首页 > 最新文献

AUTOMATIC CONTROL AND COMPUTER SCIENCES最新文献

英文 中文
Analysis of Data Exchange Systems about Information Security Threats 数据交换系统的信息安全威胁分析
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-03-14 DOI: 10.3103/S0146411624701037
E. Yu. Pavlenko, N. V. Polosukhin

The modern approaches and protocols for communication concerning information security threats are analyzed. A classification of information about the threats is given, and the area of applicability of these classes is estimated. A classification of protocols and standards for communication concerning the threats is presented, and the classes of information about the threats and protocols describing such threats are compared. For each class of protocols and standards, the area of applicability for describing each level of information about the threats is estimated. The main conclusion is as follows: the further study of the standards in this domain will allow determining the necessary set of requirements on the process of exchanging information about the threats that enables more efficiently responding to them and reducing potential risks.

分析了有关信息安全威胁的现代通信方法和协议。对威胁信息进行了分类,并估计了这些类别的适用范围。对有关威胁的通信协议和标准进行了分类,并对有关威胁的信息类别和描述此类威胁的协议进行了比较。针对每一类协议和标准,估算了描述每一级威胁信息的适用范围。主要结论如下:对该领域标准的进一步研究将有助于确定一套必要的威胁信息交换流程要求,从而更有效地应对威胁并降低潜在风险。
{"title":"Analysis of Data Exchange Systems about Information Security Threats","authors":"E. Yu. Pavlenko,&nbsp;N. V. Polosukhin","doi":"10.3103/S0146411624701037","DOIUrl":"10.3103/S0146411624701037","url":null,"abstract":"<p>The modern approaches and protocols for communication concerning information security threats are analyzed. A classification of information about the threats is given, and the area of applicability of these classes is estimated. A classification of protocols and standards for communication concerning the threats is presented, and the classes of information about the threats and protocols describing such threats are compared. For each class of protocols and standards, the area of applicability for describing each level of information about the threats is estimated. The main conclusion is as follows: the further study of the standards in this domain will allow determining the necessary set of requirements on the process of exchanging information about the threats that enables more efficiently responding to them and reducing potential risks.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1365 - 1372"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Peculiarities of Solving the Problem of Controlling Information Security Risks in the Development of Protection Methods against Covert (Steganographic) Information Exchange in Public Internet Resources 公共互联网资源隐蔽(隐写)信息交换保护方法发展中解决信息安全风险控制问题的特点
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-03-14 DOI: 10.3103/S0146411624700809
M. Yu. Fedosenko

This paper describes the stage of the practical control of information security risks of a web resource as a result of its use as a medium and communication channel in a steganographic information exchange. The possibility of using steganography in public internet resources as an intruder’s tool for the exchange of illegal data and realization of computer attacks is established on the basis of the available research results. It is proved that developing methods for preventing malicious use of steganographic algorithms is an urgent task. The information security threats concerning steganographic methods according to the database of the Federal Service for Technical and Export Control of the Russian Federation are considered. These threats are used to develop a four-level model of threats of a web resource on the part of user data, including risks of violation of integrity, access, confidentiality, and statements of Federal Law no. 374-FL (and corrections to Federal Law no. 149-FL On the Information, Information Technologies, and Protection of Information). Taking into account the statements of Federal Law no. 374-FL demonstrates the problem of the unavailability of data for checking malicious use in their covert exchange. On the basis of the developed model, the risks of a web resource are assessed by the Microsoft Security Assessment Tool (MSAT), as well as theoretically estimated by the FRAP and CRAMM matrices to demonstrate the peculiarities of using a specific approach to solve the problem of countering the new type of attacks. The necessary measures and mitigation components are calculated by the mathematical programming methods to reveal the minimal and optimal quantitative composition of the protection components against the malicious use of steganography. These measures and components consist of specialists, their competencies, and software tools needed for high-quality protection of a web resource within the studied scientific problem of malicious use of information protection technologies in the course of malpractice, as well as further development of tools for countering and analyzing the data arriving at the web resource.

