Открытый доступ Открытый доступ  Доступ закрыт Доступ предоставлен  Доступ закрыт Только для подписчиков

Том 51, № 8 (2017)

Article

Information security architecture synthesis in distributed information computation systems

Grusho A., Grusho N., Timonina E.

Аннотация

This work considers the task of synthesizing information security architecture in the distributed information computation systems. The synthesis has been based on elementary structures described in the form of diagrams of solving action protection problems in the process of computation in the computer system and during network exchange.

Automatic Control and Computer Sciences. 2017;51(8):799-804
pages 799-804 views

Cyber-physical system homeostatic security management

Zegzhda D., Pavlenko E.

Аннотация

Characteristic features of security management for the cyber-physical system (CPS) have been distinguished. Existing approaches to the CPS security management have been systematized and their limited use in the CPS has been shown. An homeostatic approach to security management based on the CPS functional stability preservation has been proposed. A structure of homeostat for controlling the CPS has been described. A homeostatic model has been developed using logical predicates. The criteria for assessing the functional stability of the CPS have been proposed. The results of experimental studies showing the applicability of the proposed criteria have been presented.

Automatic Control and Computer Sciences. 2017;51(8):805-816
pages 805-816 views

An ontological model of the domain of applications for the Internet of Things in analyzing information security

Lavrova D., Vasil’ev Y.

Аннотация

In this paper, we have proposed an ontological model for the application domain of the Internet of Things (IoT) that provides a detailed representation of the relationships and interrelations between system elements at different levels of abstraction with different degrees of detail. The ontological model allows one to understand the technical aspects of developing security information and event management (SIEM) systems for the detection and analysis of security incidents in the IoT.

Automatic Control and Computer Sciences. 2017;51(8):817-823
pages 817-823 views

Indices of the effectiveness of information protection in an information interaction system for controlling complex distributed organizational objects

Anisimov V., Anisimov E., Zegzhda P., Saurenko T., Prisyazhnyuk S.

Аннотация

In this paper, we present some indices for evaluating the effectiveness of information protection in an information interaction system when controlling complex distributed organizational objects and proposing a technique for determining these indices. The technique is based on a stochastic representation of the flow of destructive actions that affect the information interactions among controllers of the elements of a distributed organizational object.

Automatic Control and Computer Sciences. 2017;51(8):824-828
pages 824-828 views

Hierarchical approach to analyzing security breaches in information systems

Pavlenko E., Yarmak A., Moskvin D.

Аннотация

This paper proposes a hierarchical approach to analyzing information security in modern information systems that consists of multilevel collection, analysis, and control of events. We have analyzed the mechanisms and peculiarities of how malware acts at each level of the information system, determined the features of the mechanisms of action of malware, its masking, and possible methods for detecting malware.

Automatic Control and Computer Sciences. 2017;51(8):829-834
pages 829-834 views

Systematization and security assessment of cyber-physical systems

Zegzhda D., Poltavtseva M., Lavrova D.

Аннотация

In this paper, the features of cyber-physical systems (CPSs) from the point of view of information security have been considered and CPSs have been classified. The authors have analyzed approaches to security assessments and identified the requirements to indicators of CPS information security. A system of specific assessment indicators based on the system stability criterion and homeostatic approach is proposed.

Automatic Control and Computer Sciences. 2017;51(8):835-843
pages 835-843 views

The task of building a trusted computing environment on the Intel hardware platform

Chernov A., Konoplev A., Reshetov D.

Аннотация

The problem of building a trusted computing environment on the basis of modern computing devices has been considered. The main features of software execution at different levels of privilege have been indicated. The architecture of the Intel ME subsystem has been considered. The potential threats of Intel ME technology have been highlighted, and possible ways to eliminate them have been given.

Automatic Control and Computer Sciences. 2017;51(8):844-847
pages 844-847 views

Use of Intel SGX to ensure the confidentiality of data of cloud users

Zegzhda D., Usov E., Nikol’skii A., Pavlenko E.

Аннотация

In this article the problem of possible attacks on confidentiality of user data in cloud systems comes from cloud provider’s side has been investigated. A secure cloud computing system architecture based on Intel Software Guard Extensions technology has been proposed. The approach that provides confidentiality of data of users of cloud systems is given. A method for implementing this approach into existing cloud systems is presented.

Automatic Control and Computer Sciences. 2017;51(8):848-854
pages 848-854 views

Applying NFC for automated replication of user data

Ivanov D., Moskvin D., Myasnikov A., Suprun A.

Аннотация

The results of analyzing the mechanisms and channels for replicating user data have been given. The replication mechanisms have been classified. Their advantages and drawbacks have been found. A method has been proposed that uses NFC to establish the secure data replication channel.

