Automatic Control and Computer Sciences
Automatic Control and Computer Sciences is a peer-reviewed journal that has its origins in the Institute of Electronics and Computer Science located in Riga, Latvia. The journal is dedicated to control systems, cyber-physical systems, robotics, smart sensors, embedded intelligence, network information technologies, information security, distributed artificial intelligence, complex systems modeling, knowledge representation, processing and management, signal and image processing, machine learning, machine perception, and computer vision. The journal publishes original manuscripts submitted in English, as well as works translated from several other journals. The sources of content are indicated at the article level. The peer review policy of the journal is independent of the manuscript source, ensuring a fair and unbiased evaluation process for all submissions. As part of its aim to become an international publication, the journal welcomes submissions in English from all countries.
PEER REVIEW AND EDITORIAL POLICY
The journal follows the Springer Nature Peer Review Policy, Process and Guidance, Springer Nature Journal Editors' Code of Conduct, and COPE's Ethical Guidelines for Peer-reviewers.
Less than 10% of the manuscripts are rejected without review based on formal criteria as they do not comply with the submission guidelines. Each manuscript is assigned to at least one peer reviewer. The journal follows a single-blind reviewing procedure. The average period from submission to the first decision is usually ten weeks. The approximate rejection rate is 57%. The final decision on the acceptance of a manuscript for publication is made by the Editor-in-Chief.
If Editors, including the Editor-in-Chief, publish in the journal, they do not participate in the decision-making process for manuscripts where they are listed as co-authors.
Special issues published in the journal follow the same procedures as all other issues. If not stated otherwise, special issues are prepared by the members of the editorial board without guest editors.
Ағымдағы шығарылым
Том 53, № 8 (2019)
- Жылы: 2019
- Мақалалар: 32
- URL: https://journals.rcsi.science/0146-4116/issue/view/10785
Article
Security Infrastructure of FANET Based on Secret Sharing and Authenticated Encryption
Аннотация
Analysis of the Security of UEFI BIOS Embedded Software in Modern Intel-Based Computers
Аннотация
The paper presents an overview of current attacks on BIOS and Intel ME embedded software of modern Intel-based computers. We describe the results of the analysis of its security for system boards of basic manufacturers. We also allocate classes of attacks that make it possible to create implants whose discovery by traditional methods of searching for undeclared features becomes impossible or extremely difficult.
On the Construction of a Cybervisor for the Intelligent Monitoring and Control of Data Centers
Аннотация
In this paper, we propose a cybervisor architecture for the data center. The concept of cybervisor construction is based on three components: modeling the operation of the data center, monitoring its performance and cybersecurity characteristics, and support of control decision making to improve the efficiency of the computational process. A conceptual model of the intelligent cybervisor with the compensation for the degradation of the computational process is proposed. The characteristics of virtual infrastructure management are substantiated and the functions of the cybervisor are described.
Estimating the Probability of a Checksum Error in a Message
Аннотация
In this paper, we consider some probability-theoretical models of information distortion at the message level. The checksum (CS) distributions typical of TCP-type protocols are investigated. As an addition operator in the CS, bitwise coordinate addition and binary addition with carryover are considered. For the distortion models described, asymptotic estimates of CS error probabilities are obtained at a small distortion probability. These asymptotic estimates can be useful for messages with long segments.
Analysis of Approaches to Group Authentication in Large-Scale Industrial Systems
Аннотация
The specifics of secure interaction in large-scale industrial systems is investigated, the requirements for group authentication schemes are determined allowing for the specifics. The analysis of approaches to the organization of secure interaction between system nodes based on the group authentication is carried out. The prospects for the application of group authentication in large-scale industrial systems are considered.
Forming the Composition of Functions and Instructions of Microprocessor Devices for Access Control Systems
Аннотация
The paper is devoted to the problem of improving the performance of microprocessors used in access control systems. We allocate requirements and propose a variant of the composition of instructions that are necessary for the high-quality design of microprocessors (operating through a residue number system, for access control), which are aimed at improving their performance in the composition of an access control system.
