A. Kanev, Aleksandr Nasteka, Catherine Bessonova, D. Nevmerzhitsky, A. Silaev, Aleksandr Efremov, K. Nikiforova
{"title":"Anomaly detection in wireless sensor network of the “smart home” system","authors":"A. Kanev, Aleksandr Nasteka, Catherine Bessonova, D. Nevmerzhitsky, A. Silaev, Aleksandr Efremov, K. Nikiforova","doi":"10.23919/FRUCT.2017.8071301","DOIUrl":"https://doi.org/10.23919/FRUCT.2017.8071301","url":null,"abstract":"Subject. The paper reviews the problem of anomaly detection in home automation systems. Authors define specificities of the existing security networks and accentuate the need of the detection of informational and physical impact on sensors. Characteristics of the transmitted information and physical impacts on automation devices are analysed and used as metrics for the anomalous behavior detection. Various machine learning algorithms for anomaly detection are compared and reviewed. Methods. The paper reviews the anomaly detection method that includes artificial neural networks as a detection tool. In this method characteristics of the security network devices are analysed to detect an anomalous behaviour, and exactly this type of data should be used to train the artificial neural network. This paper describes tools that can be used to implement the offered anomaly detection method. Main results. As an experiment the scenario has been created so that the model of the “Smart home” system produces the data of network information streams and the artificial neural network decides from this data. As a result the training and testing sets has been produced. The configuration of the artificial neural network has been defined as a result of tests. The experiment shows the potential of described method due to the fact that the area under ROC curve is 0.9689, which is better than basic machine learning algorithms performance. Practical importance. The offered method can be used at the development stage while implementation of the information and security systems requiring monitoring of the connected devices. Anomaly detection technology excludes the possibility of the inconspicuous violation of the information's confidentiality and integrity.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126341757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Syschikov, B. Sedov, K. Nedovodeev, S. Pakharev
{"title":"Visual development environment for OpenVX","authors":"A. Syschikov, B. Sedov, K. Nedovodeev, S. Pakharev","doi":"10.23919/FRUCT.2017.8071346","DOIUrl":"https://doi.org/10.23919/FRUCT.2017.8071346","url":null,"abstract":"OpenVX standard has appeared as an answer from the computer vision community to the challenge of accelerating vision applications on embedded heterogeneous platforms. It is designed as a low-level programming framework that enables software developers to leverage the computer vision hardware potential with functional and performance portability. In this paper, we present the visual environment for OpenVX programs development. To the best of our knowledge, this is the first time the graphical notation is used for OpenVX programming. Our environment addresses the need to design OpenVX graphs in a natural visual form with automatic generation of a full-fledged program, saving the programmer from writing a bunch of a boilerplate code. Using the VIPE visual IDE to develop OpenVX programs also makes it possible to work with our performance analysis tools. All the benefits gained from using the visual IDE are illustrated by the feature tracker example.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126404641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Pantiukhin, I. Zikratov, A. Sizykh, Addy Christian Crosby Nii
{"title":"Testing of the hypothesis in the research of computer incidents on the basis of the analysis of attributes and their values","authors":"I. Pantiukhin, I. Zikratov, A. Sizykh, Addy Christian Crosby Nii","doi":"10.23919/FRUCT.2017.8071333","DOIUrl":"https://doi.org/10.23919/FRUCT.2017.8071333","url":null,"abstract":"In this paper, we consider the verification of the hypothesis in the research of computer incidents study, based on the analysis of attributes and their values with post-incident computer equipment. The essence of the hypothesis constitutes the ability to study computer incidents in the types of computer memory; analyzing only the attributes and their values, without taking into account the contents of the data. The paper describes the process of forming the attributes and their values post-incident computer equipment and also, describing how to create a database of existing computer incidents. In performing these computational experiments, consists of assessing the possibilities of investigating computer incidents on the basis of the analysis of attributes and their values in the created database. Forming an opinion regarding the more informative details about the computer incidents by analysis of attributes and their values from the volatile memory, NVRAM (Non Volatile Random Access Memory), network traffic complex.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115351491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Localising unsafe software resource usage with typed code model","authors":"L. Tsvetkov, A. Spivak","doi":"10.23919/FRUCT.2017.8071349","DOIUrl":"https://doi.org/10.23919/FRUCT.2017.8071349","url":null,"abstract":"The article presents a method for quality assurance on resource leakage by defect search automation using developed model of program code. Resources requested by the program are identified and assigned extended types storing state markers. Detection occurs by assignment of this markers to elements of code model according to resource management functions, evidencing resource availability. Further analysis is taken place by propagation of the markers according to the rules of a model. Rules are structured a in way that prevents unsafe use of resource handles. Inability to apply specific rule at analysis stage signifies that resource is used in unsafe way, creating potential security flaw in a program.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116973600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The method of analysis pseudo-phase portrait in the problem of recognition of biomedical signals","authors":"Karina Khachatryan, L. Manilo, A. Anisimov","doi":"10.23919/FRUCT.2017.8071305","DOIUrl":"https://doi.org/10.23919/FRUCT.2017.8071305","url":null,"abstract":"Today the problem of analysis of biomedical signals with chaotic properties is an important task. Its decision is important for the recognition of signals with varying severity of non-linear component. The paper presents a method for biomedical signal processing, tapping on the pseudo-phase portrait differences from the normal rhythm of some of its violations. The algorithm is intended for medical computer systems and implemented in MATLAB software environment.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114986159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Ivashchenko, P. Sitnikov, M. Andreev, O. Surnin
