首页 > 最新文献

AUTOMATIC CONTROL AND COMPUTER SCIENCES最新文献

英文 中文
Protecting Smart City Blockchain Systems from Selfish Mining Attacks 保护智慧城市区块链系统免受自私的挖矿攻击
IF 0.5 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2026-02-24 DOI: 10.3103/S0146411625701044
M. O. Kalinin, A. S. Konoplev

The mining algorithm in smart city blockchain systems using the Proof-of-Work consensus mechanism is studied. Well-known studies in the field of selfish mining detection are analyzed. A method for protecting a blockchain from selfish mining attacks is presented, and a selfish mining detection plugin is developed based on this method. This plugin is designed for miner software and enables the analysis of data patterns received from the mining pool. The proposed solution outperforms existing selfish mining detectors by identifying the attacking mining pool and has lower error rates.

研究了基于工作量证明共识机制的智慧城市区块链系统挖矿算法。分析了自采探测领域的知名研究成果。提出了一种保护区块链免受自私挖掘攻击的方法,并在此基础上开发了一个自私挖掘检测插件。这个插件是为矿工软件设计的,可以分析从矿池接收到的数据模式。提出的解决方案通过识别攻击矿池来优于现有的自私挖掘检测器,并且具有较低的错误率。
{"title":"Protecting Smart City Blockchain Systems from Selfish Mining Attacks","authors":"M. O. Kalinin,&nbsp;A. S. Konoplev","doi":"10.3103/S0146411625701044","DOIUrl":"10.3103/S0146411625701044","url":null,"abstract":"<p>The mining algorithm in smart city blockchain systems using the Proof-of-Work consensus mechanism is studied. Well-known studies in the field of selfish mining detection are analyzed. A method for protecting a blockchain from selfish mining attacks is presented, and a selfish mining detection plugin is developed based on this method. This plugin is designed for miner software and enables the analysis of data patterns received from the mining pool. The proposed solution outperforms existing selfish mining detectors by identifying the attacking mining pool and has lower error rates.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 8","pages":"1484 - 1490"},"PeriodicalIF":0.5,"publicationDate":"2026-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147341470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Large Language Models in the Problem of Event Forecasting 大型语言模型在事件预测问题中的应用
IF 0.5 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2026-02-24 DOI: 10.3103/S0146411625701111
A. D. Dakhnovich, V. M. Bogina, A. A. Makeeva

This paper presents a study of the application of large language models (LLMs) to predict events based on LLM agents—autonomous systems that use LLMs for reasoning, decision making, and interaction with the environment. Various architectures of LLM agents are analyzed: cooperative systems (ChatDev, MetaGPT), multiagent debates (MAD, ChatEval), agents for web tasks (WebAgent, WebVoyager), and simulation agents (Generative Agents, EconAgent). Particular attention is paid to the features of predictive modeling based on LLMs, where classical approaches (regression, time series) are replaced by agent-based modeling and predictive engineering. This article presents the results of an experiment on predicting the outcome of a selected conflict using an LLM agent (Mistral, DeepSeek) and the retrieval-augmented generation (RAG) approach based on data from analytical agencies, opinion leaders, and news sources. The convergence of forecast estimates of polarized sources is revealed and requirements for forecasting systems are formulated: weighting sources according to expert significance, filtering neutral data, and sample balancing. Requirements are put forward for the selection of data assessed by simulation LLM agents.

本文研究了大型语言模型(LLM)在基于LLM代理(使用LLM进行推理、决策和与环境交互的自治系统)的基础上预测事件的应用。分析了LLM代理的各种架构:协作系统(ChatDev, MetaGPT),多代理辩论(MAD, ChatEval), web任务代理(WebAgent, WebVoyager)和模拟代理(生成代理,EconAgent)。特别关注基于llm的预测建模的特征,其中经典方法(回归,时间序列)被基于代理的建模和预测工程所取代。本文介绍了使用LLM代理(Mistral, DeepSeek)和基于分析机构、意见领袖和新闻来源数据的检索增强生成(RAG)方法预测选定冲突结果的实验结果。揭示了极化源预测估计的收敛性,并制定了预测系统的要求:根据专家显著性对源进行加权,过滤中性数据,以及样本平衡。对仿真LLM代理评估数据的选择提出了要求。
{"title":"Application of Large Language Models in the Problem of Event Forecasting","authors":"A. D. Dakhnovich,&nbsp;V. M. Bogina,&nbsp;A. A. Makeeva","doi":"10.3103/S0146411625701111","DOIUrl":"10.3103/S0146411625701111","url":null,"abstract":"<p>This paper presents a study of the application of large language models (LLMs) to predict events based on LLM agents—autonomous systems that use LLMs for reasoning, decision making, and interaction with the environment. Various architectures of LLM agents are analyzed: cooperative systems (ChatDev, MetaGPT), multiagent debates (MAD, ChatEval), agents for web tasks (WebAgent, WebVoyager), and simulation agents (Generative Agents, EconAgent). Particular attention is paid to the features of predictive modeling based on LLMs, where classical approaches (regression, time series) are replaced by agent-based modeling and predictive engineering. This article presents the results of an experiment on predicting the outcome of a selected conflict using an LLM agent (Mistral, DeepSeek) and the retrieval-augmented generation (RAG) approach based on data from analytical agencies, opinion leaders, and news sources. The convergence of forecast estimates of polarized sources is revealed and requirements for forecasting systems are formulated: weighting sources according to expert significance, filtering neutral data, and sample balancing. Requirements are put forward for the selection of data assessed by simulation LLM agents.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 8","pages":"1536 - 1543"},"PeriodicalIF":0.5,"publicationDate":"2026-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147341471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Combination of Methods for Selective Teacher Intervention in the Student’s Learning Process and Low-Rank Adaptation in the Knowledge Distillation Models 教师选择性干预学生学习过程的方法与知识蒸馏模型中的低阶适应的结合
IF 0.5 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2026-02-24 DOI: 10.3103/S0146411625700919
I. A. Sikarev, T. M. Tatarnikova, V. M. Abramov

The problem of optimizing neural networks for large language models (LLMs) such as ChatGPT is discussed. One of the directions being developed for optimizing LLMs is knowledge distillation—the transfer of knowledge from a large teacher model to a smaller student model without significant loss of accuracy of the result. The existing methods of knowledge distillation have certain disadvantages: inaccurate knowledge transfer, long learning process, and error accumulation in long sequences. A combination of methods that contribute to improving the quality of knowledge distillation is considered: selective teacher intervention in the student’s learning process and low-rank adaptation. The proposed combination of knowledge distillation methods can be applied to problems with limited computational resources.

讨论了面向ChatGPT等大型语言模型的神经网络优化问题。优化法学硕士的方向之一是知识提炼——将知识从一个大的教师模型转移到一个小的学生模型,而不会显著损失结果的准确性。现有的知识蒸馏方法存在知识转移不准确、学习过程长、长序列错误积累等缺点。本文考虑了有助于提高知识提炼质量的方法组合:教师对学生学习过程的选择性干预和低阶适应。所提出的知识蒸馏方法的组合可以应用于计算资源有限的问题。
{"title":"Combination of Methods for Selective Teacher Intervention in the Student’s Learning Process and Low-Rank Adaptation in the Knowledge Distillation Models","authors":"I. A. Sikarev,&nbsp;T. M. Tatarnikova,&nbsp;V. M. Abramov","doi":"10.3103/S0146411625700919","DOIUrl":"10.3103/S0146411625700919","url":null,"abstract":"<p>The problem of optimizing neural networks for large language models (LLMs) such as ChatGPT is discussed. One of the directions being developed for optimizing LLMs is knowledge distillation—the transfer of knowledge from a large teacher model to a smaller student model without significant loss of accuracy of the result. The existing methods of knowledge distillation have certain disadvantages: inaccurate knowledge transfer, long learning process, and error accumulation in long sequences. A combination of methods that contribute to improving the quality of knowledge distillation is considered: selective teacher intervention in the student’s learning process and low-rank adaptation. The proposed combination of knowledge distillation methods can be applied to problems with limited computational resources.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 8","pages":"1364 - 1370"},"PeriodicalIF":0.5,"publicationDate":"2026-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147341588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of Adversarial Attacks on Classical Machine Learning Models in the Context of Network Threat Detection 网络威胁检测中经典机器学习模型的对抗性攻击研究
IF 0.5 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2026-02-24 DOI: 10.3103/S0146411625700981
P. E. Yugai

A study of adversarial attacks on classical machine learning (ML) algorithms in the context of network threat detection is presented. An overview of ML models that are used to perform various tasks in computer network security systems is presented. A formal description of the threat model is provided, as well as a classification of adversarial attacks. The network traffic of the WEB-IDS23 dataset was classified using classical machine learning models: k-nearest neighbors (KNN), Random Forest (RF), and Support Vector Machine (SVM). Adversarial attacks such as the fast gradient sign method (FGSM), projected gradient descent, Carlini & Wagner (C & W), and DeepFool are implemented on these ML algorithms. The impact of the adversarial attacks implemented on listed classical machine learning algorithms is analyzed.

在网络威胁检测的背景下,研究了经典机器学习(ML)算法的对抗性攻击。概述了在计算机网络安全系统中用于执行各种任务的机器学习模型。提供了威胁模型的正式描述,以及对抗性攻击的分类。使用经典的机器学习模型:k近邻(KNN)、随机森林(RF)和支持向量机(SVM)对WEB-IDS23数据集的网络流量进行分类。对抗性攻击,如快速梯度符号方法(FGSM)、投影梯度下降、Carlini &; Wagner (C &; W)和DeepFool都是在这些ML算法上实现的。分析了对抗性攻击对列举的经典机器学习算法的影响。
{"title":"Study of Adversarial Attacks on Classical Machine Learning Models in the Context of Network Threat Detection","authors":"P. E. Yugai","doi":"10.3103/S0146411625700981","DOIUrl":"10.3103/S0146411625700981","url":null,"abstract":"<p>A study of adversarial attacks on classical machine learning (ML) algorithms in the context of network threat detection is presented. An overview of ML models that are used to perform various tasks in computer network security systems is presented. A formal description of the threat model is provided, as well as a classification of adversarial attacks. The network traffic of the WEB-IDS23 dataset was classified using classical machine learning models: k-nearest neighbors (KNN), Random Forest (RF), and Support Vector Machine (SVM). Adversarial attacks such as the fast gradient sign method (FGSM), projected gradient descent, Carlini &amp; Wagner (C &amp; W), and DeepFool are implemented on these ML algorithms. The impact of the adversarial attacks implemented on listed classical machine learning algorithms is analyzed.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 8","pages":"1426 - 1439"},"PeriodicalIF":0.5,"publicationDate":"2026-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147341591","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzz Testing of Closed-Source Software Using Large Language Models 使用大型语言模型的闭源软件模糊测试
IF 0.5 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2026-02-24 DOI: 10.3103/S0146411625700804
T. D. Ovasapyan, D. A. Gavrichkov, D. V. Ivanov

The architecture of large language models (LLMs) and the possibility of their application to automate fuzz testing software are studied. As a result of the study, a method is developed that enables fuzz testing applications with a graphical interface in the Windows operating system. A software prototype implementing the proposed method is developed and tested.

研究了大型语言模型的体系结构及其在自动化模糊测试软件中的应用可能性。研究的结果是,开发了一种在Windows操作系统中使用图形界面对应用程序进行模糊测试的方法。开发并测试了实现该方法的软件原型。
{"title":"Fuzz Testing of Closed-Source Software Using Large Language Models","authors":"T. D. Ovasapyan,&nbsp;D. A. Gavrichkov,&nbsp;D. V. Ivanov","doi":"10.3103/S0146411625700804","DOIUrl":"10.3103/S0146411625700804","url":null,"abstract":"<p>The architecture of large language models (LLMs) and the possibility of their application to automate fuzz testing software are studied. As a result of the study, a method is developed that enables fuzz testing applications with a graphical interface in the Windows operating system. A software prototype implementing the proposed method is developed and tested.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 8","pages":"1278 - 1284"},"PeriodicalIF":0.5,"publicationDate":"2026-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147341651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study of the Problems of Information-Security Auditing of Geographically Distributed Internet-of-Things Devices 地理分布物联网设备信息安全审计问题研究
IF 0.5 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2026-02-24 DOI: 10.3103/S0146411625700713
V. O. Erastov, E. A. Zubkov, D. P. Zegzhda

The existing approaches to building active auditing systems for Internet-of-Things (IoT) devices are studied. A robust approach to auditing IoT devices using fault-tolerant distribution is proposed. A comparative analysis of consensus-achieving algorithms in distributed systems and means of implementing active auditing is conducted.

对现有的物联网设备主动审计系统构建方法进行了研究。提出了一种使用容错分布审计物联网设备的鲁棒方法。对分布式系统中的共识达成算法和主动审计方法进行了比较分析。
{"title":"Study of the Problems of Information-Security Auditing of Geographically Distributed Internet-of-Things Devices","authors":"V. O. Erastov,&nbsp;E. A. Zubkov,&nbsp;D. P. Zegzhda","doi":"10.3103/S0146411625700713","DOIUrl":"10.3103/S0146411625700713","url":null,"abstract":"<p>The existing approaches to building active auditing systems for Internet-of-Things (IoT) devices are studied. A robust approach to auditing IoT devices using fault-tolerant distribution is proposed. A comparative analysis of consensus-achieving algorithms in distributed systems and means of implementing active auditing is conducted.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 8","pages":"1201 - 1208"},"PeriodicalIF":0.5,"publicationDate":"2026-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147341755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generalized Method for Comparative Analysis of Fuzz-Testing Tools 模糊测试工具比较分析的广义方法
IF 0.5 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2026-02-24 DOI: 10.3103/S0146411625700774
R. A. Ognev, D. P. Zegzhda

A systematic analysis of methods for evaluating the effectiveness of fuzzers is conducted. A minimal but complete set of metrics is identified: branch coverage, number of unique crashes, and time to first crash. A normalized integral indicator is proposed that allows post hoc comparison of the results of different tools without reruns.

系统地分析了模糊器有效性的评价方法。确定了一组最小但完整的度量:分支覆盖率、唯一崩溃的数量和第一次崩溃的时间。提出了一种归一化积分指标,允许对不同工具的结果进行事后比较,而无需重新运行。
{"title":"Generalized Method for Comparative Analysis of Fuzz-Testing Tools","authors":"R. A. Ognev,&nbsp;D. P. Zegzhda","doi":"10.3103/S0146411625700774","DOIUrl":"10.3103/S0146411625700774","url":null,"abstract":"<p>A systematic analysis of methods for evaluating the effectiveness of fuzzers is conducted. A minimal but complete set of metrics is identified: branch coverage, number of unique crashes, and time to first crash. A normalized integral indicator is proposed that allows post hoc comparison of the results of different tools without reruns.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 8","pages":"1253 - 1259"},"PeriodicalIF":0.5,"publicationDate":"2026-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147341760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of Data Obfuscation in Big Data Processing and Storage Systems 大数据处理与存储系统中数据混淆的优化
IF 0.5 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2026-02-24 DOI: 10.3103/S0146411625701020
M. A. Poltavtseva, O. A. Izotova, D. V. Ivanov, D. P. Zegzhda

This paper studies the problem of reducing the attack surface from an internal attacker in heterogeneous systems for processing and storing big data by selecting the optimal data obfuscation method based on anonymization technologies. The study analyzes the terminology and systematizes data-hiding methods to reduce the attack surface in big data processing and storage systems. A formal formulation of the problem of finding the optimal data obfuscation method and an algorithm for solving it across various types of datasets are proposed, taking into account evaluation criteria specific to each class of methods. The implementation of a software prototype for supporting decision-making and selecting the optimal method for solving practical problems is described. Experimental testing and analysis of its results are carried out.

本文通过选择基于匿名化技术的最佳数据混淆方法,研究了异构系统处理和存储大数据时减少内部攻击者攻击面问题。通过对数据隐藏的术语分析,对数据隐藏的方法进行系统化,减少大数据处理和存储系统中的攻击面。考虑到每种方法的特定评估标准,提出了寻找最佳数据混淆方法问题的形式化表述和跨各种类型数据集解决该问题的算法。描述了一个支持决策和选择解决实际问题的最优方法的软件原型的实现。对其结果进行了实验测试和分析。
{"title":"Optimization of Data Obfuscation in Big Data Processing and Storage Systems","authors":"M. A. Poltavtseva,&nbsp;O. A. Izotova,&nbsp;D. V. Ivanov,&nbsp;D. P. Zegzhda","doi":"10.3103/S0146411625701020","DOIUrl":"10.3103/S0146411625701020","url":null,"abstract":"<p>This paper studies the problem of reducing the attack surface from an internal attacker in heterogeneous systems for processing and storing big data by selecting the optimal data obfuscation method based on anonymization technologies. The study analyzes the terminology and systematizes data-hiding methods to reduce the attack surface in big data processing and storage systems. A formal formulation of the problem of finding the optimal data obfuscation method and an algorithm for solving it across various types of datasets are proposed, taking into account evaluation criteria specific to each class of methods. The implementation of a software prototype for supporting decision-making and selecting the optimal method for solving practical problems is described. Experimental testing and analysis of its results are carried out.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 8","pages":"1464 - 1474"},"PeriodicalIF":0.5,"publicationDate":"2026-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147341526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of the Potential for Using Biometric Characteristics to Identify Insider Threats Based on Psycho-Emotional State 利用生物特征识别基于心理情绪状态的内部威胁的潜力分析
IF 0.5 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2026-02-24 DOI: 10.3103/S014641162570107X
S. V. Kornienko, S. E. Adadurov, A. A. Kornienko, E. D. Osipenko