Application of an Artificial Neural Network for Detection of Attacks in VANETs
Аннотация
This work contains results of developing an approach for detecting routing attacks in VANET networks using an artificial neural network. In the course of this work, such research methods as analysis and modeling were used to select the most promising approach for identifying routing attacks, as well as to develop a mock-up of a software system that detects Gray Hole attacks in VANETs. According to the results of experimental studies, the effectiveness of the developed software was evaluated.
Modeling Big Data Management Systems in Information Security
Аннотация
The article presents a model of a Big Data management system for solving information security (IS) problems for systems of this class. The features of the considered systems are highlighted. The model and architecture of data processing are mathematically described based on the ANSI/SPARC concept and the principles of modeling information systems in IS. The model is analyzed.
Big Data Management System Security Threat Model
Аннотация
The article considers the concept and features of Big Data management systems and their differences from traditional DBMS’s. The authors describe changes in the intruder model and new vulnerabilities in data management systems. A new threat model is developed. The article presents new problems of information security in a distributed Big Data processing and storage system.
A Consistent Approach to Building Secure Big Data Processing and Storage Systems
Аннотация
This article considers the solution to the problem of building secure Big Data management systems using a consistent approach. The concept and features of Big Data management systems and their differences from traditional DBMS’s are presented. The principles of a new, consistent approach to building secure Big Data management systems are given and substantiated. The security subsystem architecture is proposed.
Method of Integration of Multiagent Information Search Using Security Analysis and Information Services in Digital Infrastructures
Аннотация
The analysis of multiagent systems, the features of their application, architectures, and data storage methods is presented. Tools for security analysis and information services are analyzed in terms of the possibility of automatic or automated data exchange. A method for integrating multiagent systems with tools for security analysis (information services) for modern digital infrastructures is proposed.
General Principles of Constructing a Motion Control System for a Remotely Operated Sea Vessel in the Port Area Based on the NMEA-2000 Network Protocol
Аннотация
The paper is concerned with the current state of the question of using unmanned ships in the field of water transport, as well as the most promising areas for applying remote ship piloting technology. The organization of information systems for data transmission is considered in detail, and relevant protocols are proposed. Technical solutions for equipping specialized unmanned transport vessels for piloting and mooring of heavy cargo ships are also proposed.
Use of Graph Representation and Case Analysis to Assess the Security of Computer Systems
Аннотация
We propose an approach to assess the security of computer systems based on case analysis. To implement case analysis, it is proposed to use the graph representation in combination with the advanced bag-of-objects method. The results of experimental studies confirming the effectiveness of the approach are presented.
An Approach to Building Cyber-Resistant Interactions in the Industrial Internet of Things
Аннотация
This paper presents the issues of cybersecurity of the industrial internet of things as the main driver for the development of Enterprise 4.0, compared with the staged protection approach used in automated process control systems. Threat classes relevant to the industrial internet of things are presented. Based on the analysis, requirements are put forward for designing an architecture of the industrial internet of things resistant to network threats, as well as an approach to the implementation of this architecture based on control and communications stability.
Benford’s Law in the Detection of DoS Attacks on Industrial Systems
Аннотация
Benford’s law describes the distribution of the first significant digits in numerical data characterizing real processes. In particular, it is widely used to detect anomalies in financial data. The paper proposes application of Benford’s law to detect DoS attacks on large-scale industrial system components. The results of experimental research are given for the data generated by sensors within the Tennessee Eastman process.
Detection of Security Threats to Modern Websites
Аннотация
Organization of the Quantum Cryptographic Keys Distribution System for Transportation Infrastructure Users
Аннотация
For operation of cryptographic protocols, auxiliary systems performing the key delivery to users are needed. Using quantum systems as a key provider for the devices of intelligent transportation systems is proposed. The possibility of using the isogeny protocols for transferring quantum keys was investigated.
Actual Vulnerabilities of Industrial Automation Protocols of an Open Platform Communications Series
Аннотация
Open Platform Communications (OPC), the interoperability standard for the secure and reliable exchange of data in the industrial automation space, consists of two main types of protocol – classic and unified. The paper reviews a classic set of DA/HDA/A&E protocols, which is based on Microsoft DCOM and RPC technologies. Architectural cyber threats of the classic type of OPC are systematized in this work.