{"title":"Open services provider for supply chains","authors":"A. Ivashchenko, P. Sitnikov, M. Andreev, O. Surnin","doi":"10.23919/FRUCT.2017.8071298","DOIUrl":"https://doi.org/10.23919/FRUCT.2017.8071298","url":null,"abstract":"There is proposed a new software solution for supply chains management based in virtualization of intermediary services. Open Services Provider (OSP) is a platform powered by SEC “Open code” that allows developing situational centers for decision making support based on Big Data analysis and visualization. The paper describes a problem of management of modern distributed enterprises, the proposed OSP solution and results of its probation in practice. A new concept of sixth party logistics (6PL) Intermediary Provider is given by analogy with fifth party logistics (5PL) provider, which is based on implementation of a number of open services for customers, suppliers and shippers provided by the specially designed software platform.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128891402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
I. Viksnin, Nikita D. Schcepin, Roman O. Patrikeev, A. A. Shlykov, I. Komarov
{"title":"Approaches to communication organization within cyber-physical systems","authors":"I. Viksnin, Nikita D. Schcepin, Roman O. Patrikeev, A. A. Shlykov, I. Komarov","doi":"10.23919/FRUCT.2017.8071352","DOIUrl":"https://doi.org/10.23919/FRUCT.2017.8071352","url":null,"abstract":"This paper discusses various approaches to the organization of information interaction of cyber-physical system's element. The authors model the system behavior in the presence of three possible approaches to the organization of information interaction. The first approach is based on the principle that everyone can communicate with everyone. The second approach is the choice of “leader” for a particular rule, who is carrying out the exchange of information with other elements. The third approach involves the dynamic selection of the leader, based on current requirements. Computer simulation was carried out and best approach was determined.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130043513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Menshchikov, A. Komarova, Y. Gatchin, A. Korobeynikov, Nina Tishukova
{"title":"A study of different web-crawler behaviour","authors":"A. Menshchikov, A. Komarova, Y. Gatchin, A. Korobeynikov, Nina Tishukova","doi":"10.23919/FRUCT.2017.8071322","DOIUrl":"https://doi.org/10.23919/FRUCT.2017.8071322","url":null,"abstract":"The article deals with a study of web-crawler behaviour on different websites. A classification of web-robots, information gathering tools and their detection methods are provided. Well-known scrapers and their behaviour are analyzed on the base of large web-server log set. Experimental results demonstrate that web-robot can be distinguished from human by feature analysis. The results of the research can be used as a basis for comprehensive intrusion detection and prevention system development.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125324113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
V. N. Gorbachev, E. Kaynarova, I. Metelev, E. Yakovleva
{"title":"On color-to-gray transformation for distributing color digital images","authors":"V. N. Gorbachev, E. Kaynarova, I. Metelev, E. Yakovleva","doi":"10.23919/FRUCT.2017.8071295","DOIUrl":"https://doi.org/10.23919/FRUCT.2017.8071295","url":null,"abstract":"A new block embedding algorithm with a secret key is introduced for the Color-to-Gray and Back transformation. Color is embedded into the bit planes of the luminosity component of the YUV color space. We present an interface incorporated into Adobe Photoshop and consider a solution of the high quality digital image distribution problem. The solution is based on idea that the grayscale image with hidden color is a β version of a color original. Then a user could get a gray image before buying its color original he is interested. The proposed protocol has a secret key and can protect original images from unauthorized copying.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"302 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126929960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reduction of the feature space for the detection of attacks of wireles sensor networks","authors":"Victoria M. Korzhuk, Ilya Shilov, Julia Torshenko","doi":"10.23919/FRUCT.2017.8071311","DOIUrl":"https://doi.org/10.23919/FRUCT.2017.8071311","url":null,"abstract":"The article evaluates the informativeness of the features of the abnormal behaviour of node in wireless sensor network. The estimation is carried out for the basic methods of attacking on wireless sensor networks, such as ≪funnel≫, ≪wormhole≫, ≪selective forwarding≫, etc. The estimation is performed using three basic methods: the method of Shannon, the method of Kullback and the method of accumulated frequencies. Special attention is paid to the dependence of the feature informativeness on various characteristics of the network (topology, packet generation periods, the degree of stochasticity of the selection of addresses for the generated packets transmission). Estimates are compared with previously obtained estimates for the simplest network with the mesh topology. Key results are the reduction of the feature space by uninformative features extracting (when reducing the introduced scale of feature informativeness degree is used), the formation of samples with estimates of informativeness for each network and each pair ≪normal behaviour≫-≪specific attack type≫. Also the program for automatic calculation of estimates of the informativeness and its subsequent analysis is created. In the future the obtained results can be used as the basis for methods of classification, aimed at identifying of anomalous behaviour in wireless sensor networks.","PeriodicalId":114353,"journal":{"name":"2017 20th Conference of Open Innovations Association (FRUCT)","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115361838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}