Automatic Control and Computer Sciences. 2017;51(8):855-859
pages 855-859 views

Identifying a potential insider using classification models

Zaytsev A., Malyuk A.

Аннотация

Classification models based on statistical data have been developed that make it possible to identify a potential insider based on the indicators that manifest in the context of data incompleteness regarding the insider’s behavior.

Automatic Control and Computer Sciences. 2017;51(8):860-866
pages 860-866 views

Application of clustering methods for analyzing the security of Android applications

Pavlenko E., Yarmak A., Moskvin D.

Аннотация

This paper presents the results from developing the system for detecting malicious Android applications based on the fuzzy clustering method. We have described the format of the application feature vector, as well as presented studies on the effectiveness of using different criteria for separability. The high efficiency of the proposed approach has been experimentally confirmed.

Automatic Control and Computer Sciences. 2017;51(8):867-873
pages 867-873 views

The use of an artificial neural network to detect automatically managed accounts in social networks

Zegzhda P., Malyshev E., Pavlenko E.

Аннотация

The problem of detection of automatically managed accounts (bots) in social networks has been considered. The method of their detection based on machine learning methods is proposed. The paper describes an example of a method based on artificial neural network learning. The parameters of a page in a social network used to detect bots have been presented. An experimental evaluation of the proposed system performance is given that demonstrates a high level of detection of bots in social networks.

Automatic Control and Computer Sciences. 2017;51(8):874-880
pages 874-880 views

Siamese neural network for intelligent information security control in multi-robot systems

Utkin L., Zaborovsky V., Popov S.

Аннотация

Anomaly detection of the robot system behavior is one of the important components of the information security control. In order to control robots equipped with many sensors it is difficult to apply the well-known Mahalanobis distance which allows us to analyze the current state of the sensors. Therefore, the Siamese neural network is proposed to intellectually support the security control. The Siamese network simplifies the anomaly detection of the robot system and realizes a non-linear analogue of the Mahalanobis distance. This peculiarity allows us to take into account complex data structures received from the robot sensors.

Automatic Control and Computer Sciences. 2017;51(8):881-887
pages 881-887 views

Application of convolutional neural networks for preventing information leakage in open internet resources

Zhukov D., Akimov D., Red’kin O., Los’ V.

Аннотация

The architecture of convolutional neural networks has been considered, including the types of layers used and the principles of their operation, settings, and training features. The possibilities of applying this type of network to solve the problems of information leakage prevention in natural language have been described. The possibility of applying them to solve the problem of classifying Internet pages that serve as web resources to identify pages of interest has been studied.

Automatic Control and Computer Sciences. 2017;51(8):888-893
pages 888-893 views

An adaptive model of a distributed intrusion detection system

Platonov V., Semenov P.

Аннотация

We have proposed an adaptive model of a system for detecting intrusions in a distributed computer network. The basis of the detection system consists of various data-mining methods that make it possible to classify network interaction as normal or anomalous using many attributes extracted from network traffic.

Automatic Control and Computer Sciences. 2017;51(8):894-898
pages 894-898 views

Security evaluation of a wireless ad-hoc network with dynamic topology

Kalinin M., Minin A.

Аннотация

This article reviews the approach to security evaluation of wireless ad-hoc networks (mesh networks, MANET/VANET networks, networks of smart houses, etc.), which is based on the method of principal component analysis.

Automatic Control and Computer Sciences. 2017;51(8):899-901
pages 899-901 views

Approaches to detecting active network nodes in IPv6 address space

Ivanov D., Moskvin D., Ovasapyan T.

Аннотация

Approaches to detecting active network nodes in the IPv6 address space have been considered. Two principal families of approaches have been considered, i.e., with and without the initial sample.

Automatic Control and Computer Sciences. 2017;51(8):902-906
pages 902-906 views

Architectures for building secure vehicular networks based on SDN technology

Kalinin M., Krundyshev V., Semianov P.

Аннотация

The article studies the approach to building secured vehicle networks (VANET, FANET, MARINET, etc.) using the software-defined network technology. The experimental results on evaluating the effectiveness of architectures of secured traffic networks created using supercomputer modeling have been presented.

Automatic Control and Computer Sciences. 2017;51(8):907-914
pages 907-914 views

Detection of encrypted executable files based on entropy analysis to determine the randomness measure of byte sequences

Alekseev I., Platonov V.

Аннотация

A method has been proposed for identifying malicious programs that use encryption as a disguise. In this paper, a modification of the statistical spectral test based on entropy analysis has been described.

Automatic Control and Computer Sciences. 2017;51(8):915-920
pages 915-920 views

Data protection in radio channels of local differential satellite navigation subsystems

Sikarev I., Shakhnov S.

