Открытый доступ Открытый доступ  Доступ закрыт Доступ предоставлен  Доступ закрыт Только для подписчиков

Том 50, № 8 (2016)

Article

Management of information security risks in a context of uncertainty

Azhmukhamedov I., Vybornova O., Brumshtein Y.

Аннотация

The article proposes a method for selecting the optimal tactics to reduce the current level of information security risks to an acceptable level specified by a decision maker based on the introduction of a metric of assessment characteristics of acceptable and current risks, as well as algorithms for constructing the acceptable risk curve and for determining the values of current information security risks.

Automatic Control and Computer Sciences. 2016;50(8):657-663
pages 657-663 views

Access control system for distributed computing networks

Konoplev A., Kalinin M.

Аннотация

The architecture of access control system for user jobs access to computational resources of grid distributed computing networks, which provides protection of data being processed against threats of exceeding user privileges, is presented. The developed system is compared to the available analogues, and the results of efficiency assessment of performance of the developed system are discussed.

Automatic Control and Computer Sciences. 2016;50(8):664-668
pages 664-668 views

Tasks of providing information security in distributed computing networks

Konoplev A., Kalinin M.

Аннотация

The issue of providing information security for data and computing resources in grid networks is reviewed. Specific features of architecture of distributed computing networks based on grid platforms are analyzed. Security threats specific for grid systems are typified. The available measures ensuring security for grid systems are considered, and their drawbacks are indicated. The set of applied issues associated with ensuring grid protection from unauthorized access is defined.

Automatic Control and Computer Sciences. 2016;50(8):669-672
pages 669-672 views

An approach to developing the SIEM system for the Internet of Things

Lavrova D.

Аннотация

This article suggests an approach to building systems for analyzing security incidents in the Internet of Things as a self-similar system within the ambit of the normal operation of its constituent objects. The graph model of the Internet of Things as a cyberphysical system has been developed and used as basis to prove that the analysis of paired relations selected from a discrete message stream from devices will be enough to detect security incidents.

Automatic Control and Computer Sciences. 2016;50(8):673-681
pages 673-681 views

A prototype computer with non-von Neumann architecture based on strategic domestic J7 microprocessor

Molyakov A.

Аннотация

We consider a prototype of a computer with non-von Neumann architecture based on the domestic J7 microprocessor and nonclassical massively parallel program organization with globally addressable memory and new data transmission technology, new design of 3D electronics packaging to enhance the security level.

Automatic Control and Computer Sciences. 2016;50(8):682-686
pages 682-686 views

Token scanning as a new scientific approach in the creation of protected systems: A new generation OS MICROTEK

Molyakov A.

Аннотация

Token scanning, a new approach to the creation of protected information systems describing the state of the system with semantic content, namely, identification of uncontrollable context transitions, defined and possible on the whole set of variables using functional and nonprocedural programming languages, is described.

Automatic Control and Computer Sciences. 2016;50(8):687-692
pages 687-692 views

Development of automated system for identifying abnormal network activity and detecting threats

Nikonov V., Los’ V., Ross G.

Аннотация

The features of a system for identifying abnormal network activity are considered. Algorithmic and software systems for identifying abnormal network activity and detecting threats are developed.

Automatic Control and Computer Sciences. 2016;50(8):693-702
pages 693-702 views

Planning of aggregation and normalization of data from the Internet of Things for processing on a multiprocessor cluster

Poltavtseva M., Lavrova D., Pechenkin A.

Аннотация

An approach to preliminary processing of data from the Internet of Things is suggested. The suggested procedure is based on data aggregation and normalization and makes it possible to reduce the data dimension for further analysis and increase the rate of aggregation and normalization. To that end it is proposed to carry out data processing on a multiprocessor cluster. The article provides a detailed description of the approach to dividing the given task into connected subtasks and indicates which of them can be fulfilled in parallel. Algorithms of task distribution among the multiprocessor cluster nodes and task planning on a multiprocessor cluster node are developed.

Automatic Control and Computer Sciences. 2016;50(8):703-711
pages 703-711 views

Information security of data channels based on a multifunctional tailored software and hardware solution

Sukhoparov M., Lebedev I., Korzhuk V., Krivtsova I.

