The concept of building security of the network with elements of the semiotic approach

S. Yevseiev, Maksym Tolkachov, D. Shetty, V. Khvostenko, A. Strelnikova, S. Milevskyi, Sergii Golovashych
{"title":"The concept of building security of the network with elements of the semiotic approach","authors":"S. Yevseiev, Maksym Tolkachov, D. Shetty, V. Khvostenko, A. Strelnikova, S. Milevskyi, Sergii Golovashych","doi":"10.21303/2313-8416.2023.002828","DOIUrl":null,"url":null,"abstract":"The object of research: First, to identify and discuss the security problems of cyber-physical systems associated with the emergence of qualitatively new technologies and qualitatively new affordable artificial intelligence software. Secondly, building the concept of the security structure of a cyber-physical system based on the Zero Trust Security approach. Creation of a new secure load transfer structure based on the semiotic approach. \nInvestigated problem: Information system security problems continue to cause significant costs and damage to organizations. Sustainability requires comprehensive and integrated security platforms that reach customers, whether they work at headquarters, in a branch office, or individually from random touchpoints. \nThe main scientific results: the concept of a structured protection system with the Zero Trust Security approach has been developed. The structure of the semiotic analysis of the segmentation of the transmitted load on the blocks is proposed. Blocks by signs are subjected to individual analysis. According to the features, the blocks are transformed by the selected representation into an object/groups of objects. Groups for transmission in the load are tagged, have different coding severity (depth), depending on the risk assessment. Groups are transmitted through the network in different ways (paths) – VPN (different ESP), unencrypted tunnel, open access, etc. \nThis solution improves the throughput of malicious load analysis prior to transmission. The performance overhead for encoding/decoding the load and encapsulating/de-encapsulating during transmission is reduced. The transmission bandwidth is increased. \nThe area of practical use of the research results: businesses requiring secure access to on-premise resources and mission-critical cloud environments. Organizations using employees in distributed networks. Specialists in the deployment and analysis of the protection of cyber-physical systems. \nInnovative technological product: The semiotic security concept extends the zero-trust security model, which focuses on protecting network traffic within and between organizations. This concept uses load traffic segmentation, which combines an advanced analysis and transfer load transformation framework. \nThis concept provides for integration with other cybersecurity technologies such as endpoint discovery and response (EDR) and security information and event management (SIEM) to provide a more comprehensive security solution. \nThis solution improves the throughput of malicious load analysis prior to transmission. Reduced performance resources for encode/decode load and encapsulate/deencapsulate in transit. \nScope of the innovative technological product: this concept can be applied to enterprises that already have some elements of zero trust in their corporate infrastructure, but cannot strictly control the state of the requested assets, are limited in implementing security policies for certain classes of users. This deployment model can also be applied to enterprises that use cloud services for individual business processes. \nIt can be useful for researchers and administrators in the development of corporate cybersecurity plans, which uses the concepts of zero-trust and covers relationships between components, workflow planning, and access policies.","PeriodicalId":30651,"journal":{"name":"ScienceRise","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2023-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ScienceRise","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.21303/2313-8416.2023.002828","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The object of research: First, to identify and discuss the security problems of cyber-physical systems associated with the emergence of qualitatively new technologies and qualitatively new affordable artificial intelligence software. Secondly, building the concept of the security structure of a cyber-physical system based on the Zero Trust Security approach. Creation of a new secure load transfer structure based on the semiotic approach. Investigated problem: Information system security problems continue to cause significant costs and damage to organizations. Sustainability requires comprehensive and integrated security platforms that reach customers, whether they work at headquarters, in a branch office, or individually from random touchpoints. The main scientific results: the concept of a structured protection system with the Zero Trust Security approach has been developed. The structure of the semiotic analysis of the segmentation of the transmitted load on the blocks is proposed. Blocks by signs are subjected to individual analysis. According to the features, the blocks are transformed by the selected representation into an object/groups of objects. Groups for transmission in the load are tagged, have different coding severity (depth), depending on the risk assessment. Groups are transmitted through the network in different ways (paths) – VPN (different ESP), unencrypted tunnel, open access, etc. This solution improves the throughput of malicious load analysis prior to transmission. The performance overhead for encoding/decoding the load and encapsulating/de-encapsulating during transmission is reduced. The transmission bandwidth is increased. The area of practical use of the research results: businesses requiring secure access to on-premise resources and mission-critical cloud environments. Organizations using employees in distributed networks. Specialists in the deployment and analysis of the protection of cyber-physical systems. Innovative technological product: The semiotic security concept extends the zero-trust security model, which focuses on protecting network traffic within and between organizations. This concept uses load traffic segmentation, which combines an advanced analysis and transfer load transformation framework. This concept provides for integration with other cybersecurity technologies such as endpoint discovery and response (EDR) and security information and event management (SIEM) to provide a more comprehensive security solution. This solution improves the throughput of malicious load analysis prior to transmission. Reduced performance resources for encode/decode load and encapsulate/deencapsulate in transit. Scope of the innovative technological product: this concept can be applied to enterprises that already have some elements of zero trust in their corporate infrastructure, but cannot strictly control the state of the requested assets, are limited in implementing security policies for certain classes of users. This deployment model can also be applied to enterprises that use cloud services for individual business processes. It can be useful for researchers and administrators in the development of corporate cybersecurity plans, which uses the concepts of zero-trust and covers relationships between components, workflow planning, and access policies.
用符号学方法构建网络安全的概念
研究目的:首先,识别和讨论与新技术和可负担的人工智能软件的出现相关的网络物理系统的安全问题。其次,构建了基于零信任安全方法的网络物理系统安全结构概念。基于符号学方法的新型安全负载传递结构的创建。调查问题:信息系统安全问题持续给组织造成重大损失和损害。可持续发展需要全面和集成的安全平台,能够覆盖客户,无论他们是在总部、分支机构工作,还是在随机接触点单独工作。主要的科学成果:开发了具有零信任安全方法的结构化保护系统的概念。提出了传输载荷在块上分割的符号学分析结构。用符号表示的方块需要单独分析。根据这些特征,通过选择的表示将这些块转换成一个或一组对象。在负载中进行分组传输,根据风险评估,有不同的编码严重程度(深度)。组以不同的方式(路径)通过网络传输——VPN(不同的ESP)、未加密的隧道、开放访问等。此解决方案提高了传输前恶意负载分析的吞吐量。在传输过程中编码/解码负载和封装/解封装的性能开销减少了。传输带宽增加。研究成果的实际应用领域:需要安全访问本地资源和关键任务云环境的企业。在分布式网络中使用员工的组织。部署和分析网络物理系统保护的专家。创新技术产品:符号安全概念扩展了零信任安全模型,重点保护组织内部和组织之间的网络流量。这个概念使用负载流量分割,它结合了高级分析和转移负载转换框架。该概念提供了与其他网络安全技术(如端点发现和响应(EDR)以及安全信息和事件管理(SIEM))的集成,以提供更全面的安全解决方案。此解决方案提高了传输前恶意负载分析的吞吐量。减少了传输中编码/解码加载和封装/解封装的性能资源。创新技术产品的范围:此概念可以应用于企业基础设施中已经存在一些零信任元素,但无法严格控制所请求资产的状态,并且在为某些类别的用户实施安全策略方面受到限制的企业。此部署模型也可以应用于为单个业务流程使用云服务的企业。它对研究人员和管理员在制定企业网络安全计划时非常有用,该计划使用零信任的概念,涵盖组件之间的关系、工作流规划和访问策略。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
17
审稿时长
3 weeks
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信