theory of Fuzzy Sets to Assess the Risk of Violations of Critical Properties Protected Resources Automated Control System","authors":"A. Bratchenko, I. Butusov, Arsen Kobalyan, A. Romanov","doi":"10.21681/2311-3456-2019-1-18-24","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-1-18-24","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114518201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity and Global Geodynamic Risks 网络安全和全球地球动力学风险
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-3-11-17
V. Minaev, S. Dvoryankin, A. Faddeev, T. Nevdakh, T. Akhmetshin, A. Faddeev
{"title":"Cybersecurity and Global Geodynamic Risks","authors":"V. Minaev, S. Dvoryankin, A. Faddeev, T. Nevdakh, T. Akhmetshin, A. Faddeev","doi":"10.21681/2311-3456-2019-3-11-17","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-3-11-17","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116342758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Scaling Digital Images Using Homomorphic Encryption 使用同态加密缩放数字图像
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-3-2-10
L. Babenko, I. Rusalovsky
Since time immemorial, cryptography has provided secure transmission of information in an insecure environment, keeping the data secret. Not so long ago the homomorphic cryptography began to actively develop. Its distinctive feature is that this type of cryptography allows you to process encrypted data without their preliminary decryption in such a way that the result of operations on encrypted data is equivalent, after decryption, to the result of operations on open data. Because of these features, homomorphic encryption can be effectively used in various cloud services to perform secure computing and secure image processing. At the same time, it is guaranteed that no one will have open data, even the service that performs the calculations. Purpose of the work: development of methods and tools for homomorphic encryption that allow performing homomorphic implementation of image processing algorithms. Research methods: analysis of possible implementations of digital image processing using homomorphic encryption, analysis of existing problems of performing a homomorphic implementation for image processing algorithms. Results: a method for homomorphic comparison of bits and numbers presented as an array of bits is proposed; a homomorphic implementation of the EPX image resizing algorithm is proposed; the complexity of the operation is analyzed when one pixel of the original image is enlarged using the proposed method; the analysis results are presented.
自古以来,密码学就在不安全的环境中提供安全的信息传输,使数据保密。不久前,同态密码学开始积极发展。它的独特之处在于,这种类型的密码学允许您处理加密的数据,而不需要对其进行初步解密,这样在解密之后,对加密数据的操作结果与对开放数据的操作结果是等价的。由于这些特性,同态加密可以有效地用于各种云服务,以执行安全计算和安全图像处理。同时,它保证没有人会有开放的数据,即使是执行计算的服务。工作目的:开发同态加密的方法和工具,允许执行图像处理算法的同态实现。研究方法:分析利用同态加密实现数字图像处理的可能性,分析对图像处理算法进行同态实现存在的问题。结果:提出了一种以位数组表示的位与数的同态比较方法;提出了一种EPX图像调整算法的同态实现;分析了用所提方法放大原图像一个像素时的操作复杂度;给出了分析结果。
{"title":"Scaling Digital Images Using Homomorphic Encryption","authors":"L. Babenko, I. Rusalovsky","doi":"10.21681/2311-3456-2021-3-2-10","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-3-2-10","url":null,"abstract":"Since time immemorial, cryptography has provided secure transmission of information in an insecure environment, keeping the data secret. Not so long ago the homomorphic cryptography began to actively develop. Its distinctive feature is that this type of cryptography allows you to process encrypted data without their preliminary decryption in such a way that the result of operations on encrypted data is equivalent, after decryption, to the result of operations on open data. Because of these features, homomorphic encryption can be effectively used in various cloud services to perform secure computing and secure image processing. At the same time, it is guaranteed that no one will have open data, even the service that performs the calculations. Purpose of the work: development of methods and tools for homomorphic encryption that allow performing homomorphic implementation of image processing algorithms. Research methods: analysis of possible implementations of digital image processing using homomorphic encryption, analysis of existing problems of performing a homomorphic implementation for image processing algorithms. Results: a method for homomorphic comparison of bits and numbers presented as an array of bits is proposed; a homomorphic implementation of the EPX image resizing algorithm is proposed; the complexity of the operation is analyzed when one pixel of the original image is enlarged using the proposed method; the analysis results are presented.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114991926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conflict of Interest Resolution Regulatory Documentation Requirements Analysis in the Context of Information Security 信息安全背景下利益冲突解决法规文件需求分析
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-4-48-60
A. Alekseev, A. Vorobeva, I. Livshitz, I. Yurin, Inland Shipping