Аннотация

A proposed solution lies in using methods to ensure the implementation of preventive measures aimed to increase the complexity of implementation of information security threats using a compact device based on a PC/104+ form factor. A counteraction to information attacks is estimated, the device status conditions in various modes and after the introduction of additional protection components are simulated.

Automatic Control and Computer Sciences. 2016;50(8):712-716
pages 712-716 views

A risk-oriented approach to the control arrangement of security protection subsystems of information systems

Anisimov V., Zegzhda P., Anisimov E., Bazhin D.

Аннотация

We have considered the methodological situation of the development of models and methods of decision-making support for control in the security protection subsystems of information systems to neutralize external and internal influences, which can lead to accidental or premeditated unauthorized access to stored and processed information in the system, and its distortion or destruction.

Automatic Control and Computer Sciences. 2016;50(8):717-721
pages 717-721 views

Intelligent data analysis in information security

Grusho A., Grusho N., Zabezhailo M., Timonina E.

Аннотация

At present, there are a large number of trends and developments in artificial intelligence systems. This paper deals with the available intelligent data analysis in information security and the possibilities provided by data mining. Examples of tasks that can be solved using artificial intelligence systems are presented, including safe resource management, prediction of critical states and failures, resolution of conflicts in computational processes and information security regulations, and forensics.

Automatic Control and Computer Sciences. 2016;50(8):722-725
pages 722-725 views

Detection of anomalous behavior in a robot system based on deep learning elements

Utkin L., Zaborovskii V., Popov S.

Аннотация

The preprocessing procedure for anomalous behavior of robot system elements is proposed in the paper. It uses a special kind of a neural network called an autoencoder to solve two problems. The first problem is to decrease the dimensionality of the training data using the autoencoder to calculate the Mahalanobis distance, which can be viewed as one of the best metrics to detect the anomalous behavior of robots or sensors in the robot systems. The second problem is to apply the autoencoder to transfer learning. The autoencoder is trained by means of the target data which corresponds to the extreme operational conditions of the robot system. The source data containing the normal and anomalous observations derived from the normal operation conditions is reconstructed to the target data using the trained autoencoder. The reconstructed source data is used to define a optimal threshold for making decision on the anomaly of the observation based on the Mahalanobis distance.

Automatic Control and Computer Sciences. 2016;50(8):726-733
pages 726-733 views

Technology of security services virtualization for high-speed computer networks

Zegzhda P., Kalinin M.

Аннотация

The issue of performance degradation in distributed systems of electronic services using software for processing, coding, and data protection is considered. A model for the classification of network traffic flows is built and high-performance network traffic protection software that runs in a virtualized environment is developed based on it.

Automatic Control and Computer Sciences. 2016;50(8):734-738
pages 734-738 views

Applying the group signature for entity authentication in distributed grid computing networks

Aleksandrova E., Zegzhda D., Konoplev A.

Аннотация

The paper describes the problem of unauthorized access to the data processed in distributed grid computing networks. Existing implementations of entity authentication mechanisms in grid systems are analyzed, and their disadvantages are considered. An approach to the use of group signature schemes, which prevents unauthorized access to a computing environment and provides the integrity of transferred data, is proposed.

Automatic Control and Computer Sciences. 2016;50(8):739-742
pages 739-742 views

Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates

Busygin A., Konoplev A., Kalinin M.

Аннотация

This article considers problems with security of applications based on the TLS protocol. Scenarios, when these applications fall under attacks using revoked certificates, are described. The current methods of checking the status of X.509 public key infrastructure certificates used together with the TLS protocol are compared, and their strong and weak points are specified.

Automatic Control and Computer Sciences. 2016;50(8):743-748
pages 743-748 views

Attainable upper estimate of the degree of distinguishability of a connected permutation automaton

Babash A.

Аннотация

In this work, we yield an attainable upper estimate of the degree of distinguishability of a connected permutation automaton with an assigned diameter.

Automatic Control and Computer Sciences. 2016;50(8):749-758
pages 749-758 views

Asymptotic assessments of CRC error probabilities in some telecommunication protocols

Baranov A., Baranov P.

