Automatic Control and Computer Sciences

Automatic Control and Computer Sciences is a peer-reviewed journal that has its origins in the Institute of Electronics and Computer Science located in Riga, Latvia. The journal is dedicated to control systems, cyber-physical systems, robotics, smart sensors, embedded intelligence, network information technologies, information security, distributed artificial intelligence, complex systems modeling, knowledge representation, processing and management, signal and image processing, machine learning, machine perception, and computer vision. The journal publishes original manuscripts submitted in English, as well as works translated from several other journals. The sources of content are indicated at the article level. The peer review policy of the journal is independent of the manuscript source, ensuring a fair and unbiased evaluation process for all submissions. As part of its aim to become an international publication, the journal welcomes submissions in English from all countries.
 

PEER REVIEW AND EDITORIAL POLICY

The journal follows the Springer Nature Peer Review Policy, Process and Guidance, Springer Nature Journal Editors' Code of Conduct, and COPE's Ethical Guidelines for Peer-reviewers.

Less than 10% of the manuscripts are rejected without review based on formal criteria as they do not comply with the submission guidelines. Each manuscript is assigned to at least one peer reviewer. The journal follows a single-blind reviewing procedure. The average period from submission to the first decision is usually ten weeks. The approximate rejection rate is 57%. The final decision on the acceptance of a manuscript for publication is made by the Editor-in-Chief.

If Editors, including the Editor-in-Chief, publish in the journal, they do not participate in the decision-making process for manuscripts where they are listed as co-authors.

Special issues published in the journal follow the same procedures as all other issues. If not stated otherwise, special issues are prepared by the members of the editorial board without guest editors.

Current Issue

Open Access Open Access  Restricted Access Access granted  Restricted Access Subscription Access

Vol 53, No 8 (2019)

Article

Security Infrastructure of FANET Based on Secret Sharing and Authenticated Encryption
Shenets N.N.
Abstract

This paper presents the results of the study aimed at improving the security of FANET. A new security infrastructure is developed based on the use of secret sharing and authenticated encryption. Its efficiency is experimentally proved using the FANET hardware simulation model.

Automatic Control and Computer Sciences. 2019;53(8):857-864
pages 857-864 views
Analysis of the Security of UEFI BIOS Embedded Software in Modern Intel-Based Computers
Pankov I.D., Konoplev A.S., Chernov A.Y.
Abstract

The paper presents an overview of current attacks on BIOS and Intel ME embedded software of modern Intel-based computers. We describe the results of the analysis of its security for system boards of basic manufacturers. We also allocate classes of attacks that make it possible to create implants whose discovery by traditional methods of searching for undeclared features becomes impossible or extremely difficult.

Automatic Control and Computer Sciences. 2019;53(8):865-869
pages 865-869 views
On the Construction of a Cybervisor for the Intelligent Monitoring and Control of Data Centers
Lokhvitskii V.A., Khomonenko A.D., Bol’shakov M.A.
Abstract

In this paper, we propose a cybervisor architecture for the data center. The concept of cybervisor construction is based on three components: modeling the operation of the data center, monitoring its performance and cybersecurity characteristics, and support of control decision making to improve the efficiency of the computational process. A conceptual model of the intelligent cybervisor with the compensation for the degradation of the computational process is proposed. The characteristics of virtual infrastructure management are substantiated and the functions of the cybervisor are described.

Automatic Control and Computer Sciences. 2019;53(8):870-873
pages 870-873 views
Estimating the Probability of a Checksum Error in a Message
Baranov A.P., Baranov P.A.
Abstract

In this paper, we consider some probability-theoretical models of information distortion at the message level. The checksum (CS) distributions typical of TCP-type protocols are investigated. As an addition operator in the CS, bitwise coordinate addition and binary addition with carryover are considered. For the distortion models described, asymptotic estimates of CS error probabilities are obtained at a small distortion probability. These asymptotic estimates can be useful for messages with long segments.

Automatic Control and Computer Sciences. 2019;53(8):874-878
pages 874-878 views
Analysis of Approaches to Group Authentication in Large-Scale Industrial Systems
Aleksandrova E.B., Yarmak A.V., Kalinin M.O.
Abstract

The specifics of secure interaction in large-scale industrial systems is investigated, the requirements for group authentication schemes are determined allowing for the specifics. The analysis of approaches to the organization of secure interaction between system nodes based on the group authentication is carried out. The prospects for the application of group authentication in large-scale industrial systems are considered.