本文描述了网络资源作为隐写信息交换的媒介和通信渠道所带来的信息安全风险的实际控制阶段。在现有研究成果的基础上,确定了利用公共网络资源中的隐写术作为入侵者交换非法数据和实现计算机攻击的工具的可能性。事实证明,开发防止恶意使用隐写算法的方法是一项紧迫的任务。根据俄罗斯联邦技术和出口管制联邦服务局的数据库,考虑了有关隐写方法的信息安全威胁。这些威胁被用于开发用户数据部分的web资源威胁的四级模型,包括违反完整性、访问、机密性和联邦法律第1号声明的风险。联邦法374-FL(以及对联邦法第374号的更正)149-FL信息、信息技术和信息保护)。考虑到第1号联邦法的规定。374-FL演示了在隐蔽交换中检查恶意使用的数据不可用的问题。在开发的模型的基础上,通过微软安全评估工具(MSAT)评估web资源的风险,并通过FRAP和CRAMM矩阵进行理论估计,以展示使用特定方法解决对抗新型攻击问题的特殊性。通过数学规划方法计算必要的措施和缓解组件,以揭示针对恶意使用隐写术的保护组件的最小和最佳定量组成。这些措施和组成部分包括专家、他们的能力和软件工具,以高质量地保护网络资源,研究在事故过程中恶意使用信息保护技术的科学问题,以及进一步开发用于对抗和分析到达网络资源的数据的工具。
{"title":"Peculiarities of Solving the Problem of Controlling Information Security Risks in the Development of Protection Methods against Covert (Steganographic) Information Exchange in Public Internet Resources","authors":"M. Yu. Fedosenko","doi":"10.3103/S0146411624700809","DOIUrl":"10.3103/S0146411624700809","url":null,"abstract":"<p>This paper describes the stage of the practical control of information security risks of a web resource as a result of its use as a medium and communication channel in a steganographic information exchange. The possibility of using steganography in public internet resources as an intruder’s tool for the exchange of illegal data and realization of computer attacks is established on the basis of the available research results. It is proved that developing methods for preventing malicious use of steganographic algorithms is an urgent task. The information security threats concerning steganographic methods according to the database of the Federal Service for Technical and Export Control of the Russian Federation are considered. These threats are used to develop a four-level model of threats of a web resource on the part of user data, including risks of violation of integrity, access, confidentiality, and statements of Federal Law no. 374-FL (and corrections to Federal Law no. 149-FL On the Information, Information Technologies, and Protection of Information). Taking into account the statements of Federal Law no. 374-FL demonstrates the problem of the unavailability of data for checking malicious use in their covert exchange. On the basis of the developed model, the risks of a web resource are assessed by the Microsoft Security Assessment Tool (MSAT), as well as theoretically estimated by the FRAP and CRAMM matrices to demonstrate the peculiarities of using a specific approach to solve the problem of countering the new type of attacks. The necessary measures and mitigation components are calculated by the mathematical programming methods to reveal the minimal and optimal quantitative composition of the protection components against the malicious use of steganography. These measures and components consist of specialists, their competencies, and software tools needed for high-quality protection of a web resource within the studied scientific problem of malicious use of information protection technologies in the course of malpractice, as well as further development of tools for countering and analyzing the data arriving at the web resource.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1169 - 1179"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143621798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model for Ranking the System of Indicators of Node Compromise of Corporate Data Network Nodes 企业数据网络节点危害指标体系排序模型
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-03-14 DOI: 10.3103/S014641162470072X
S. V. Bezzateev, V. A. Mylnikov, A. R. Starodub

The model of the system of ranking indicators of compromise for active countermeasures against targeted attacks is proposed, which makes it possible to detect threats in advance and plan measures to eliminate them before they manifest themselves. Another important aspect is the development of means and methods for the evaluation of information sources according to their level of confidence for the collection of data necessary for the investigation of incidents. On the basis of the proposed models, an information system for the ranking of compromise indicators was developed in order to minimize the possibility of a breach of the confidentiality, integrity and availability of information, as well as the compromise of data in the system.

提出了针对目标攻击主动对策的妥协指标排序系统模型,实现了对威胁的提前发现,并在威胁显现之前制定消除措施。另一个重要方面是发展根据资料来源的信任程度来评价资料来源的手段和方法,以便收集调查事件所必需的数据。在建议的模型的基础上,开发了一个危害指标排序的信息系统,以便尽量减少破坏信息的保密性、完整性和可得性的可能性,以及系统内数据的危害。
{"title":"Model for Ranking the System of Indicators of Node Compromise of Corporate Data Network Nodes","authors":"S. V. Bezzateev,&nbsp;V. A. Mylnikov,&nbsp;A. R. Starodub","doi":"10.3103/S014641162470072X","DOIUrl":"10.3103/S014641162470072X","url":null,"abstract":"<p>The model of the system of ranking indicators of compromise for active countermeasures against targeted attacks is proposed, which makes it possible to detect threats in advance and plan measures to eliminate them before they manifest themselves. Another important aspect is the development of means and methods for the evaluation of information sources according to their level of confidence for the collection of data necessary for the investigation of incidents. On the basis of the proposed models, an information system for the ranking of compromise indicators was developed in order to minimize the possibility of a breach of the confidentiality, integrity and availability of information, as well as the compromise of data in the system.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1108 - 1113"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Segmenting Input Data to Improve the Quality of Identification of Information Security Events 分割输入数据以提高信息安全事件识别的质量
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-03-14 DOI: 10.3103/S0146411624700822
M. E. Sukhoparov, I. S. Lebedev, D. D. Tikhonov

The processing of information sequences using segmentation of input data, aimed at improving the quality indicators of destructive impact detection using machine learning models is proposed. The basis of the proposed solution is the division of data into segments with different properties of the objects of observation. A method is described that uses a multilevel data processing architecture, where the processes of training, analysis of the achieved values of quality indicators, and assignment of the best models for quality indicators to individual data segments are implemented at various levels. The proposed method allows us to improve the quality indicators of the detection of destructive information impacts through segmentation and assignment of models that have the best indicators in individual segments.

提出了一种基于输入数据分割的信息序列处理方法,旨在利用机器学习模型提高破坏性冲击检测的质量指标。提出的解决方案的基础是将数据划分为具有不同观测对象属性的部分。描述了一种使用多层数据处理体系结构的方法,其中在不同级别上实现了培训过程、对质量指标实现值的分析以及将质量指标的最佳模型分配给各个数据段。所提出的方法允许我们通过分割和分配在单个片段中具有最佳指标的模型来提高破坏性信息影响检测的质量指标。
{"title":"Segmenting Input Data to Improve the Quality of Identification of Information Security Events","authors":"M. E. Sukhoparov,&nbsp;I. S. Lebedev,&nbsp;D. D. Tikhonov","doi":"10.3103/S0146411624700822","DOIUrl":"10.3103/S0146411624700822","url":null,"abstract":"<p>The processing of information sequences using segmentation of input data, aimed at improving the quality indicators of destructive impact detection using machine learning models is proposed. The basis of the proposed solution is the division of data into segments with different properties of the objects of observation. A method is described that uses a multilevel data processing architecture, where the processes of training, analysis of the achieved values of quality indicators, and assignment of the best models for quality indicators to individual data segments are implemented at various levels. The proposed method allows us to improve the quality indicators of the detection of destructive information impacts through segmentation and assignment of models that have the best indicators in individual segments.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1192 - 1203"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143621764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessment of the Competence of an Intelligent Information Security Management System 智能信息安全管理系统能力评估
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-03-14 DOI: 10.3103/S0146411624701220
A. F. Suprun, A. Yu. Gar’kushev, A. V. Lipis, I. L. Karpova, A. A. Shalkovskaya

This article studies the development of tools for assessing intelligent information security (IS) management systems (MSs) at enterprises. The proposed methodology is based on a combination of methods of the entropy approach to assessing the quality of information and a priori assessment of competence in terms of the balance between the efficiency and validity of the decisions taken. The proposed mathematical model can be used for the a priori assessment of decision support systems in the field of information security.

本文研究了企业智能信息安全(IS)管理系统(MSs)评估工具的开发。所提出的方法是基于评估信息质量的熵方法和根据所作决定的效率和有效性之间的平衡对能力进行先验评估的方法的组合。该数学模型可用于信息安全领域决策支持系统的先验评估。
{"title":"Assessment of the Competence of an Intelligent Information Security Management System","authors":"A. F. Suprun,&nbsp;A. Yu. Gar’kushev,&nbsp;A. V. Lipis,&nbsp;I. L. Karpova,&nbsp;A. A. Shalkovskaya","doi":"10.3103/S0146411624701220","DOIUrl":"10.3103/S0146411624701220","url":null,"abstract":"<p>This article studies the development of tools for assessing intelligent information security (IS) management systems (MSs) at enterprises. The proposed methodology is based on a combination of methods of the entropy approach to assessing the quality of information and a priori assessment of competence in terms of the balance between the efficiency and validity of the decisions taken. The proposed mathematical model can be used for the a priori assessment of decision support systems in the field of information security.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1429 - 1435"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model of a Distributed Storage System for Crypto Wallet Private Keys 加密钱包私钥分布式存储系统模型
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-03-14 DOI: 10.3103/S0146411624700949
M. R. Salikhov

With the development of Web3 technologies, the third generation of the Internet has become one of the most promising areas. It involves the use of decentralized, transparent, and user-oriented applications. However, many Web3 projects do not pay sufficient attention to security, which can lead to serious consequences. Even a small error in the code can make the system vulnerable, opening access to attackers. As a result, the industry faces frequent security breaches that threaten users and undermine trust in new technologies. One of the main problems with Web3 is private key management. This is a critical security aspect that is directly related to the protection of digital assets and users' personal information. The risk of losing or theft of a private key can lead to irreparable consequences, since in the case of loss there is no way to restore or reset the key. Various ways of storing the private key of a crypto wallet to ensure security are discussed. For example, the key can be split into parts and stored encrypted on hardware media, or the entire encrypted key can be stored on secure media. Quantitative data are calculated using Shamir’s scheme.

随着 Web3 技术的发展,第三代互联网已成为最有前途的领域之一。它涉及使用分散、透明和面向用户的应用程序。然而,许多 Web3 项目对安全性不够重视,这可能会导致严重后果。即使代码中的一个小错误也会使系统变得脆弱,为攻击者打开通道。因此,该行业面临着频繁的安全漏洞,威胁着用户,破坏了人们对新技术的信任。Web3 的主要问题之一是私钥管理。这是一个关键的安全问题,直接关系到数字资产和用户个人信息的保护。私钥丢失或被盗的风险可能导致无法弥补的后果,因为在丢失的情况下,无法恢复或重置私钥。为确保安全,我们讨论了各种存储加密钱包私钥的方法。例如,可以将密钥分成若干部分,加密后存储在硬件介质上,或者将整个加密密钥存储在安全介质上。使用沙米尔方案计算定量数据。
{"title":"Model of a Distributed Storage System for Crypto Wallet Private Keys","authors":"M. R. Salikhov","doi":"10.3103/S0146411624700949","DOIUrl":"10.3103/S0146411624700949","url":null,"abstract":"<p>With the development of Web3 technologies, the third generation of the Internet has become one of the most promising areas. It involves the use of decentralized, transparent, and user-oriented applications. However, many Web3 projects do not pay sufficient attention to security, which can lead to serious consequences. Even a small error in the code can make the system vulnerable, opening access to attackers. As a result, the industry faces frequent security breaches that threaten users and undermine trust in new technologies. One of the main problems with Web3 is private key management. This is a critical security aspect that is directly related to the protection of digital assets and users' personal information. The risk of losing or theft of a private key can lead to irreparable consequences, since in the case of loss there is no way to restore or reset the key. Various ways of storing the private key of a crypto wallet to ensure security are discussed. For example, the key can be split into parts and stored encrypted on hardware media, or the entire encrypted key can be stored on secure media. Quantitative data are calculated using Shamir’s scheme.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1289 - 1296"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622165","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessing the Security of Big Data Systems 评估大数据系统的安全性
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-03-14 DOI: 10.3103/S0146411624701025
M. A. Poltavtseva, V. V. Zaitseva, D. V. Ivanov

This article considers the problem of assessing the security of big data systems. The authors define the main aspects of big data systems as an object of security assessment and analyze the known assessment methods, including methodologies for assessing the security of information systems (ISs). Based on the obtained results, a new evaluation method is proposed that takes into account factors such as the state of the access control system in the heterogeneous systems under consideration and the number of privileged users. A mathematical formalization of the assessment is proposed, the main stages of its implementation are described, and a test example is presented.

本文探讨了评估大数据系统安全性的问题。作者定义了作为安全评估对象的大数据系统的主要方面,并分析了已知的评估方法,包括评估信息系统(IS)安全的方法。根据所获得的结果,提出了一种新的评估方法,该方法考虑到了所考虑的异构系统中访问控制系统的状态和特权用户数量等因素。提出了评估的数学形式化,描述了其实施的主要阶段,并介绍了一个测试实例。
{"title":"Assessing the Security of Big Data Systems","authors":"M. A. Poltavtseva,&nbsp;V. V. Zaitseva,&nbsp;D. V. Ivanov","doi":"10.3103/S0146411624701025","DOIUrl":"10.3103/S0146411624701025","url":null,"abstract":"<p>This article considers the problem of assessing the security of big data systems. The authors define the main aspects of big data systems as an object of security assessment and analyze the known assessment methods, including methodologies for assessing the security of information systems (ISs). Based on the obtained results, a new evaluation method is proposed that takes into account factors such as the state of the access control system in the heterogeneous systems under consideration and the number of privileged users. A mathematical formalization of the assessment is proposed, the main stages of its implementation are described, and a test example is presented.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1352 - 1364"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Identification and Verification of Authorship Using Machine and Deep Learning Methods 使用机器和深度学习方法识别和验证作者身份
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-03-14 DOI: 10.3103/S0146411624700925
T. D. Ovasapyan, E. M. Tolgorenko, E. A. Zubkov

This article presents studies aimed at analyzing methods for determining and confirming the authorship of texts. Methods for transforming texts into vector representations and determining authorship through text classification are investigated. A data set is formed on which the studied methods are tested, after which conclusions are drawn about their effectiveness. Further directions for research are also proposed.

本文介绍了旨在分析确定和确认文本作者的方法的研究。研究了将文本转换为矢量表示和通过文本分类确定作者身份的方法。本文建立了一个数据集,对所研究的方法进行了测试,然后就其有效性得出了结论。此外,还提出了进一步的研究方向。
{"title":"Identification and Verification of Authorship Using Machine and Deep Learning Methods","authors":"T. D. Ovasapyan,&nbsp;E. M. Tolgorenko,&nbsp;E. A. Zubkov","doi":"10.3103/S0146411624700925","DOIUrl":"10.3103/S0146411624700925","url":null,"abstract":"<p>This article presents studies aimed at analyzing methods for determining and confirming the authorship of texts. Methods for transforming texts into vector representations and determining authorship through text classification are investigated. A data set is formed on which the studied methods are tested, after which conclusions are drawn about their effectiveness. Further directions for research are also proposed.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1271 - 1282"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Providing Information Security of Vehicular Ad Hoc Networks Using the Early Detection of Malicious Nodes 利用早期检测恶意节点提供车载自组网信息安全
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-03-14 DOI: 10.3103/S0146411624700986
E. Yu. Pavlenko, M. A. Pakhomov

The peculiarities of vehicular ad hoc networks (VANETs) are considered. An approach to provide information security of VANETs is proposed; its distinctive feature lies in the early detection of malicious activity of network participants. For its detection at an early stage, the parameters of the ad hoc vehicular network are represented as a time series, and the prediction of their future values and anomaly detection are carried out using machine learning methods. The proposed approach allows improving the security of intelligent transport systems.

考虑了车辆自组织网络(vanet)的特点。提出了一种实现VANETs信息安全的方法;它的显著特点在于能够及早发现网络参与者的恶意活动。针对其早期检测,将自组织车辆网络参数表示为时间序列,利用机器学习方法对其未来值进行预测并进行异常检测。建议的方法可以提高智能交通系统的安全性。
{"title":"Providing Information Security of Vehicular Ad Hoc Networks Using the Early Detection of Malicious Nodes","authors":"E. Yu. Pavlenko,&nbsp;M. A. Pakhomov","doi":"10.3103/S0146411624700986","DOIUrl":"10.3103/S0146411624700986","url":null,"abstract":"<p>The peculiarities of vehicular ad hoc networks (VANETs) are considered. An approach to provide information security of VANETs is proposed; its distinctive feature lies in the early detection of malicious activity of network participants. For its detection at an early stage, the parameters of the ad hoc vehicular network are represented as a time series, and the prediction of their future values and anomaly detection are carried out using machine learning methods. The proposed approach allows improving the security of intelligent transport systems.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1318 - 1325"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protecting Machine Learning Models from Training Data Set Extraction 保护机器学习模型免受训练数据集提取的影响
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-03-14 DOI: 10.3103/S0146411624700871
M. O. Kalinin, A. A. Muryleva, V. V. Platonov

The problem of protecting machine learning models from the threat of data privacy violation implementing membership inference in training data sets is considered. A method of protective noising of the training set is proposed. It is experimentally shown that Gaussian noising of training data with a scale of 0.2 is the simplest and most effective way to protect machine learning models from membership inference in the training set. In comparison with alternatives, this method is easy to implement, universal in relation to types of models, and allows reducing the effectiveness of membership inference to 26 percentage points.

通过对训练数据集进行隶属度推理,考虑了保护机器学习模型免受数据隐私侵犯威胁的问题。提出了一种训练集保护噪声的方法。实验表明,对训练数据进行0.2尺度的高斯噪声处理是保护机器学习模型不受训练集中隶属度推断影响的最简单、最有效的方法。与其他方法相比,该方法易于实现,与模型类型有关,并且允许将成员推理的有效性降低到26个百分点。
{"title":"Protecting Machine Learning Models from Training Data Set Extraction","authors":"M. O. Kalinin,&nbsp;A. A. Muryleva,&nbsp;V. V. Platonov","doi":"10.3103/S0146411624700871","DOIUrl":"10.3103/S0146411624700871","url":null,"abstract":"<p>The problem of protecting machine learning models from the threat of data privacy violation implementing membership inference in training data sets is considered. A method of protective noising of the training set is proposed. It is experimentally shown that Gaussian noising of training data with a scale of 0.2 is the simplest and most effective way to protect machine learning models from membership inference in the training set. In comparison with alternatives, this method is easy to implement, universal in relation to types of models, and allows reducing the effectiveness of membership inference to 26 percentage points.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1234 - 1241"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
AUTOMATIC CONTROL AND COMPUTER SCIENCES
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1