Аннотация

We study the value distributions for the control cyclic redundancy check (CRC) of length k, drawn at the data section of volume n. The behavior of CRC value distribution is examined at large n and fixed values of k (k = const, n → ∞). With the application of the character theory, we find the conditions of asymptomatic uniformity of the CRC distribution. The asymptomatic results can be applied during the assessment of errors of a series of protocols such as USB, X.25, HDLC, Bluetooth, Ethernet, etc.

Automatic Control and Computer Sciences. 2016;50(8):759-764
pages 759-764 views

Assessment of CRC error probability at minor distortion of information

Baranov A., Baranov P.

Аннотация

The authors of [1, 2] suggested a model of information distortion by white noise. The present work discusses the asymptotic behavior of CRC error probabilities at low values of p, which is the probability of distortion of transferred information bits. On the basis of the theoretical results in two specific protocols—Е1 and ETSI EN 302307—as well as in the examples, the probability values for the error in recognizing the given packet as nondistorted in the presence of at least one distortion are assessed.

Automatic Control and Computer Sciences. 2016;50(8):765-772
pages 765-772 views

KDP scheme of preliminary key distribution in discretionary security policy

Belim S., Belim S.

Аннотация

A modification of the KDP scheme for the distribution of encryption keys is considered as applied to a distributed computer system with a discretionary security model. Limited access is specified as forbidden channels of data transmission. The scheme of preliminary key distribution is designed in such a way that it is impossible for forbidden channels to create a key-pair for the data exchange. An example of the construction of the proposed scheme is presented.

Automatic Control and Computer Sciences. 2016;50(8):773-776
pages 773-776 views

Distribution of cryptographic keys in systems with a hierarchy of objects

Belim S., Bogachenko N.

Аннотация

An algorithm for the distribution of cryptographic keys is presented, which is based on the hierarchical structure of objects in the system. The performance of the algorithm for some types of the graph of the object hierarchy is substantiated. A mechanism for setting mandatory and discretionary access differentiation is proposed using the algorithm.

Automatic Control and Computer Sciences. 2016;50(8):777-786
pages 777-786 views

User identification and authentication system based on a hybrid fuzzy approach

Sumkin K., Los’ V., Ross G.

Аннотация

This paper is devoted to organizing the process of user identification and authentication in an automatic system of a university. It is shown that currently available solutions for identification and authentication data mining do not ensure adequate security of the network as a whole. Fuzzy logic is used as the main solution for the problem of analyzing the sets of subjects and objects. Functions for evaluating separability and compactness, as well as an optimized maximin method, are used. An algorithm for clustering indefinite subjects and objects is presented.

Automatic Control and Computer Sciences. 2016;50(8):787-791
pages 787-791 views

Implementation of symmetric encryption by State Standard 28147–89 algorithm on a graphical processor

Sukhoparov M., Lebedev I.

Аннотация

A new method for implementation of symmetric encryption by the GOST (State Standard) 28147–89 algorithm using the technology of NVIDIA CUDA was suggested. The highest-performance option and system parameters providing maximal performance are defined. The effectiveness of the suggested solution as well as a comparative analysis of the given approach with existing solutions is assessed.

Automatic Control and Computer Sciences. 2016;50(8):792-795
pages 792-795 views

Tripartite outsoursing key-agreement protocol on bilinear pairings

Aleksandrova E., Shkorkina E.

Аннотация

The implementation of cryptographic protocols in systems with resource-constrained devices and possible transfer of laborious calculations to a cloud server is considered. In this case, the device performs “simple” arithmetic operations. A tripartite key-agreement with two servers and the model with one malicious computer is proposed.

Automatic Control and Computer Sciences. 2016;50(8):796-801
pages 796-801 views

A text steganography method based on Markov chains

Shniperov A., Nikitina K.

Аннотация

A new method of text steganography based on Markov chains of different orders that allows the introduction of hidden information in texts is presented together with test results of a software solution which generate texts with a good approximation to the natural language model.