Automatic Control and Computer Sciences. 2019;53(8):879-882
pages 879-882 views
Forming the Composition of Functions and Instructions of Microprocessor Devices for Access Control Systems
Magomedov S.G., Los’ V.P.
Abstract

The paper is devoted to the problem of improving the performance of microprocessors used in access control systems. We allocate requirements and propose a variant of the composition of instructions that are necessary for the high-quality design of microprocessors (operating through a residue number system, for access control), which are aimed at improving their performance in the composition of an access control system.

Automatic Control and Computer Sciences. 2019;53(8):883-888
pages 883-888 views
Application of an Artificial Neural Network for Detection of Attacks in VANETs
Malyshev E.V., Moskvin D.A., Zegzhda D.P.
Abstract

This work contains results of developing an approach for detecting routing attacks in VANET networks using an artificial neural network. In the course of this work, such research methods as analysis and modeling were used to select the most promising approach for identifying routing attacks, as well as to develop a mock-up of a software system that detects Gray Hole attacks in VANETs. According to the results of experimental studies, the effectiveness of the developed software was evaluated.

Automatic Control and Computer Sciences. 2019;53(8):889-894
pages 889-894 views
Modeling Big Data Management Systems in Information Security
Poltavtseva M.A., Kalinin M.O.
Abstract

The article presents a model of a Big Data management system for solving information security (IS) problems for systems of this class. The features of the considered systems are highlighted. The model and architecture of data processing are mathematically described based on the ANSI/SPARC concept and the principles of modeling information systems in IS. The model is analyzed.

Automatic Control and Computer Sciences. 2019;53(8):895-902
pages 895-902 views
Big Data Management System Security Threat Model
Poltavtseva M.A., Zegzhda D.P., Kalinin M.O.
Abstract

The article considers the concept and features of Big Data management systems and their differences from traditional DBMS’s. The authors describe changes in the intruder model and new vulnerabilities in data management systems. A new threat model is developed. The article presents new problems of information security in a distributed Big Data processing and storage system.

Automatic Control and Computer Sciences. 2019;53(8):903-913
pages 903-913 views
A Consistent Approach to Building Secure Big Data Processing and Storage Systems
Poltavtseva M.A.
Abstract

This article considers the solution to the problem of building secure Big Data management systems using a consistent approach. The concept and features of Big Data management systems and their differences from traditional DBMS’s are presented. The principles of a new, consistent approach to building secure Big Data management systems are given and substantiated. The security subsystem architecture is proposed.

Automatic Control and Computer Sciences. 2019;53(8):914-921
pages 914-921 views
Method of Integration of Multiagent Information Search Using Security Analysis and Information Services in Digital Infrastructures
Grusho N.A.
Abstract

The analysis of multiagent systems, the features of their application, architectures, and data storage methods is presented. Tools for security analysis and information services are analyzed in terms of the possibility of automatic or automated data exchange. A method for integrating multiagent systems with tools for security analysis (information services) for modern digital infrastructures is proposed.

Automatic Control and Computer Sciences. 2019;53(8):922-931
pages 922-931 views
General Principles of Constructing a Motion Control System for a Remotely Operated Sea Vessel in the Port Area Based on the NMEA-2000 Network Protocol
Sikarev I.A., Garanin A.V.
Abstract

The paper is concerned with the current state of the question of using unmanned ships in the field of water transport, as well as the most promising areas for applying remote ship piloting technology. The organization of information systems for data transmission is considered in detail, and relevant protocols are proposed. Technical solutions for equipping specialized unmanned transport vessels for piloting and mooring of heavy cargo ships are also proposed.

Automatic Control and Computer Sciences. 2019;53(8):932-936
pages 932-936 views
Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems
Zaitseva E.A., Zegzhda D.P., Poltavtseva M.A.
Abstract

We propose an approach to assess the security of computer systems based on case analysis. To implement case analysis, it is proposed to use the graph representation in combination with the advanced bag-of-objects method. The results of experimental studies confirming the effectiveness of the approach are presented.

Automatic Control and Computer Sciences. 2019;53(8):937-947
pages 937-947 views
An Approach to Building Cyber-Resistant Interactions in the Industrial Internet of Things
Dakhnovich A.D., Moskvin D.A., Zegzhda D.P.
Abstract

This paper presents the issues of cybersecurity of the industrial internet of things as the main driver for the development of Enterprise 4.0, compared with the staged protection approach used in automated process control systems. Threat classes relevant to the industrial internet of things are presented. Based on the analysis, requirements are put forward for designing an architecture of the industrial internet of things resistant to network threats, as well as an approach to the implementation of this architecture based on control and communications stability.

