首页 > 最新文献

Voprosy kiberbezopasnosti最新文献

英文 中文
Developing a High-Performance OS Kernel Safe in Terms of Working with Memory 基于内存的高性能操作系统内核安全开发
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-3-51-56
Timofey Komarov, Nadezhda Chepik, M. Ivanov
{"title":"Developing a High-Performance OS Kernel Safe in Terms of Working with Memory","authors":"Timofey Komarov, Nadezhda Chepik, M. Ivanov","doi":"10.21681/2311-3456-2019-3-51-56","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-3-51-56","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127519974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model for Building Competencies of a Computer Crime Investigator 建立计算机犯罪调查员能力的模型
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-3-57-62
D. Chukova, Dmitry A. Medvedev, M. Litvinenko
{"title":"Model for Building Competencies of a Computer Crime Investigator","authors":"D. Chukova, Dmitry A. Medvedev, M. Litvinenko","doi":"10.21681/2311-3456-2019-3-57-62","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-3-57-62","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"143 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114017731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Innovative Development of Tools and Technologies to Ensure the Russian Information Security and Core Protective Guidelines 工具和技术的创新发展,以确保俄罗斯信息安全和核心保护准则
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-1-10-17
Roman V. Maximov, A. Krupenin, Sergey Sharifullin, S. Sokolovsky
{"title":"Innovative Development of Tools and Technologies to Ensure the Russian Information Security and Core Protective Guidelines","authors":"Roman V. Maximov, A. Krupenin, Sergey Sharifullin, S. Sokolovsky","doi":"10.21681/2311-3456-2019-1-10-17","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-1-10-17","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114785902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Logical-Linguistic Mechanism of Formation of “Paper” Bullets in the Information confrontation 信息对抗中“纸”子弹形成的逻辑-语言机制
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2023-1-93-99
S. Kapitsyn, Konstantin Ryumshin, V. Varenitsa
Purpose of the work consists in the analysis of approaches to the representation of the integrity of the seman- tics of knowledge of the information need of the target object of influence and the development of a logical-linguis- tic method for the formation of “paper” bullets based on phrase-structural grammar.Research method: the mechanism of the formation of «paper» bullets in the form of semantic-syntactic con- structions and a set of required semantic conclusions (inferences, the basis for the formation of a model of social behavior of the «defeated») of the target object of influence in the form of logical-linguistic models are illustrated. Research results: the technology of presenting logical-linguistic models (semantic-syntactic constructions) of «paper» bullets can be used in the development of the foundations of information weapons (information and recon- naissance strike systems) for selective impact on an object and a guaranteed change in its information needs in the interests of covert formation the required model of social behavior (the model of social behavior of the «van- quished»). Scientific novelty: representation of the integrity of the meaning of the required information needs in the form of semantic-syntactic constructions based on logic - the law of maintaining the integrity of the object.
这项工作的目的在于分析影响目标对象的信息需求的知识的语义完整性的表示方法,并开发一种基于短语结构语法的“纸”子弹形成的逻辑语言学方法。研究方法:以语义-句法结构的形式阐述“纸”子弹的形成机制,并以逻辑-语言模型的形式说明目标影响对象的一组必要的语义结论(推论,是形成“失败者”社会行为模型的基础)。研究成果:“纸”子弹的逻辑-语言模型(语义-句法结构)的呈现技术可用于信息武器(信息和侦察打击系统)的基础开发,以对目标进行选择性影响,并保证其信息需求的变化,从而隐蔽地形成所需的社会行为模型(“van- quished”社会行为模型)。科学新颖性:将所要求的信息需要的意义的完整性以基于逻辑的语义句法结构的形式表现出来——保持对象完整性的规律。
{"title":"Logical-Linguistic Mechanism of Formation of “Paper” Bullets in the Information confrontation","authors":"S. Kapitsyn, Konstantin Ryumshin, V. Varenitsa","doi":"10.21681/2311-3456-2023-1-93-99","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-1-93-99","url":null,"abstract":"Purpose of the work consists in the analysis of approaches to the representation of the integrity of the seman- tics of knowledge of the information need of the target object of influence and the development of a logical-linguis- tic method for the formation of “paper” bullets based on phrase-structural grammar.Research method: the mechanism of the formation of «paper» bullets in the form of semantic-syntactic con- structions and a set of required semantic conclusions (inferences, the basis for the formation of a model of social behavior of the «defeated») of the target object of influence in the form of logical-linguistic models are illustrated. Research results: the technology of presenting logical-linguistic models (semantic-syntactic constructions) of «paper» bullets can be used in the development of the foundations of information weapons (information and recon- naissance strike systems) for selective impact on an object and a guaranteed change in its information needs in the interests of covert formation the required model of social behavior (the model of social behavior of the «van- quished»). Scientific novelty: representation of the integrity of the meaning of the required information needs in the form of semantic-syntactic constructions based on logic - the law of maintaining the integrity of the object.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123996289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Practical Aspects of Vulnerability Detection During Certification Tests of Information Security Software 信息安全软件认证测试中漏洞检测的实践问题
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-5-36-44
V. Varenitsa, Jsc Npo Echelon, A. Markov, V. Savchenko, V. Tsirlov, Bauman Moscow State Technical Universit
Purpose: analysis of various techniques and techniques for identifying defects and vulnerabilities during certification tests. Research method: comparative analysis. Result: the conclusion is made about the relevance and priority of the study of open-source web applications. The study is given and the shortcomings of directive methods for identifying vulnerabilities and undeclared capabilities in software products are shown. The author’s statistics of the identified vulnerabilities are given with detailing by classes of computer attacks, manufacturers of information security tools, programming environments and methods for identifying vulnerabilities. A comparative analysis of author’s methods with known directive testing methods is given. The relevance of the implementation of the concept of developing secure software is shown. Recommendations on improving the security of software tools for information protection are given.
目的:分析认证测试期间用于识别缺陷和漏洞的各种技术和技术。研究方法:比较分析法。结果:得出了开源web应用研究的相关性和优先性的结论。本文给出了研究结果,并指出了用于识别软件产品中漏洞和未声明功能的指导性方法的不足。作者对已识别的漏洞进行了统计,并详细介绍了计算机攻击的类别、信息安全工具的制造商、编程环境和漏洞识别方法。并将本文方法与已知的指示测试方法进行了比较分析。说明了实现开发安全软件概念的相关性。提出了提高信息保护软件工具安全性的建议。
{"title":"Practical Aspects of Vulnerability Detection During Certification Tests of Information Security Software","authors":"V. Varenitsa, Jsc Npo Echelon, A. Markov, V. Savchenko, V. Tsirlov, Bauman Moscow State Technical Universit","doi":"10.21681/2311-3456-2021-5-36-44","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-5-36-44","url":null,"abstract":"Purpose: analysis of various techniques and techniques for identifying defects and vulnerabilities during certification tests. Research method: comparative analysis. Result: the conclusion is made about the relevance and priority of the study of open-source web applications. The study is given and the shortcomings of directive methods for identifying vulnerabilities and undeclared capabilities in software products are shown. The author’s statistics of the identified vulnerabilities are given with detailing by classes of computer attacks, manufacturers of information security tools, programming environments and methods for identifying vulnerabilities. A comparative analysis of author’s methods with known directive testing methods is given. The relevance of the implementation of the concept of developing secure software is shown. Recommendations on improving the security of software tools for information protection are given.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115450505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visual Analytics for Information Security: Efficiency Assessment and Analysis of Visualization Methods 信息安全的可视化分析:可视化方法的效率评估和分析
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-6-36-45
Igor Kotenko, Maxim Kolomeec, K. Zhernova, A. Chechulin
The purpose of the article: to identify and systematize information security problems that are solved using visual analytics methods, applied data visualization models and methods for assessing the effectiveness of visualization models. Research method: a systematic analysis of the application of visual analytics methods for solving information security problems. Analysis of relevant work in the field of information security and data visualization, as well as methods for assessing visualization. The objects of research are: solving information security problems through visual analysis and methods for assessing the effectiveness of visualization models. The result obtained: an interactive map of visualization models and their areas of application is presented, which will allow researchers and developers to choose the visualization models that are most appropriate for specific applied information security problems. A classification of methods for assessing visualization is presented. The scope of the proposed approach is the creation of visualization models that can be used to increase the efficiency of operator interaction with information security applications. The proposed article will be useful both for students studying in the direction of training “Information Security”, and for specialists who develop information security systems.