Automatic Control and Computer Sciences. 2016;50(8):802-808
pages 802-808 views

Multiagent system controllability evaluation using the multilevel structure of the graph of agents

Zegzhda D., Stepanova T., Suprun A.

Аннотация

A new approach is proposed to the calculation of the upper and lower bounds of the multiagent system controllability index formalized as the existence probability of the path from any node to the control center with the message transmission time not larger than the constant t. Controllability is one of the properties of this system that determines the stability of its functioning. A regular graph in the form of a tree with virtual nodes, which makes it possible to apply the methods of calculating the number of vertices in a particular level, is proposed in order to compute controllability boundaries.

Automatic Control and Computer Sciences. 2016;50(8):809-812
pages 809-812 views

Sustainability as a criterion for information security in cyber-physical systems

Zegzhda D.

Аннотация

A new point of view on security of cyber-physical systems as a single complex combining both physical and information components is presented. An approach is proposed to the assessment of the security of such systems based on homeostasis, i.e., a property to maintain the functioning stability under destabilizing factors. The dynamic model of the cyber-physical system security is given.

Automatic Control and Computer Sciences. 2016;50(8):813-819
pages 813-819 views

Согласие на обработку персональных данных с помощью сервиса «Яндекс.Метрика»

1. Я (далее – «Пользователь» или «Субъект персональных данных»), осуществляя использование сайта https://journals.rcsi.science/ (далее – «Сайт»), подтверждая свою полную дееспособность даю согласие на обработку персональных данных с использованием средств автоматизации Оператору - федеральному государственному бюджетному учреждению «Российский центр научной информации» (РЦНИ), далее – «Оператор», расположенному по адресу: 119991, г. Москва, Ленинский просп., д.32А, со следующими условиями.

2. Категории обрабатываемых данных: файлы «cookies» (куки-файлы). Файлы «cookie» – это небольшой текстовый файл, который веб-сервер может хранить в браузере Пользователя. Данные файлы веб-сервер загружает на устройство Пользователя при посещении им Сайта. При каждом следующем посещении Пользователем Сайта «cookie» файлы отправляются на Сайт Оператора. Данные файлы позволяют Сайту распознавать устройство Пользователя. Содержимое такого файла может как относиться, так и не относиться к персональным данным, в зависимости от того, содержит ли такой файл персональные данные или содержит обезличенные технические данные.

3. Цель обработки персональных данных: анализ пользовательской активности с помощью сервиса «Яндекс.Метрика».

4. Категории субъектов персональных данных: все Пользователи Сайта, которые дали согласие на обработку файлов «cookie».

5. Способы обработки: сбор, запись, систематизация, накопление, хранение, уточнение (обновление, изменение), извлечение, использование, передача (доступ, предоставление), блокирование, удаление, уничтожение персональных данных.

6. Срок обработки и хранения: до получения от Субъекта персональных данных требования о прекращении обработки/отзыва согласия.

7. Способ отзыва: заявление об отзыве в письменном виде путём его направления на адрес электронной почты Оператора: info@rcsi.science или путем письменного обращения по юридическому адресу: 119991, г. Москва, Ленинский просп., д.32А

8. Субъект персональных данных вправе запретить своему оборудованию прием этих данных или ограничить прием этих данных. При отказе от получения таких данных или при ограничении приема данных некоторые функции Сайта могут работать некорректно. Субъект персональных данных обязуется сам настроить свое оборудование таким способом, чтобы оно обеспечивало адекватный его желаниям режим работы и уровень защиты данных файлов «cookie», Оператор не предоставляет технологических и правовых консультаций на темы подобного характера.

9. Порядок уничтожения персональных данных при достижении цели их обработки или при наступлении иных законных оснований определяется Оператором в соответствии с законодательством Российской Федерации.

10. Я согласен/согласна квалифицировать в качестве своей простой электронной подписи под настоящим Согласием и под Политикой обработки персональных данных выполнение мною следующего действия на сайте: https://journals.rcsi.science/ нажатие мною на интерфейсе с текстом: «Сайт использует сервис «Яндекс.Метрика» (который использует файлы «cookie») на элемент с текстом «Принять и продолжить».