Automatic Control and Computer Sciences. 2019;53(8):948-953
pages 948-953 views
Benford’s Law in the Detection of DoS Attacks on Industrial Systems
Aleksandrova E.B., Lavrova D.S., Yarmak A.V.
Abstract

Benford’s law describes the distribution of the first significant digits in numerical data characterizing real processes. In particular, it is widely used to detect anomalies in financial data. The paper proposes application of Benford’s law to detect DoS attacks on large-scale industrial system components. The results of experimental research are given for the data generated by sensors within the Tennessee Eastman process.

Automatic Control and Computer Sciences. 2019;53(8):954-962
pages 954-962 views
Detection of Security Threats to Modern Websites
Ivanov D.V., Moskvin D.A., Kubrin G.S.
Abstract

The problem of the dynamic analysis of website security using asynchronous content loading technologies is considered. The possibility of solving the problem of detecting scan input vectors using the technology of interpreting JavaScript scripts is considered.

Automatic Control and Computer Sciences. 2019;53(8):963-968
pages 963-968 views
Organization of the Quantum Cryptographic Keys Distribution System for Transportation Infrastructure Users
Aleksandrova E.B., Shkorkina E.N., Kalinin M.O.
Abstract

For operation of cryptographic protocols, auxiliary systems performing the key delivery to users are needed. Using quantum systems as a key provider for the devices of intelligent transportation systems is proposed. The possibility of using the isogeny protocols for transferring quantum keys was investigated.

Automatic Control and Computer Sciences. 2019;53(8):969-971
pages 969-971 views
Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series
Zegzhda D.P., Kalinin M.O., Levykin M.V.
Abstract

Open Platform Communications (OPC), the interoperability standard for the secure and reliable exchange of data in the industrial automation space, consists of two main types of protocol – classic and unified. The paper reviews a classic set of DA/HDA/A&E protocols, which is based on Microsoft DCOM and RPC technologies. Architectural cyber threats of the classic type of OPC are systematized in this work.

Automatic Control and Computer Sciences. 2019;53(8):972-979
pages 972-979 views
Spoofing Attack on Eigenfaces-Based Biometric Identification System
Marshalko G.B., Nikiforova L.O.
Abstract

We present a spoofing attack on biometric identification system, which uses Eigenfaces algorithm for image classification. In this attack we try to modify an adversarial image in such a way that it is recognized as a target image while preserving visual similarity to the initial image. Like other similar attacks, we use a variant of hill-climbing attack. We also present experimental results.

Automatic Control and Computer Sciences. 2019;53(8):980-986
pages 980-986 views
Model for Identifying Cyber Threats to Internet Information Resources
Luskatov I.V., Pilkevich S.V.
Abstract

In this paper, we discuss the construction of a model for protecting information resources based on new approaches to active search, unified investigation, and response to cyber threats. The process of identifying cyber threats is based on search prediction methods interconnected with the cyclic nature of the behavioral activity of users of network resources.

Automatic Control and Computer Sciences. 2019;53(8):987-994
pages 987-994 views
Face Recognition Based on the Coefficient Tree for Three Scale Wavelet Transformation
Wang Lyanpen ., Petrosyan O.G., Jianming D.
Abstract

Abstract—A new method for face recognition is presented in the paper. The new method based on the coefficient tree for three-scale wavelet transformation is presented for solving a problem on feature separation. The hidden Markov model is used for classifying face image features.

Automatic Control and Computer Sciences. 2019;53(8):995-1005
pages 995-1005 views
Identifying Cyberthreats in Modern Industrial Systems by Means of Deep-Learning Networks
Krundyshev V.M.
Abstract

This article presents an approach to building a system for identifying cyberthreats in modern industrial systems (IIoT, VANET, WSN) by means of artificial intelligence and deep learning. The results of the tests conducted to assess the suggested approach for efficiency based on deep-learning networks are provided.

Automatic Control and Computer Sciences. 2019;53(8):1006-1011
pages 1006-1011 views
Preparing Datasets for Training in a Neural Network System of Intrusion Detection in Industrial Systems
Krundyshev V.M.
Abstract

One of the commonly known approaches to network security is the intrusion detection system (IDS) that analyzes the behavior of traffic and hosts in the network. This article presents a technique for generating datasets for the IDS and provides their characteristics as well as defines the features of typical attacks against industrial systems. The results can be used for training the AI IDS in detecting security threats to modern industrial systems.