Research aim: analysis and assessment of the level of readiness of the requirements for the regulation of conflicts of interest contained in the current standards of the Russian Federation on information security and management systems, for compliance with national legislation, as well as their comparison with the requirements of ISO standards. Research method: a comprehensive analysis of regulating conflicts of interest problem was carried out the regulatory framework of the Russian Federation (273-FZ, Bank of Russia Ordinances No. 5511-U and standards for management systems and information security). The requirements contained in the national standards of the Russian Federation and international ISO standards are analyzed for their mutual correspondence. Results obtained: The research presents the comparison of the requirements of the federal law of the Russian Federation FZ-273 and standards for management systems and information security. Comparative table of requirements for resolving conflicts of interest is presented. The existing software of automated search and analysis of conflicts of interest are analyzed. It is proposed to use of modern automated tools for regulation of conflicts of interest in organizations.
研究目的:分析和评估俄罗斯联邦现行信息安全和管理系统标准中所载的利益冲突管理要求的准备程度,以符合国家立法,并将其与ISO标准的要求进行比较。研究方法:综合分析俄罗斯联邦监管框架(273-FZ,俄罗斯银行条例第5511-U号和管理系统和信息安全标准)的监管利益冲突问题。对俄罗斯联邦国家标准和国际ISO标准中的要求进行了相互对应的分析。研究结果:将俄罗斯联邦法律FZ-273的要求与管理系统和信息安全标准进行了比较。提出了解决利益冲突要求的比较表。对现有的自动搜索和利益冲突分析软件进行了分析。建议使用现代自动化工具对组织中的利益冲突进行监管。
{"title":"Conflict of Interest Resolution Regulatory Documentation Requirements Analysis in the Context of Information Security","authors":"A. Alekseev, A. Vorobeva, I. Livshitz, I. Yurin, Inland Shipping","doi":"10.21681/2311-3456-2021-4-48-60","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-4-48-60","url":null,"abstract":"Research aim: analysis and assessment of the level of readiness of the requirements for the regulation of conflicts of interest contained in the current standards of the Russian Federation on information security and management systems, for compliance with national legislation, as well as their comparison with the requirements of ISO standards. Research method: a comprehensive analysis of regulating conflicts of interest problem was carried out the regulatory framework of the Russian Federation (273-FZ, Bank of Russia Ordinances No. 5511-U and standards for management systems and information security). The requirements contained in the national standards of the Russian Federation and international ISO standards are analyzed for their mutual correspondence. Results obtained: The research presents the comparison of the requirements of the federal law of the Russian Federation FZ-273 and standards for management systems and information security. Comparative table of requirements for resolving conflicts of interest is presented. The existing software of automated search and analysis of conflicts of interest are analyzed. It is proposed to use of modern automated tools for regulation of conflicts of interest in organizations.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131777199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methodical Approach to the Complex Description of Information Protection Object 信息保护对象复杂描述的方法研究
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-4-39-51
S. Kruglikov, Sergey Kasanin, Yu. N. Kuleshov
Purpose: on the basis of analysis of a comprehensive approach to the assessment of threats to information security to substantiate a methodological approach to a comprehensive description of the object of information protection with an assessment of its risks. Offer a tool for building private models and information security management system. Research method: use of partial integral index of security, which reflects the average risk of damage during the implementation of a threat of a certain type and characterizes the degree of danger. Analysis of the architecture of the object of assessment in relation to possible violations of information security, information security risk assessment using the apparatus of the theory of fuzzy sets when considering the methodological approach to a comprehensive description of the object of information security with an assessment of its risks. Result: proposed a comprehensive approach to assessing threats to the security of information. The assessment of the state of the protection object in case of violation of security is carried out with the help of particular integral index of security, which characterizes the possibility of inflicting damage in its implementation, according to which the ranking is made. On the basis of this methodical approach to complex description of the object of information protection with an assessment of its risks, using analysis of architecture of the object in application to possible violations of information security, and also making an assessment of risk using the apparatus of the theory of fuzzy sets is substantiated. This methodical approach is a formal tool for building private models and information security management system as a whole. On the basis of these models, it is possible to develop: methods of quantitative estimation of security; methods and approaches to the description of the factors influencing security; methods of security estimation of operating systems with use of the methodological approach to information systems security.
目的:在分析信息安全威胁评估的综合方法的基础上,提出一种方法方法,对信息保护对象进行全面描述,并评估其风险。为构建私有模型和信息安全管理系统提供了一个工具。研究方法:使用安全的部分积分指标,它反映了某种类型的威胁在实施过程中遭受损害的平均风险,表征了危险程度。分析了评估对象的体系结构,涉及到可能存在的信息安全违规行为,利用模糊集理论的仪器进行信息安全风险评估时考虑的方法学方法,对信息安全对象进行了综合描述,并对其风险进行了评估。结果:提出了一种综合评估信息安全威胁的方法。在违反安全的情况下,保护对象的状态评估是借助特定的整体安全指数进行的,该指数表征了在实施过程中造成损害的可能性,并根据该指数进行排名。在对信息保护对象的复杂描述及其风险评估的系统方法的基础上,利用对象的体系结构分析应用于可能违反信息安全的行为,并利用模糊集理论的装置进行风险评估。该方法是构建私有模型和整体信息安全管理系统的正式工具。在这些模型的基础上,可以开发:定量估计安全性的方法;影响安全因素描述的方法和途径;使用信息系统安全方法学方法对操作系统进行安全评估的方法。
{"title":"Methodical Approach to the Complex Description of Information Protection Object","authors":"S. Kruglikov, Sergey Kasanin, Yu. N. Kuleshov","doi":"10.21681/2311-3456-2022-4-39-51","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-4-39-51","url":null,"abstract":"Purpose: on the basis of analysis of a comprehensive approach to the assessment of threats to information security to substantiate a methodological approach to a comprehensive description of the object of information protection with an assessment of its risks. Offer a tool for building private models and information security management system. Research method: use of partial integral index of security, which reflects the average risk of damage during the implementation of a threat of a certain type and characterizes the degree of danger. Analysis of the architecture of the object of assessment in relation to possible violations of information security, information security risk assessment using the apparatus of the theory of fuzzy sets when considering the methodological approach to a comprehensive description of the object of information security with an assessment of its risks. Result: proposed a comprehensive approach to assessing threats to the security of information. The assessment of the state of the protection object in case of violation of security is carried out with the help of particular integral index of security, which characterizes the possibility of inflicting damage in its implementation, according to which the ranking is made. On the basis of this methodical approach to complex description of the object of information protection with an assessment of its risks, using analysis of architecture of the object in application to possible violations of information security, and also making an assessment of risk using the apparatus of the theory of fuzzy sets is substantiated. This methodical approach is a formal tool for building private models and information security management system as a whole. On the basis of these models, it is possible to develop: methods of quantitative estimation of security; methods and approaches to the description of the factors influencing security; methods of security estimation of operating systems with use of the methodological approach to information systems security.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128257479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spreading Borders of Vigenere Cipher Decryption Methods Vigenere密码解密方法的扩展边界
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-5-42-50
A. Babash, Rihard Guzovs, S. Kasatkin, A. Prohorov, Nikita Slimov
{"title":"Spreading Borders of Vigenere Cipher Decryption Methods","authors":"A. Babash, Rihard Guzovs, S. Kasatkin, A. Prohorov, Nikita Slimov","doi":"10.21681/2311-3456-2019-5-42-50","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-5-42-50","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128090372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
THE TECHNIQUE OF BUILDING A SUSTAINABLE PROTECTION SYSTEM BASED ON ADVERSARIAL MACHINE LEARNING IN 6G WIRELESS NETWORKS 基于对抗性机器学习的6g无线网络可持续保护系统构建技术
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2023-2-99-108
L. Legashev, L. Grishina