Аннотация

We consider data protection in radio channels of control–correction stations of the GLONASS/GPS local differential subsystem of the river on inland waterways of Russia under the influence of mutual and industrial noise. Based on the investigation of coefficients of the relative sensitivity to variations in the parameters and structure of signals and noise and on the required bit error rate of the element-by-element receiving of digital messages, we introduce estimate criteria for the noise-immunity and functional stability of radio channels. We provide methods to compute the noiseimmunity and functional stability of radio channels. We investigate the variational–parametrical sensitivity of the range size of a control–correction station to variations in parameters of the mutual and industrial noise, as well as its variational–functional sensitivity to variations in the frequency–time structure of the signal and the mutual noise. We find that the parameter variations in industrial noise provide the most sensitive influence on the size of the range of control–correction stations.

Automatic Control and Computer Sciences. 2017;51(8):921-927
pages 921-927 views

Elliptic curves generation for isogeny-based cryptosystems

Aleksandrova E., Shtyrkina A., Yarmak A.

Аннотация

Methods of generating supersingular and ordinary elliptic curves for isogeny-based cryptosystems have been studied. The influence of the class field polynomial on the time of generating ordinary elliptic curves has been analyzed and the comparative time of generating curves using Weber and Hilbert polynomials have been presented. Parameters that influence on the cryptographic security of isogeny-based cryptosystems have been considered.

Automatic Control and Computer Sciences. 2017;51(8):928-935
pages 928-935 views

Authentication in dynamic peer-to-peer networks based on homomorphic secret sharing

Shenets N.

Аннотация

We have proposed a new method for authentication and secret key establishment in ad-hoc networks through public channels based only on verifiable homomorphic threshold secret sharing. The secrecy of the method has been analyzed in standard assumptions with regard to the model of an active adversary represented by a coalition consisting of a pre-threshold number of network nodes. The perfect security of the method is proved in the passive adversary model.

Automatic Control and Computer Sciences. 2017;51(8):936-946
pages 936-946 views

Methods of group authentication for low-resource vehicle and flying self-organizing networks

Aleksandrova E.

Аннотация

It has been suggested to provide group authentication in self-organizing networks using group signature. Due to the hardware peculiarities of unmanned aerial vehicles, the EDR-BBS scheme on elliptic curves has been selected as the group-signature scheme for FANET. Algebraic structures have been represented by elliptic curves over extended fields of special processor-oriented characteristics.

Automatic Control and Computer Sciences. 2017;51(8):947-958
pages 947-958 views

Models of the formation of CRC values and monitoring sums under the conditions of multiple distortions

Baranov A., Baranov P.

Аннотация

Some probability-theoretical models of packet-mode-transmitted information distortions have been considered. The main attention has been paid to distortions, including the possible interferences that affect several transmission cycles. Distortions are simulated by a sequence of impacts determined by dependent random variables. Correspondingly, k-dimensional CRC values also allow them to be represented as the sum of k-dimensional, differently distributed, dependent random terms. In some cases, they can be reduced to the sums of independent terms in a k-dimensional vector space over a field of two elements; then, the known limit theorems on the convergence to uniform distributions become applicable to them. For impacts that stretch to m cycles, the prospects of obtaining convergence conditions for CRC distributions in the case of sums of m-dependent terms or terms that form a nonhomogeneous Markov chain have been discussed.

Automatic Control and Computer Sciences. 2017;51(8):959-964
pages 959-964 views

A method of providing the integrity of information in the group of robotic engineering complexes based on crypt-code constructions

Samoylenko D., Eremeev M., Finko O.

Аннотация

The system of cryptographic code transformation of information based on the aggregated application of block encryption algorithms and polynomial codes of the residual class system has been considered. The complexation of information processing methods ensures the restoration of the integrity of information stored in a group of robotic complexes (RCs) that is subjected to the actions (algebraic manipulations) of the violator, while the physical loss of some predetermined limit number of RCs does not lead to the partial or complete loss of it.

Automatic Control and Computer Sciences. 2017;51(8):965-971
pages 965-971 views

X-PACE: Modified Password Authenticated Connection Establishment protocol

Shenets N., Trukhina E.

Аннотация

In this work the Password Authenticated Connection Establidhment (PACE) protocol, which is used in Europenian smartcard enviroments, is considered. Protocol modifications have been proposed that can enhance its execution speed without decreasing its security. The new version is called X-PACE.

Automatic Control and Computer Sciences. 2017;51(8):972-977
pages 972-977 views

Protection of Wi-Fi network users against rogue access points

Zegzhda D., Moskvin D., Dakhnovich A.

Аннотация

Results of an analysis of the mechanisms for protecting Wi-Fi networks have been presented. A Wi-Fi access point authentication method that can be used in various purpose networks has been proposed.

Automatic Control and Computer Sciences. 2017;51(8):978-984
pages 978-984 views

Intelligent data analysis in decision support systems for penetration tests

Poltavtseva M., Pechenkin A.

Аннотация

Intelligent data analysis is extensively applied in various fields of technology, including information security. The development of decision support systems (DSSs) for penetration tests is more complicated due to incomplete, undefined, and expandable unstructured data. This article suggests an approach to formalizing information from subject domains, quantitative relevance estimates of object characteristics, and estimates of object similarity.

Automatic Control and Computer Sciences. 2017;51(8):985-991
pages 985-991 views

Modeling of information influence on remote wireless network devices

Suhoparov M., Bazhaev N., Krivtsova I., Lebedev I.

Аннотация

A wireless network being affected by a broadcast storm attack has been considered to determine the availability of autonomous nodes and its ability to perform functional tasks under information influence. The conditions for the hacker attacks from a potential intruder have been determined. A wireless device availability analysis has been carried out. A model for determining the technical characteristics of the wireless self-organizing network device has been proposed.

Automatic Control and Computer Sciences. 2017;51(8):992-999
pages 992-999 views

Analysis of the constructing principles and methodology for evaluating the security of shoulder-surfing resistant graphic passwords

Yakovlev V., Arkhipov V., Adadurov S.

Аннотация

In the recent scientific literature, many proposals have been made to increase the resistance of password systems to shoulder surfing attacks. These passwords are called shoulder-surfing resistant graphic passwords (SSRGPs). This paper presents a general methodological approach to analyzing and evaluating the resistance of SSRGPs, which can be described in terms of the input tables.

Automatic Control and Computer Sciences. 2017;51(8):1000-1010
pages 1000-1010 views

Согласие на обработку персональных данных с помощью сервиса «Яндекс.Метрика»

1. Я (далее – «Пользователь» или «Субъект персональных данных»), осуществляя использование сайта https://journals.rcsi.science/ (далее – «Сайт»), подтверждая свою полную дееспособность даю согласие на обработку персональных данных с использованием средств автоматизации Оператору - федеральному государственному бюджетному учреждению «Российский центр научной информации» (РЦНИ), далее – «Оператор», расположенному по адресу: 119991, г. Москва, Ленинский просп., д.32А, со следующими условиями.

2. Категории обрабатываемых данных: файлы «cookies» (куки-файлы). Файлы «cookie» – это небольшой текстовый файл, который веб-сервер может хранить в браузере Пользователя. Данные файлы веб-сервер загружает на устройство Пользователя при посещении им Сайта. При каждом следующем посещении Пользователем Сайта «cookie» файлы отправляются на Сайт Оператора. Данные файлы позволяют Сайту распознавать устройство Пользователя. Содержимое такого файла может как относиться, так и не относиться к персональным данным, в зависимости от того, содержит ли такой файл персональные данные или содержит обезличенные технические данные.

3. Цель обработки персональных данных: анализ пользовательской активности с помощью сервиса «Яндекс.Метрика».

4. Категории субъектов персональных данных: все Пользователи Сайта, которые дали согласие на обработку файлов «cookie».

5. Способы обработки: сбор, запись, систематизация, накопление, хранение, уточнение (обновление, изменение), извлечение, использование, передача (доступ, предоставление), блокирование, удаление, уничтожение персональных данных.

6. Срок обработки и хранения: до получения от Субъекта персональных данных требования о прекращении обработки/отзыва согласия.

7. Способ отзыва: заявление об отзыве в письменном виде путём его направления на адрес электронной почты Оператора: info@rcsi.science или путем письменного обращения по юридическому адресу: 119991, г. Москва, Ленинский просп., д.32А

8. Субъект персональных данных вправе запретить своему оборудованию прием этих данных или ограничить прием этих данных. При отказе от получения таких данных или при ограничении приема данных некоторые функции Сайта могут работать некорректно. Субъект персональных данных обязуется сам настроить свое оборудование таким способом, чтобы оно обеспечивало адекватный его желаниям режим работы и уровень защиты данных файлов «cookie», Оператор не предоставляет технологических и правовых консультаций на темы подобного характера.

9. Порядок уничтожения персональных данных при достижении цели их обработки или при наступлении иных законных оснований определяется Оператором в соответствии с законодательством Российской Федерации.

10. Я согласен/согласна квалифицировать в качестве своей простой электронной подписи под настоящим Согласием и под Политикой обработки персональных данных выполнение мною следующего действия на сайте: https://journals.rcsi.science/ нажатие мною на интерфейсе с текстом: «Сайт использует сервис «Яндекс.Метрика» (который использует файлы «cookie») на элемент с текстом «Принять и продолжить».