Automatic Control and Computer Sciences. 2019;53(8):1012-1016
pages 1012-1016 views
Model of Cyberattacks on Digital Production Systems
Pavlenko E.Y.
Abstract

The model of cyberattacks on digital production systems is presented. The examples of the most significant information security incidents in this type of systems are considered in full detail. Possible approaches to ensuring the cybersecurity of digital production systems are described.

Automatic Control and Computer Sciences. 2019;53(8):1017-1019
pages 1017-1019 views
Detection of Information Security Breaches in a Digital Production System Based on the Component Interaction Model
Pavlenko E.Y.
Abstract

The paper offers an approach to detecting information security breaches in digital production systems using a graph representation of the component interaction.

Automatic Control and Computer Sciences. 2019;53(8):1020-1022
pages 1020-1022 views
Forecasting the State of Components of Smart Grids for Early Detection of Cyberattacks
Lavrova D.S.
Abstract

The author proposes an approach for predicting the state of Smart Grid components, which is based on a combination of the mathematical techniques of the Kalman filter and machine learning. Prediction of the state will make it possible to detect cyberattacks implemented against a Smart Grid at an early stage.

Automatic Control and Computer Sciences. 2019;53(8):1023-1025
pages 1023-1025 views
Maintaining Cyber Sustainability in Industrial Systems Based on the Concept of Molecular-Genetic Control Systems
Lavrova D.S.
Abstract

The author proposes an approach to provide cyber sustainability of complex industrial systems, which consists in the ability of the system to function correctly under cyber attacks. The proposed approach is based on the principles of molecular-genetic control systems and self-regulation of living tissue.

Automatic Control and Computer Sciences. 2019;53(8):1026-1028
pages 1026-1028 views
Detection of Weaknesses in Information Systems for Automatic Selection of Security Actions
Doynikova E.V., Fedorchenko A.V., Kotenko I.V.
Abstract

The problem of automation of the process of detecting weaknesses in information systems based on the analysis of its vulnerabilities is solved. The input data used for the classification, the process of their preparation, and the classification results are described. The interpretation and analysis of the results are presented. The problem solved is a part of the approach proposed by the authors to automatic formation of a set of required security tools for a particular information system. A necessary set of security tools is determined by the set of possible threats.

Automatic Control and Computer Sciences. 2019;53(8):1029-1037
pages 1029-1037 views
Model and Method for Optimizing Computational Processes in Parallel Computing Systems
Anisimov V.G., Zegzhda P.D., Anisimov E.G., Saurenko T.N., Kasatkin V.V.
Abstract

The paper proposes a model and a method for optimizing computational processes in parallel computing systems. The model is constructed by the decomposition of computer programs for solving problems into relatively independent elements (blocks) and presenting the information dependence of the blocks in the form of corresponding directed graphs. Here, the computational process organization consists in the dynamic allocation of resources of a computing system for the implementation of operations of each block. As an efficiency indicator of this process, we take the time of implementing operations of all blocks of considered programs (the solution time of related problems). The goal of the optimization is to reduce this time as much as possible. To form the optimal resource allocation, we propose the method based on the branch-and-bound procedure.

Automatic Control and Computer Sciences. 2019;53(8):1038-1044
pages 1038-1044 views
Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls
Ognev R.A., Zhukovskii E.V., Zegzhda D.P.
Abstract

The use of clustering algorithms to determine the types of malicious software files based on the analysis of the WinAPI function call sequences is investigated. The use of clustering algorithms such as k-means, EM-algorithm, hierarchical algorithm, and the affinity propagation method is considered. The quality of clustering is evaluated using the silhouette metrics, the Calinski–Harabasz index, and the Davies–Bouldin index.

Automatic Control and Computer Sciences. 2019;53(8):1045-1055
pages 1045-1055 views
Cloud-Based Data Architecture Security
Semenov N.A., Poltavtsev A.A.
Abstract

The article analyzes the security of modern cloud-based data architectures. The features of modern cloud-based data architectures, their impact on security, and specific security methods are presented. The harmonization of security policies and fundamental data processing conflicts characteristic of this domain are considered separately.

Automatic Control and Computer Sciences. 2019;53(8):1056-1064
pages 1056-1064 views
Prevention of DoS Attacks by Predicting the Values of Correlation Network Traffic Parameters
Lavrova D.S., Popova E.A., Shtyrkina A.A.
Abstract

The authors propose an approach for the prevention of network denial of service attacks, which is based on predicting the values of the multiple correlation coefficients of the detail coefficients of the discrete wavelet transform of network traffic parameters.

Automatic Control and Computer Sciences. 2019;53(8):1065-1071
pages 1065-1071 views

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies