首页 > 最新文献

AUTOMATIC CONTROL AND COMPUTER SCIENCES最新文献

英文 中文
Intelligent Mechanisms for Extracting Signs of File Modification in Dynamic Virus Analysis 动态病毒分析中提取文件修改迹象的智能机制
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-03-14 DOI: 10.3103/S0146411624700810
S. G. Fomicheva, O. D. Gayduk

This paper proposes machine-learning pipelines that allow automatically generating the relevant feature spaces for virus detectors, detect the presence of viral modifications in JS-files and scripts in real time, and interpret and visualize the automatically obtained machine solution. It is shown that the best quality metrics will be demonstrated by models of an abstract syntactic tree using binary classifiers based on ensembles of decision trees. An explanation of the solution automatically generated by the virus detector is demonstrated.

本文提出了机器学习管道,可以自动生成病毒检测器的相关特征空间,实时检测js文件和脚本中是否存在病毒修改,并对自动获得的机器解决方案进行解释和可视化。结果表明,使用基于决策树集成的二元分类器的抽象语法树模型将展示最佳质量度量。演示了病毒检测器自动生成的解决方案的说明。
{"title":"Intelligent Mechanisms for Extracting Signs of File Modification in Dynamic Virus Analysis","authors":"S. G. Fomicheva,&nbsp;O. D. Gayduk","doi":"10.3103/S0146411624700810","DOIUrl":"10.3103/S0146411624700810","url":null,"abstract":"<p>This paper proposes machine-learning pipelines that allow automatically generating the relevant feature spaces for virus detectors, detect the presence of viral modifications in JS-files and scripts in real time, and interpret and visualize the automatically obtained machine solution. It is shown that the best quality metrics will be demonstrated by models of an abstract syntactic tree using binary classifiers based on ensembles of decision trees. An explanation of the solution automatically generated by the virus detector is demonstrated.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1180 - 1191"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143621797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph of Self-Regulation of Various Types of Networks with Adaptive Topology 具有自适应拓扑的各类网络的自调节图
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-03-14 DOI: 10.3103/S0146411624701244
E. Yu. Pavlenko, M. A. Pakhomov

Approaches used for the self-regulation of networks with adaptive network topology based on graph theory are presented. These approaches are limited to networks whose nodes do not change their position in space: peer-to-peer and heterogeneous sensor networks, as well as industrial networks, such as Smart Grid. For each type of network, a generalized target function is described, conditions for self-regulation are formulated, and the process of self-regulation is formally described.

提出了基于图论的自适应网络拓扑网络自调节方法。这些方法仅限于节点不改变其空间位置的网络:点对点和异构传感器网络,以及工业网络,如智能电网。对于每一类网络,描述了一个广义目标函数,给出了自我调节的条件,形式化描述了自我调节的过程。
{"title":"Graph of Self-Regulation of Various Types of Networks with Adaptive Topology","authors":"E. Yu. Pavlenko,&nbsp;M. A. Pakhomov","doi":"10.3103/S0146411624701244","DOIUrl":"10.3103/S0146411624701244","url":null,"abstract":"<p>Approaches used for the self-regulation of networks with adaptive network topology based on graph theory are presented. These approaches are limited to networks whose nodes do not change their position in space: peer-to-peer and heterogeneous sensor networks, as well as industrial networks, such as Smart Grid. For each type of network, a generalized target function is described, conditions for self-regulation are formulated, and the process of self-regulation is formally described.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1442 - 1449"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Synthesized Audio Files Using Graph Neural Networks 利用图神经网络检测合成音频文件
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-03-14 DOI: 10.3103/S0146411624700846
O. A. Izotova, D. S. Lavrova

The problem of generalization of multimodal data in the detection of artificially synthesized audio files is studied. As a solution to the problem, a method is proposed that combines a one-time analysis of the characteristics of an audio file and its semantic component, presented in the form of text. The approach is based on graph neural networks and algorithmic approaches based on keyword and text sentiment analysis. The conducted experimental studies confirmed the validity and effectiveness of the proposed approach.

研究了人工合成音频文件检测中多模态数据的泛化问题。为了解决这个问题,提出了一种将音频文件的特征和语义成分的一次性分析结合起来的方法,并以文本的形式呈现。该方法基于图神经网络和基于关键字和文本情感分析的算法方法。实验研究证实了该方法的有效性和有效性。
{"title":"Detecting Synthesized Audio Files Using Graph Neural Networks","authors":"O. A. Izotova,&nbsp;D. S. Lavrova","doi":"10.3103/S0146411624700846","DOIUrl":"10.3103/S0146411624700846","url":null,"abstract":"<p>The problem of generalization of multimodal data in the detection of artificially synthesized audio files is studied. As a solution to the problem, a method is proposed that combines a one-time analysis of the characteristics of an audio file and its semantic component, presented in the form of text. The approach is based on graph neural networks and algorithmic approaches based on keyword and text sentiment analysis. The conducted experimental studies confirmed the validity and effectiveness of the proposed approach.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1212 - 1217"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Formal Statement of the Problem of Morphing Executive Code in Software Operation 软件运行中执行代码变形问题的形式化表述
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-03-14 DOI: 10.3103/S0146411624700895
N. V. Gololobov

A formal formulation of the problem of modifying executable code during execution is presented based on morphing used in computer animation. During the research, the need for developing a morphing method for software (SW) is substantiated, the basic principles used in computer animation are adapted for the field of cybersecurity, and the vectors for further research in this direction are determined. The results obtained during adaptation should be used in the design and implementation of the method of morphing executable code.

基于计算机动画中使用的变形,提出了在执行过程中修改可执行代码问题的形式化表述。在研究过程中,证实了开发软件变形方法的必要性,将计算机动画的基本原理应用于网络安全领域,并确定了该方向进一步研究的向量。在可执行代码变形方法的设计和实现中,应利用自适应过程中得到的结果。
{"title":"Formal Statement of the Problem of Morphing Executive Code in Software Operation","authors":"N. V. Gololobov","doi":"10.3103/S0146411624700895","DOIUrl":"10.3103/S0146411624700895","url":null,"abstract":"<p>A formal formulation of the problem of modifying executable code during execution is presented based on morphing used in computer animation. During the research, the need for developing a morphing method for software (SW) is substantiated, the basic principles used in computer animation are adapted for the field of cybersecurity, and the vectors for further research in this direction are determined. The results obtained during adaptation should be used in the design and implementation of the method of morphing executable code.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1250 - 1254"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of the Problems of Using Steganographic Methods in Implementing Illegal Actions and Their Role in Digital Forensics 使用隐写法实施非法行为的问题分析及其在数字取证中的作用
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-03-14 DOI: 10.3103/S0146411624701207
S. V. Bezzateev, M. Yu. Fedosenko

This paper is a study of the problem of the use of steganographic algorithms by attackers to hide and exchange illegal data. The paper formulates the relevance of the problem by analyzing cases of using steganography in attacks on computer systems and based on the trend of developing a controlled Internet, supported by a regulatory framework. This article presents an analysis of methods for hiding data and their subsequent exchange on public internet resources through a review of the works of researchers in this area; and the main tools used by attackers are identified and described. As an analysis of counteraction methods, a comparative characteristic of the use of various artificial intelligence technologies in the field of steganalysis is presented; the most promising ones applicable for the tasks of the automatic analysis of content posted on public internet resources are highlighted. As a final provision of the work, the process of exchanging hidden data by intruders using EPC notation is modeled; the directions and tasks of steganalysis, whose solution will allow developing a unified system to protect public internet resources in the future, are highlighted; and the prospects for using new steganographic algorithms, such as hiding in the blockchain and the source code of resources, as well as posting content with the presence of physical information attachments, are presented.

本文研究了攻击者利用隐写算法隐藏和交换非法数据的问题。本文通过分析在计算机系统攻击中使用隐写术的案例,并基于发展受控互联网的趋势,在监管框架的支持下,阐述了问题的相关性。本文通过对该领域研究人员工作的回顾,分析了隐藏数据的方法及其在公共互联网资源上的后续交换;并对攻击者使用的主要工具进行了识别和描述。作为对抗方法的分析,提出了各种人工智能技术在隐写分析领域的比较特点;重点介绍了应用于公共互联网资源上发布的内容自动分析任务的最有前途的方法。最后,对入侵者使用EPC符号交换隐藏数据的过程进行了建模;强调了隐写分析的发展方向和任务,隐写分析的解决方案将使未来建立一个统一的系统来保护公共互联网资源;展望了新的隐写算法的应用前景,如隐藏在资源的区块链和源代码中,以及发布带有物理信息附件的内容。
{"title":"Analysis of the Problems of Using Steganographic Methods in Implementing Illegal Actions and Their Role in Digital Forensics","authors":"S. V. Bezzateev,&nbsp;M. Yu. Fedosenko","doi":"10.3103/S0146411624701207","DOIUrl":"10.3103/S0146411624701207","url":null,"abstract":"<p>This paper is a study of the problem of the use of steganographic algorithms by attackers to hide and exchange illegal data. The paper formulates the relevance of the problem by analyzing cases of using steganography in attacks on computer systems and based on the trend of developing a controlled Internet, supported by a regulatory framework. This article presents an analysis of methods for hiding data and their subsequent exchange on public internet resources through a review of the works of researchers in this area; and the main tools used by attackers are identified and described. As an analysis of counteraction methods, a comparative characteristic of the use of various artificial intelligence technologies in the field of steganalysis is presented; the most promising ones applicable for the tasks of the automatic analysis of content posted on public internet resources are highlighted. As a final provision of the work, the process of exchanging hidden data by intruders using EPC notation is modeled; the directions and tasks of steganalysis, whose solution will allow developing a unified system to protect public internet resources in the future, are highlighted; and the prospects for using new steganographic algorithms, such as hiding in the blockchain and the source code of resources, as well as posting content with the presence of physical information attachments, are presented.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1406 - 1421"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Software and Hardware to Protect Technological Processes from Cyber Threats 软件和硬件的发展,以保护技术过程免受网络威胁
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-03-14 DOI: 10.3103/S0146411624701074
F. G. Pashaev, D. I. Zeinalov, G. T. Nadzhafov

The rapid development of technological computer networks (TCNs) and SCADA systems has inevitably accelerated the integration process between these networks and the global Internet. As a result, the solution of many problems of technological and production processes has been simplified, and opportunities have been created for remote management of enterprise personnel and operational personnel. However, this situation has created new, previously nonexistent threats to monitoring, diagnostics, and control systems. Various specialized groups, hackers, and sometimes government agencies carry out targeted attacks on specific industrial enterprises via the Internet. Organizers of cyberattacks on process control systems improve their methods and tools over time and increase their professional level. They carefully study the objects of their future attacks and identify vulnerabilities in the software of object control systems. The developed set of technical means is based on the use of STM32F4XX controllers and LPT ports of computers. Connection diagrams and installation methods for technical means are provided, which, as the created exchange protocols, can serve as a bridge between the global Internet and technological corporate computer networks. Simple algorithms and operating software fragments of the created protocols are presented. The program fragments are given in the C programming language and in the DELPHI programming system. The developed software acts as a filtering bridge between the global Internet and the technological corporate computer network. Information between the two networks is exchanged by using a nonstandard protocol using the STM32F4XX controller and LPT port.

技术计算机网络(tcn)和SCADA系统的快速发展,不可避免地加速了这些网络与全球互联网的融合进程。因此,简化了许多技术和生产过程问题的解决,并为企业人员和操作人员的远程管理创造了机会。然而,这种情况对监测、诊断和控制系统造成了以前不存在的新威胁。各种专业团体、黑客,有时还有政府机构,通过互联网对特定的工业企业进行有针对性的攻击。过程控制系统网络攻击的组织者随着时间的推移改进了他们的方法和工具,提高了他们的专业水平。他们仔细研究未来攻击的对象,并识别对象控制系统软件中的漏洞。开发的一套技术手段是基于STM32F4XX控制器和计算机LPT接口的使用。提供了技术手段的连接图和安装方法,作为创建的交换协议,可以作为全球互联网和技术企业计算机网络之间的桥梁。给出了所创建协议的简单算法和操作软件片段。给出了用C语言和DELPHI编程系统编写的程序片段。开发的软件在全球互联网和技术公司计算机网络之间起着过滤桥梁的作用。两个网络之间的信息通过使用STM32F4XX控制器和LPT端口使用非标准协议进行交换。
{"title":"Development of Software and Hardware to Protect Technological Processes from Cyber Threats","authors":"F. G. Pashaev,&nbsp;D. I. Zeinalov,&nbsp;G. T. Nadzhafov","doi":"10.3103/S0146411624701074","DOIUrl":"10.3103/S0146411624701074","url":null,"abstract":"<p>The rapid development of technological computer networks (TCNs) and SCADA systems has inevitably accelerated the integration process between these networks and the global Internet. As a result, the solution of many problems of technological and production processes has been simplified, and opportunities have been created for remote management of enterprise personnel and operational personnel. However, this situation has created new, previously nonexistent threats to monitoring, diagnostics, and control systems. Various specialized groups, hackers, and sometimes government agencies carry out targeted attacks on specific industrial enterprises via the Internet. Organizers of cyberattacks on process control systems improve their methods and tools over time and increase their professional level. They carefully study the objects of their future attacks and identify vulnerabilities in the software of object control systems. The developed set of technical means is based on the use of STM32F4XX controllers and LPT ports of computers. Connection diagrams and installation methods for technical means are provided, which, as the created exchange protocols, can serve as a bridge between the global Internet and technological corporate computer networks. Simple algorithms and operating software fragments of the created protocols are presented. The program fragments are given in the C programming language and in the DELPHI programming system. The developed software acts as a filtering bridge between the global Internet and the technological corporate computer network. Information between the two networks is exchanged by using a nonstandard protocol using the STM32F4XX controller and LPT port.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1396 - 1405"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Justification of the Rational Composition of the Information Security System 信息安全体系合理构成的论证
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-03-14 DOI: 10.3103/S0146411624700706
A. F. Suprun, D. P. Zegzhda, V. G. Anisimov, E. D. Anisimov

