访问主体身份验证配置文件生成方法

A. Iskhakov, R. Meshcheryakov, E. Okhapkina
{"title":"访问主体身份验证配置文件生成方法","authors":"A. Iskhakov, R. Meshcheryakov, E. Okhapkina","doi":"10.1109/RusAutoCon49822.2020.9208222","DOIUrl":null,"url":null,"abstract":"It is important to note, that within the last ten years we can see considerable growth in the number of incidents and revealed vulnerabilities as well as purposeful attacks on industrial automation and control systems with the purpose of industrial espionage, fraud, and violation of the company’s functioning. In this paper, we offer a methodology that ensures the systematization of the main steps of the development of a profile and algorithms of adaptive authentication on the critical information infrastructure facility. The offered algorithm eliminates the disadvantages of existing traditional methods of authentication based on the use of explicit verification methods connected to the fact that the authentication characteristics which can be compromised by malefactors are applied to the determination of the user’s identity. In the given article, we examine an example of implementation of the method with the application of a data qualifier on the example of a test platform. For classification, a machine learning model – the k-nearest neighbor algorithm – is used. For confirmation of the overall performance of the algorithm, an assessment of the robustness of the model according to the Euclidean metric and Chebyshev distance was used as well as an assessment of the descriptiveness of entry tags influencing the classification.","PeriodicalId":101834,"journal":{"name":"2020 International Russian Automation Conference (RusAutoCon)","volume":"143 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Method of Access Subject Authentication Profile Generation\",\"authors\":\"A. Iskhakov, R. Meshcheryakov, E. Okhapkina\",\"doi\":\"10.1109/RusAutoCon49822.2020.9208222\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"It is important to note, that within the last ten years we can see considerable growth in the number of incidents and revealed vulnerabilities as well as purposeful attacks on industrial automation and control systems with the purpose of industrial espionage, fraud, and violation of the company’s functioning. In this paper, we offer a methodology that ensures the systematization of the main steps of the development of a profile and algorithms of adaptive authentication on the critical information infrastructure facility. The offered algorithm eliminates the disadvantages of existing traditional methods of authentication based on the use of explicit verification methods connected to the fact that the authentication characteristics which can be compromised by malefactors are applied to the determination of the user’s identity. In the given article, we examine an example of implementation of the method with the application of a data qualifier on the example of a test platform. For classification, a machine learning model – the k-nearest neighbor algorithm – is used. For confirmation of the overall performance of the algorithm, an assessment of the robustness of the model according to the Euclidean metric and Chebyshev distance was used as well as an assessment of the descriptiveness of entry tags influencing the classification.\",\"PeriodicalId\":101834,\"journal\":{\"name\":\"2020 International Russian Automation Conference (RusAutoCon)\",\"volume\":\"143 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 International Russian Automation Conference (RusAutoCon)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/RusAutoCon49822.2020.9208222\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 International Russian Automation Conference (RusAutoCon)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RusAutoCon49822.2020.9208222","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

摘要

值得注意的是,在过去十年中,我们可以看到事故数量和暴露的漏洞以及针对工业自动化和控制系统的有目的攻击的数量大幅增长,其目的是工业间谍活动、欺诈和违反公司的功能。在本文中,我们提供了一种方法,以确保在关键信息基础设施上开发自适应认证配置文件和算法的主要步骤的系统化。该算法消除了现有传统认证方法基于使用显式验证方法的缺点,并将可被不法分子破坏的认证特征应用于用户身份的确定。在给定的文章中,我们将在测试平台的示例中通过应用数据限定符来检查该方法的实现示例。对于分类,使用了机器学习模型- k近邻算法。为了确认算法的整体性能,根据欧几里得度量和切比雪夫距离评估模型的鲁棒性,并评估影响分类的条目标签的描述性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Method of Access Subject Authentication Profile Generation
It is important to note, that within the last ten years we can see considerable growth in the number of incidents and revealed vulnerabilities as well as purposeful attacks on industrial automation and control systems with the purpose of industrial espionage, fraud, and violation of the company’s functioning. In this paper, we offer a methodology that ensures the systematization of the main steps of the development of a profile and algorithms of adaptive authentication on the critical information infrastructure facility. The offered algorithm eliminates the disadvantages of existing traditional methods of authentication based on the use of explicit verification methods connected to the fact that the authentication characteristics which can be compromised by malefactors are applied to the determination of the user’s identity. In the given article, we examine an example of implementation of the method with the application of a data qualifier on the example of a test platform. For classification, a machine learning model – the k-nearest neighbor algorithm – is used. For confirmation of the overall performance of the algorithm, an assessment of the robustness of the model according to the Euclidean metric and Chebyshev distance was used as well as an assessment of the descriptiveness of entry tags influencing the classification.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Organizing Cyber-Physical Homogeneous Production Environments On Algorithms for the Minimum Link Disjoint Paths Problem Determining the Hazard Quotient of Destructive Actions of Automated Process Control Systems Information Security Violator Device for Measuring Parameters of Coils of Induction Magnetometers Simulation of Process of Reproducing the Measuring Signal of a Magnetostrictive Displacement Transducer on Ultrasonic Torsion Waves for a Triangular Excitation Pulse
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1