本文的目的是:识别和系统化使用可视化分析方法解决的信息安全问题,应用数据可视化模型和评估可视化模型有效性的方法。研究方法:系统分析可视化分析方法在解决信息安全问题中的应用。分析了信息安全和数据可视化领域的相关工作,以及可视化评估的方法。研究对象为:通过可视化分析解决信息安全问题,以及评估可视化模型有效性的方法。得到的结果是:展示了可视化模型及其应用领域的交互式地图,这将允许研究人员和开发人员选择最适合特定应用信息安全问题的可视化模型。对评估可视化的方法进行了分类。所提出的方法的范围是创建可视化模型,可用于提高操作员与信息安全应用程序交互的效率。建议的文章对学习“信息安全”培训方向的学生和开发信息安全系统的专家都很有用。
{"title":"Visual Analytics for Information Security: Efficiency Assessment and Analysis of Visualization Methods","authors":"Igor Kotenko, Maxim Kolomeec, K. Zhernova, A. Chechulin","doi":"10.21681/2311-3456-2021-6-36-45","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-6-36-45","url":null,"abstract":"The purpose of the article: to identify and systematize information security problems that are solved using visual analytics methods, applied data visualization models and methods for assessing the effectiveness of visualization models. Research method: a systematic analysis of the application of visual analytics methods for solving information security problems. Analysis of relevant work in the field of information security and data visualization, as well as methods for assessing visualization. The objects of research are: solving information security problems through visual analysis and methods for assessing the effectiveness of visualization models. The result obtained: an interactive map of visualization models and their areas of application is presented, which will allow researchers and developers to choose the visualization models that are most appropriate for specific applied information security problems. A classification of methods for assessing visualization is presented. The scope of the proposed approach is the creation of visualization models that can be used to increase the efficiency of operator interaction with information security applications. The proposed article will be useful both for students studying in the direction of training “Information Security”, and for specialists who develop information security systems.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129542552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Procedure for Assuring the Continuity of Critical Information Infrastructure under Conditions of Information Influence 在信息影响条件下保证关键信息基础设施连续性的程序
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-6-37-48
S. Klimov, Sergey Polikarpov, Boris Rizhov, R. Tihonov, Igor Shpirnya
{"title":"Procedure for Assuring the Continuity of Critical Information Infrastructure under Conditions of Information Influence","authors":"S. Klimov, Sergey Polikarpov, Boris Rizhov, R. Tihonov, Igor Shpirnya","doi":"10.21681/2311-3456-2019-6-37-48","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-6-37-48","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129101604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Structural and Functional Model of Cyberspace 网络空间结构与功能模型
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-4-16-24
Y. Starodubtsev, P. Zakalkin, S. Ivanov
Abstract. The aim of the research is to develop a structural and functional model of cyberspace as an element of its mathematical (analytical and simulation) model, which allows us to study the properties of cyberspace. Formation of the terminological basis of the research area. Research methods: theory of complex systems, synergetics. Research result: a structural and functional model has been developed that describes the process of forming information services based on cyberspace resources. In relation to cyberspace, the concept of “symbiont” is introduced as a universal concept that allows describing any element of cyberspace and its resources. The following terms are defined: cyberspace, information, computing and telecommunications resource. In addition, the formalization of resources and information services provided by cyberspace is presented. An example of forming an information service based on cyberspace resources is shown.
摘要研究的目的是建立一个网络空间的结构和功能模型,作为其数学(分析和模拟)模型的一个元素,使我们能够研究网络空间的属性。形成本研究领域的术语基础。研究方法:复杂系统理论、协同学。研究成果:构建了基于网络空间资源的信息服务形成过程的结构与功能模型。在网络空间方面,引入了“共生体”的概念,作为一个通用概念,可以描述网络空间的任何元素及其资源。下列术语的定义:网络空间、信息、计算和电信资源。此外,还提出了网络空间所提供的资源和信息服务的形式化。给出了一个基于网络空间资源形成信息服务的实例。
{"title":"Structural and Functional Model of Cyberspace","authors":"Y. Starodubtsev, P. Zakalkin, S. Ivanov","doi":"10.21681/2311-3456-2021-4-16-24","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-4-16-24","url":null,"abstract":"Abstract. The aim of the research is to develop a structural and functional model of cyberspace as an element of its mathematical (analytical and simulation) model, which allows us to study the properties of cyberspace. Formation of the terminological basis of the research area. Research methods: theory of complex systems, synergetics. Research result: a structural and functional model has been developed that describes the process of forming information services based on cyberspace resources. In relation to cyberspace, the concept of “symbiont” is introduced as a universal concept that allows describing any element of cyberspace and its resources. The following terms are defined: cyberspace, information, computing and telecommunications resource. In addition, the formalization of resources and information services provided by cyberspace is presented. An example of forming an information service based on cyberspace resources is shown.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129920552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Studing the Issues of Applying Protected Digitalization Technologies as Exemplified by the Digital Student Rating 以数字学生评分为例研究受保护数字化技术的应用问题
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-3-33-38
A. Shcherbakov, Aleksandr Buligin, A. Elizarova, V. Ryabkov
{"title":"Studing the Issues of Applying Protected Digitalization Technologies as Exemplified by the Digital Student Rating","authors":"A. Shcherbakov, Aleksandr Buligin, A. Elizarova, V. Ryabkov","doi":"10.21681/2311-3456-2019-3-33-38","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-3-33-38","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128676844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ARCHITECTURE OF ADAPTIVE PROTECTION SYSTEM FOR SENSOR NETWORK 传感器网络自适应保护系统结构
Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-6-22-39
A. Basan, E. Basan, O. Peskova, Nikita Sushkin, M. Shulika
38Адаптивная система защиты сенсорных сетей от активных атак Вопросы кибербезопасности. 2022. No 6(52) Architecture of AdAptiVe protection system for sensor netWorK Basan A.S.6 , Basan E.S.7 , Peskova O.Yu.8 , Sushkin N.A.9 , Shulika M.G.10 Purpose: Development of the adaptive protection system architecture for sensor networks and cyber-physical systems for anomaly detection based on the collection and analysis of cyber-physical parameters. Method: The method is based on the use of probability theory, mathematical statistics, and information theory. The entropy measure and normalization of the raw data make it possible to unify the data and evaluate it in terms of anomaly detection. Results: The existing solutions for the protection of cyber-physical systems from external active attacks were analyzed. The architecture of an adaptive system for a cyber-physical system protection is proposed. As part of the representation of the node data collection and analysis subsystem, a method for estimating cyber-physical parameters to detect intrusions is proposed. Three parameter changes for four behavioral scenarios were analyzed in detail in this study. Even by three parameters, you can determine the difference between attacks and normal behaviors. It is possible to evaluate not only the fact of parameter change, but also the degree of its change. At the same time, the node autonomously compared changes in its parameters with changes in the parameters of the neighboring node and could identify the impact of the attack on the neighboring node. The scientific novelty primarily consists in the fact that for the first time a method for determining the abnormal activity of a cyber-physical system based on the evaluation of system parameters using a measure of entropy and normalization of raw data has been developed, which makes it possible to achieve a high level of detection of known and unknown attacks. This method can be effectively used also for autonomous systems. The original architecture of the adaptive system for protecting the cyber-physical system is also proposed, its main components are worked out. When implementing an attack in a distributed system, this development will allow the node to detect anomalies not only autonomously, but also distributed, that is, to detect the impact on neighboring nodes.
38АдаптивнаясистемазащитысенсорныхсетейотактивныхатакВопросыкибербезопасности。2022. [6]杨建军,杨建军,杨建军,等。传感器网络自适应保护系统的体系结构。8、苏什金9、舒利卡10目的:基于网络物理参数的收集和分析,开发用于异常检测的传感器网络和网络物理系统的自适应保护系统架构。方法:该方法以概率论、数理统计和信息论为基础。原始数据的熵测度和归一化使得数据的统一和异常检测评价成为可能。结果:分析了现有的保护网络物理系统免受外部主动攻击的解决方案。提出了一种用于网络物理系统防护的自适应系统体系结构。作为节点数据采集与分析子系统的一部分,提出了一种用于入侵检测的网络物理参数估计方法。本研究详细分析了四种行为情景下的三个参数变化。即使只有三个参数,您也可以确定攻击与正常行为之间的区别。不仅可以评估参数变化的事实,而且可以评估其变化的程度。同时,节点自主比较自身参数的变化与相邻节点参数的变化,能够识别攻击对相邻节点的影响。科学的新颖性主要在于这样一个事实,即首次开发了一种基于使用熵度量和原始数据规范化来评估系统参数的方法来确定网络物理系统的异常活动,这使得实现对已知和未知攻击的高水平检测成为可能。这种方法也可以有效地用于自治系统。提出了网络物理系统自适应保护系统的原始体系结构,并对其主要组成部分进行了设计。当在分布式系统中实施攻击时,这种开发将允许节点不仅自主地检测异常,而且是分布式的,即检测对相邻节点的影响。
{"title":"ARCHITECTURE OF ADAPTIVE PROTECTION SYSTEM FOR SENSOR NETWORK","authors":"A. Basan, E. Basan, O. Peskova, Nikita Sushkin, M. Shulika","doi":"10.21681/2311-3456-2022-6-22-39","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-6-22-39","url":null,"abstract":"38Адаптивная система защиты сенсорных сетей от активных атак Вопросы кибербезопасности. 2022. No 6(52) Architecture of AdAptiVe protection system for sensor netWorK Basan A.S.6 , Basan E.S.7 , Peskova O.Yu.8 , Sushkin N.A.9 , Shulika M.G.10 Purpose: Development of the adaptive protection system architecture for sensor networks and cyber-physical systems for anomaly detection based on the collection and analysis of cyber-physical parameters. Method: The method is based on the use of probability theory, mathematical statistics, and information theory. The entropy measure and normalization of the raw data make it possible to unify the data and evaluate it in terms of anomaly detection. Results: The existing solutions for the protection of cyber-physical systems from external active attacks were analyzed. The architecture of an adaptive system for a cyber-physical system protection is proposed. As part of the representation of the node data collection and analysis subsystem, a method for estimating cyber-physical parameters to detect intrusions is proposed. Three parameter changes for four behavioral scenarios were analyzed in detail in this study. Even by three parameters, you can determine the difference between attacks and normal behaviors. It is possible to evaluate not only the fact of parameter change, but also the degree of its change. At the same time, the node autonomously compared changes in its parameters with changes in the parameters of the neighboring node and could identify the impact of the attack on the neighboring node. The scientific novelty primarily consists in the fact that for the first time a method for determining the abnormal activity of a cyber-physical system based on the evaluation of system parameters using a measure of entropy and normalization of raw data has been developed, which makes it possible to achieve a high level of detection of known and unknown attacks. This method can be effectively used also for autonomous systems. The original architecture of the adaptive system for protecting the cyber-physical system is also proposed, its main components are worked out. When implementing an attack in a distributed system, this development will allow the node to detect anomalies not only autonomously, but also distributed, that is, to detect the impact on neighboring nodes.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121074425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Voprosy kiberbezopasnosti
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1