This paper examines a methodological approach to the construction of models and algorithms for supporting decision-making in substantiating rational composition of the information security system of a corporate computer network. In this case, the problem under consideration is presented in the form of a discrete model of mathematical programming. A special feature of the model is the ability to take into account a wide variety of destructive impacts on a computer network and methods of protecting it. The generality of the model is also ensured by taking into account the possible nonlinear nature of the function reflecting the specific goals of creating an information security system. To solve the problem, a generalized algorithm is developed that takes into account the features of the model. The general nature of the requirements for the parameters of the model and algorithm allows, on their basis, to form a fairly wide range of methods for supporting decision-making in the substantiation of the rational composition of the information security system for specific variants of corporate computer networks and the conditions of their operation.

本文探讨了构建模型和算法的方法学方法,以支持企业计算机网络信息安全系统的合理组成。在这种情况下,所考虑的问题以数学规划的离散模型的形式呈现。该模型的一个特点是能够考虑到对计算机网络的各种破坏性影响和保护它的方法。通过考虑到反映创建信息安全系统的特定目标的函数可能的非线性性质,也保证了模型的通用性。为了解决这一问题,提出了一种考虑模型特征的广义算法。模型和算法参数要求的通用性,允许在其基础上形成相当广泛的方法,以支持决策,以证实针对企业计算机网络的特定变体及其运行条件的信息安全系统的合理组成。
{"title":"Justification of the Rational Composition of the Information Security System","authors":"A. F. Suprun,&nbsp;D. P. Zegzhda,&nbsp;V. G. Anisimov,&nbsp;E. D. Anisimov","doi":"10.3103/S0146411624700706","DOIUrl":"10.3103/S0146411624700706","url":null,"abstract":"<p>This paper examines a methodological approach to the construction of models and algorithms for supporting decision-making in substantiating rational composition of the information security system of a corporate computer network. In this case, the problem under consideration is presented in the form of a discrete model of mathematical programming. A special feature of the model is the ability to take into account a wide variety of destructive impacts on a computer network and methods of protecting it. The generality of the model is also ensured by taking into account the possible nonlinear nature of the function reflecting the specific goals of creating an information security system. To solve the problem, a generalized algorithm is developed that takes into account the features of the model. The general nature of the requirements for the parameters of the model and algorithm allows, on their basis, to form a fairly wide range of methods for supporting decision-making in the substantiation of the rational composition of the information security system for specific variants of corporate computer networks and the conditions of their operation.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1093 - 1099"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting Malware Using Deep Neural Networks 利用深度神经网络检测恶意软件
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-03-14 DOI: 10.3103/S0146411624700779
T. D. Ovasapyan, M. A. Volkovskii, A. S. Makarov

This article proposes a method for detecting malicious executable files by analyzing disassembled code. This method is based on a static analysis of assembler instructions of executable files using a special neural network model, whose architecture is also presented in this article. In addition, the effectiveness of the method is demonstrated using several different metrics, showing a significant reduction in Type-II errors compared to other state-of-the-art methods. The obtained results can be used as a basis for designing systems for thestatic analysis of malware.