Abstract The purpose of research is to develop the technique of analytical processing of big data of services and applications in the new generation communication networks to detect cybersecurity incidents and build sustainable protection systems based on adversarial machine learning. The methods of research: Analysis of modern methods of machine learning and neural network technologies, synthesis and formalization of algorithms for adversarial attacks on machine learning models. Scientific novelty: a technique for analytical processing of emulated data of services and applications for detecting cybersecurity incidents is presented, which provides a groundwork in the field of research into the security issues of complex intelligent services and applications in the infrastructure of wireless networks of the next generation. The result of research: The article proposes a technique of building a sustainable protection system against adversarial attacks in wireless ad hoc networks of the next generation. The main types of adversarial attacks, including poisoning attacks and evasion attacks, are formalized, and methods for generating adversarial examples on tabular, textual, and visual data are described. Several scenarios were generated and exploratory analysis of datasets was carried out using the DeepMIMO emulator. Potential application problems of binary classification and prediction of signal attenuation between a user and a base station for adversarial attacks are presented. The algorithmization of the processes of building and training a sustainable protection system against adversarial attacks in wireless networks of the next generation is presented on the example of emulated data
研究目的是发展新一代通信网络中服务和应用大数据的分析处理技术,以检测网络安全事件,构建基于对抗性机器学习的可持续防护系统。研究方法:分析机器学习和神经网络技术的现代方法,对机器学习模型进行对抗性攻击的算法的综合和形式化。科学新颖性:提出了一种用于检测网络安全事件的服务和应用模拟数据的分析处理技术,为下一代无线网络基础设施中复杂智能服务和应用的安全问题研究提供了基础。研究结果:提出了一种在下一代无线自组织网络中构建可持续防御对抗性攻击的技术。对抗性攻击的主要类型,包括投毒攻击和逃避攻击,进行了形式化描述,并描述了在表格、文本和视觉数据上生成对抗性示例的方法。利用DeepMIMO仿真器生成了多个场景,并对数据集进行了探索性分析。提出了二值分类和对抗性攻击中用户与基站间信号衰减预测的潜在应用问题。以仿真数据为例,介绍了下一代无线网络中针对对抗性攻击的可持续保护系统的构建和训练过程的算法
{"title":"THE TECHNIQUE OF BUILDING A SUSTAINABLE PROTECTION SYSTEM BASED ON ADVERSARIAL MACHINE LEARNING IN 6G WIRELESS NETWORKS","authors":"L. Legashev, L. Grishina","doi":"10.21681/2311-3456-2023-2-99-108","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-2-99-108","url":null,"abstract":"Abstract The purpose of research is to develop the technique of analytical processing of big data of services and applications in the new generation communication networks to detect cybersecurity incidents and build sustainable protection systems based on adversarial machine learning. The methods of research: Analysis of modern methods of machine learning and neural network technologies, synthesis and formalization of algorithms for adversarial attacks on machine learning models. Scientific novelty: a technique for analytical processing of emulated data of services and applications for detecting cybersecurity incidents is presented, which provides a groundwork in the field of research into the security issues of complex intelligent services and applications in the infrastructure of wireless networks of the next generation. The result of research: The article proposes a technique of building a sustainable protection system against adversarial attacks in wireless ad hoc networks of the next generation. The main types of adversarial attacks, including poisoning attacks and evasion attacks, are formalized, and methods for generating adversarial examples on tabular, textual, and visual data are described. Several scenarios were generated and exploratory analysis of datasets was carried out using the DeepMIMO emulator. Potential application problems of binary classification and prediction of signal attenuation between a user and a base station for adversarial attacks are presented. The algorithmization of the processes of building and training a sustainable protection system against adversarial attacks in wireless networks of the next generation is presented on the example of emulated data","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122094546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of a Pseudo-Random Sequence Generation Function Based on the “Kuznechik” Cryptographic Algorithm 基于“Kuznechik”密码算法的伪随机序列生成函数的开发
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-4-25-34
S. Belyaev, M. Budko, M. Budko, A. Guirik, V. Grozov
Purpose: increasing the cryptographic strength level of the pseudo-random sequence generation function based on the «Kuznechik» encryption algorithm. Research methods: methods for constructing pseudo-random sequence generators using a strong cryptographic algorithm as a generation function in accordance with the recommendations of NIST SP 800-90. Methods of probability theory and mathematical statistics (statistical hypothesis testing, Pearson’s criterion), methods for estimating the entropy of a random process. Results: а method for development of the main component of the deterministic generator – the function for generating pseudo-random sequences based on the «Kuznechik» encryption algorithm (Russian encryption standard GOST R 34.12-2015) due to a number of the original algorithm modifications is proposed. Features of the algorithm allow to use it in a mode that combines the advantages of the well-known encryption modes of block ciphers (OFB and CTR encryption modes). A procedure for generating round keys and other modifications of the algorithm that increase its security while maintaining its performance have been developed and implemented. The generator operation was evaluated on the basis of the statistical properties of the output sequences (NIST SP 800-22 tests), Pearson’s χ2 criterion, and min-entropy (NIST 800-90B tests). According to the characteristics mentioned above, the proposed generation function is comparable with the reference version based on GOST 34.12-2015 «Kuznechik», but exceeds it in terms of security.
目的:提高基于«Kuznechik»加密算法的伪随机序列生成函数的密码强度水平。研究方法:按照NIST SP 800-90的建议,采用强密码算法作为生成函数构造伪随机序列生成器的方法。概率论和数理统计方法(统计假设检验,皮尔逊准则),估计随机过程熵的方法。结果:由于对原始算法进行了一些修改,提出了确定性生成器主要组件的开发方法-基于«Kuznechik»加密算法(俄罗斯加密标准GOST R 34.12-2015)生成伪随机序列的函数。该算法的特点允许在一种模式下使用它,这种模式结合了众所周知的分组密码加密模式(OFB和CTR加密模式)的优点。已经开发并实现了生成轮密钥的过程和对算法的其他修改,以提高其安全性,同时保持其性能。根据输出序列的统计特性(NIST SP 800-22测试)、Pearson’s χ2准则和最小熵(NIST 800-90B测试)对发生器运行进行评估。根据上述特征,所提出的生成函数与基于GOST 34.12-2015«Kuznechik»的参考版本相当,但在安全性方面超过了参考版本。
{"title":"Development of a Pseudo-Random Sequence Generation Function Based on the “Kuznechik” Cryptographic Algorithm","authors":"S. Belyaev, M. Budko, M. Budko, A. Guirik, V. Grozov","doi":"10.21681/2311-3456-2021-4-25-34","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-4-25-34","url":null,"abstract":"Purpose: increasing the cryptographic strength level of the pseudo-random sequence generation function based on the «Kuznechik» encryption algorithm. Research methods: methods for constructing pseudo-random sequence generators using a strong cryptographic algorithm as a generation function in accordance with the recommendations of NIST SP 800-90. Methods of probability theory and mathematical statistics (statistical hypothesis testing, Pearson’s criterion), methods for estimating the entropy of a random process. Results: а method for development of the main component of the deterministic generator – the function for generating pseudo-random sequences based on the «Kuznechik» encryption algorithm (Russian encryption standard GOST R 34.12-2015) due to a number of the original algorithm modifications is proposed. Features of the algorithm allow to use it in a mode that combines the advantages of the well-known encryption modes of block ciphers (OFB and CTR encryption modes). A procedure for generating round keys and other modifications of the algorithm that increase its security while maintaining its performance have been developed and implemented. The generator operation was evaluated on the basis of the statistical properties of the output sequences (NIST SP 800-22 tests), Pearson’s χ2 criterion, and min-entropy (NIST 800-90B tests). According to the characteristics mentioned above, the proposed generation function is comparable with the reference version based on GOST 34.12-2015 «Kuznechik», but exceeds it in terms of security.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125705230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Voprosy kiberbezopasnosti
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1