Spoofing Attack on Eigenfaces-Based Biometric Identification System
Аннотация
We present a spoofing attack on biometric identification system, which uses Eigenfaces algorithm for image classification. In this attack we try to modify an adversarial image in such a way that it is recognized as a target image while preserving visual similarity to the initial image. Like other similar attacks, we use a variant of hill-climbing attack. We also present experimental results.
Model for Identifying Cyber Threats to Internet Information Resources
Аннотация
In this paper, we discuss the construction of a model for protecting information resources based on new approaches to active search, unified investigation, and response to cyber threats. The process of identifying cyber threats is based on search prediction methods interconnected with the cyclic nature of the behavioral activity of users of network resources.
Face Recognition Based on the Coefficient Tree for Three Scale Wavelet Transformation
Аннотация
Abstract—A new method for face recognition is presented in the paper. The new method based on the coefficient tree for three-scale wavelet transformation is presented for solving a problem on feature separation. The hidden Markov model is used for classifying face image features.
Identifying Cyberthreats in Modern Industrial Systems by Means of Deep-Learning Networks
Аннотация
This article presents an approach to building a system for identifying cyberthreats in modern industrial systems (IIoT, VANET, WSN) by means of artificial intelligence and deep learning. The results of the tests conducted to assess the suggested approach for efficiency based on deep-learning networks are provided.
Preparing Datasets for Training in a Neural Network System of Intrusion Detection in Industrial Systems
Аннотация
One of the commonly known approaches to network security is the intrusion detection system (IDS) that analyzes the behavior of traffic and hosts in the network. This article presents a technique for generating datasets for the IDS and provides their characteristics as well as defines the features of typical attacks against industrial systems. The results can be used for training the AI IDS in detecting security threats to modern industrial systems.
Model of Cyberattacks on Digital Production Systems
Аннотация
Forecasting the State of Components of Smart Grids for Early Detection of Cyberattacks
Аннотация
The author proposes an approach for predicting the state of Smart Grid components, which is based on a combination of the mathematical techniques of the Kalman filter and machine learning. Prediction of the state will make it possible to detect cyberattacks implemented against a Smart Grid at an early stage.
Maintaining Cyber Sustainability in Industrial Systems Based on the Concept of Molecular-Genetic Control Systems
Аннотация
The author proposes an approach to provide cyber sustainability of complex industrial systems, which consists in the ability of the system to function correctly under cyber attacks. The proposed approach is based on the principles of molecular-genetic control systems and self-regulation of living tissue.
Detection of Weaknesses in Information Systems for Automatic Selection of Security Actions
Аннотация
The problem of automation of the process of detecting weaknesses in information systems based on the analysis of its vulnerabilities is solved. The input data used for the classification, the process of their preparation, and the classification results are described. The interpretation and analysis of the results are presented. The problem solved is a part of the approach proposed by the authors to automatic formation of a set of required security tools for a particular information system. A necessary set of security tools is determined by the set of possible threats.
Model and Method for Optimizing Computational Processes in Parallel Computing Systems
Аннотация
The paper proposes a model and a method for optimizing computational processes in parallel computing systems. The model is constructed by the decomposition of computer programs for solving problems into relatively independent elements (blocks) and presenting the information dependence of the blocks in the form of corresponding directed graphs. Here, the computational process organization consists in the dynamic allocation of resources of a computing system for the implementation of operations of each block. As an efficiency indicator of this process, we take the time of implementing operations of all blocks of considered programs (the solution time of related problems). The goal of the optimization is to reduce this time as much as possible. To form the optimal resource allocation, we propose the method based on the branch-and-bound procedure.
Clustering of Malicious Executable Files Based on the Sequence Analysis of System Calls
Аннотация
The use of clustering algorithms to determine the types of malicious software files based on the analysis of the WinAPI function call sequences is investigated. The use of clustering algorithms such as k-means, EM-algorithm, hierarchical algorithm, and the affinity propagation method is considered. The quality of clustering is evaluated using the silhouette metrics, the Calinski–Harabasz index, and the Davies–Bouldin index.
Cloud-Based Data Architecture Security
Аннотация
The article analyzes the security of modern cloud-based data architectures. The features of modern cloud-based data architectures, their impact on security, and specific security methods are presented. The harmonization of security policies and fundamental data processing conflicts characteristic of this domain are considered separately.