本文提出了一种通过分析反汇编代码来检测恶意可执行文件的方法。该方法采用一种特殊的神经网络模型对可执行文件的汇编指令进行静态分析,并给出了该模型的结构。此外,使用几个不同的指标证明了该方法的有效性,与其他最先进的方法相比,显示了ii型错误的显着减少。所得结果可作为恶意软件静态分析系统设计的基础。
{"title":"Detecting Malware Using Deep Neural Networks","authors":"T. D. Ovasapyan,&nbsp;M. A. Volkovskii,&nbsp;A. S. Makarov","doi":"10.3103/S0146411624700779","DOIUrl":"10.3103/S0146411624700779","url":null,"abstract":"<p>This article proposes a method for detecting malicious executable files by analyzing disassembled code. This method is based on a static analysis of assembler instructions of executable files using a special neural network model, whose architecture is also presented in this article. In addition, the effectiveness of the method is demonstrated using several different metrics, showing a significant reduction in Type-II errors compared to other state-of-the-art methods. The obtained results can be used as a basis for designing systems for thestatic analysis of malware.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1147 - 1155"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mathematical Model of Information Security Event Management Using a Markov Chain in Industrial Systems 基于马尔可夫链的工业系统信息安全事件管理数学模型
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-03-14 DOI: 10.3103/S0146411624700755
V. M. Krundyshev, G. A. Markov, I. Yu. Zhukov

The problem of ensuring information security in industrial Internet-of-Things (IIoT) systems is considered. In the study, it is found that, in most cases, security information and event management (SIEM) systems with configured rules for correlating events in the information infrastructure are used to protect comprehensively the information perimeter of an industrial enterprise from external and internal threats. In this case, there is a need to create a mathematical apparatus that allows for an accurate and objective estimate of the effectiveness of a SIEM system. As a result of the study, the problem of preventing information security incidents in IIoT systems is formalized based on the developed mathematical model of information security event management using a continuous-time Markov chain.

研究了工业物联网(IIoT)系统信息安全保障问题。在研究中发现,在大多数情况下,安全信息和事件管理(SIEM)系统具有配置规则,用于将信息基础设施中的事件关联起来,以全面保护工业企业的信息边界免受外部和内部威胁。在这种情况下,需要创建一个数学装置,以便对SIEM系统的有效性进行准确和客观的估计。研究的结果是,基于已开发的信息安全事件管理数学模型,使用连续时间马尔可夫链形式化了IIoT系统中预防信息安全事件的问题。
{"title":"Mathematical Model of Information Security Event Management Using a Markov Chain in Industrial Systems","authors":"V. M. Krundyshev,&nbsp;G. A. Markov,&nbsp;I. Yu. Zhukov","doi":"10.3103/S0146411624700755","DOIUrl":"10.3103/S0146411624700755","url":null,"abstract":"<p>The problem of ensuring information security in industrial Internet-of-Things (IIoT) systems is considered. In the study, it is found that, in most cases, security information and event management (SIEM) systems with configured rules for correlating events in the information infrastructure are used to protect comprehensively the information perimeter of an industrial enterprise from external and internal threats. In this case, there is a need to create a mathematical apparatus that allows for an accurate and objective estimate of the effectiveness of a SIEM system. As a result of the study, the problem of preventing information security incidents in IIoT systems is formalized based on the developed mathematical model of information security event management using a continuous-time Markov chain.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1132 - 1138"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protection of Ad Hoc Networks against Distributed Network Scanning Ad Hoc网络对分布式网络扫描的保护
IF 0.6 Q4 AUTOMATION & CONTROL SYSTEMS Pub Date : 2025-03-14 DOI: 10.3103/S0146411624701013
M. A. Pakhomov

The peculiarities of network scanning of self-organizing networks are studied, and the methods for its detection are analyzed. A modification of the hybrid network scanning detection method is proposed, and the approaches to identify decoy scanning and create black lists of subnetworks for preventing further scanning are presented. The proposed protection methods are compared to the available analogs.

研究了自组织网络扫描的特点,分析了自组织网络扫描的检测方法。提出了一种改进的混合网络扫描检测方法,并提出了识别诱饵扫描和创建子网黑名单以防止进一步扫描的方法。将提出的保护方法与现有的类似物进行了比较。
{"title":"Protection of Ad Hoc Networks against Distributed Network Scanning","authors":"M. A. Pakhomov","doi":"10.3103/S0146411624701013","DOIUrl":"10.3103/S0146411624701013","url":null,"abstract":"<p>The peculiarities of network scanning of self-organizing networks are studied, and the methods for its detection are analyzed. A modification of the hybrid network scanning detection method is proposed, and the approaches to identify decoy scanning and create black lists of subnetworks for preventing further scanning are presented. The proposed protection methods are compared to the available analogs.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1343 - 1351"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
AUTOMATIC CONTROL AND COMPUTER SCIENCES
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1