The main biometric characteristics reflecting changes in the psycho-emotional state of a user of an information system are examined. They are ranked using the pairwise comparison method, as a result of which voice and keystroke dynamics are identified as most suitable for further research. Criteria for the preliminary identification of potential internal information security violators based on changes in the considered biometric characteristics are defined. A convolutional neural network model is developed and tested to solve the stated problem.

主要的生物特征反映的变化,在一个信息系统的用户的心理情绪状态进行了检查。它们使用两两比较方法进行排名,因此语音和击键动力学被认为是最适合进一步研究的。根据所考虑的生物特征的变化,定义了初步识别潜在内部信息安全违规者的标准。开发并测试了一个卷积神经网络模型来解决上述问题。
{"title":"Analysis of the Potential for Using Biometric Characteristics to Identify Insider Threats Based on Psycho-Emotional State","authors":"S. V. Kornienko,&nbsp;S. E. Adadurov,&nbsp;A. A. Kornienko,&nbsp;E. D. Osipenko","doi":"10.3103/S014641162570107X","DOIUrl":"10.3103/S014641162570107X","url":null,"abstract":"<p>The main biometric characteristics reflecting changes in the psycho-emotional state of a user of an information system are examined. They are ranked using the pairwise comparison method, as a result of which voice and keystroke dynamics are identified as most suitable for further research. Criteria for the preliminary identification of potential internal information security violators based on changes in the considered biometric characteristics are defined. A convolutional neural network model is developed and tested to solve the stated problem.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 8","pages":"1504 - 1511"},"PeriodicalIF":0.5,"publicationDate":"2026-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147341578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection of Honeypot Systems Based on a Comprehensive Analysis of Node Performance Indicators 基于节点性能指标综合分析的蜜罐系统检测
IF 0.5 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2026-02-24 DOI: 10.3103/S0146411625700889
T. D. Ovasapyan, D. A. Ponomarev, D. V. Ivanov, E. V. Zavadskii

The principles of construction and operation of honeypot systems are studied. Existing detection methods are analyzed, and their advantages and disadvantages are highlighted. A detection method based on the analysis of command execution delays is proposed. A universal detection method based on combining the results of the methods is proposed. A software prototype of the detection system is developed and tested.

研究了蜜罐系统的构造和运行原理。对现有的检测方法进行了分析,并突出了其优缺点。提出了一种基于命令执行延迟分析的检测方法。结合这些方法的结果,提出了一种通用的检测方法。开发并测试了该检测系统的软件原型。
{"title":"Detection of Honeypot Systems Based on a Comprehensive Analysis of Node Performance Indicators","authors":"T. D. Ovasapyan,&nbsp;D. A. Ponomarev,&nbsp;D. V. Ivanov,&nbsp;E. V. Zavadskii","doi":"10.3103/S0146411625700889","DOIUrl":"10.3103/S0146411625700889","url":null,"abstract":"<p>The principles of construction and operation of honeypot systems are studied. Existing detection methods are analyzed, and their advantages and disadvantages are highlighted. A detection method based on the analysis of command execution delays is proposed. A universal detection method based on combining the results of the methods is proposed. A software prototype of the detection system is developed and tested.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 8","pages":"1338 - 1344"},"PeriodicalIF":0.5,"publicationDate":"2026-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147341581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
AUTOMATIC CONTROL AND COMPUTER SCIENCES
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1