NBI TechnologiesPub Date : 2018-12-01DOI: 10.15688/NBIT.JVOLSU.2018.2.2
Amanulla Kadyrov, A. Kadyrova
{"title":"Graph Modeling of the Processes of Impulsive Time-Delay Systems","authors":"Amanulla Kadyrov, A. Kadyrova","doi":"10.15688/NBIT.JVOLSU.2018.2.2","DOIUrl":"https://doi.org/10.15688/NBIT.JVOLSU.2018.2.2","url":null,"abstract":"Impulsive systems are widely used in metallurgy, chemical, and oil and gas industries, heat power engineering, irrigation and other industries. Periodic nature of the discrete control devices operation is the reason for the appearance of pure delay in the control channels. Methods for studying linear impulsive time-delay systems in synchronous-in-phase modes of operation of discrete devices are developed with sufficient completeness. At the same time, the methods of modeling and research of multiple-time-scale, multivariable, nonlinear impulsive time-delay systems require their further development. In this paper we propose a method for modeling impulsive time-delay systems based on dynamic graphs.\u0000\u0000The result of simulation of pulse systems with delay based on dynamic graphs is completely the same as the results obtained by the modified Z-transformation. In the case of one-dimensional systems, calculations are much easier to perform on the basis of the proposed method of dynamic graphs. The application of the modified Z-transformation for analytical studies is particularly problematic in the case of multi-dimensional pulse systems with delay, as it is accompanied by difficulties of a fundamental nature due to the structural complexity and the problem of formalized mathematical description of the processes using the traditional approach.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116946101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
NBI TechnologiesPub Date : 2018-12-01DOI: 10.15688/NBIT.JVOLSU.2018.2.6
A. Rodionov, V. Belyanin, A. Gorbunov
{"title":"Improving the Methods for Protecting Information from Unauthorized Access","authors":"A. Rodionov, V. Belyanin, A. Gorbunov","doi":"10.15688/NBIT.JVOLSU.2018.2.6","DOIUrl":"https://doi.org/10.15688/NBIT.JVOLSU.2018.2.6","url":null,"abstract":"The research relevance is conditioned by the constantly growing technical capabilities for unauthorized access to protected information in the local area networks (LAN), the development of methods of attacks, and therefore, the need to improve methods of information protection. The paper describes the peculiarities of using the system of collecting and correlating information security events SIEM (Security Information and Event Management), which detects and notifies about the emergence of threats to leakage of protected information. In the modern world, due to the ever-growing technical capabilities of attackers for unauthorized access to LAN, improving the ways of carrying out attacks on them, there is a need to improve the existing methods of information protection and to develop new ones. In addition to the technical component, an important risk factor is the human factor, due to which up to 52 % of information leaks (intentional and unintended) occur around the world. They are distributed by categories of information: 62.3 % – personal data, 31.0 % – payment documents, 3.9 % – state secrets, 2.8 % – trade secrets.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124797761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
NBI TechnologiesPub Date : 2018-12-01DOI: 10.15688/NBIT.JVOLSU.2018.2.7
A. Shilina, V. Kuznetsova
{"title":"Estimating the Quality of Manageability of the Communication Network for Military Purposes Taking into Account the Requirements of Information Protection","authors":"A. Shilina, V. Kuznetsova","doi":"10.15688/NBIT.JVOLSU.2018.2.7","DOIUrl":"https://doi.org/10.15688/NBIT.JVOLSU.2018.2.7","url":null,"abstract":"The quality of any purposeful process can be considered as a set of the most essential operational properties that determine its suitability for its intended use. Given the fact that the handling is a characteristic of the communication network, the properties of the management process should be considered from the perspective of the ability of the authorities to implement the tasks in view of the provision of hidden control of troops and weapons. With regard to the study of the quality of communication network management, it is advisable to describe their properties of timeliness (efficiency), effectiveness and resource consumption. At the same time, each of them is complex, has its own structure and is in a certain dependence and relationship with the properties of the system and the properties of the results obtained during its operation. The authors propose the methods for estimating the quality of communication network manageability, describe the properties of efficiency, effectiveness and resource consumption. The quality of decisions is considered in terms of validity, adequacy and protection of information.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130940199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
NBI TechnologiesPub Date : 2018-11-01DOI: 10.15688/NBIT.JVOLSU.2018.1.2
V. Baranov, Mikhail Kotsynyak, Denis Ivanov
{"title":"The Technique of Forecasting the Structure of Targeted Cyber Attack on Information Telecommunication Networks","authors":"V. Baranov, Mikhail Kotsynyak, Denis Ivanov","doi":"10.15688/NBIT.JVOLSU.2018.1.2","DOIUrl":"https://doi.org/10.15688/NBIT.JVOLSU.2018.1.2","url":null,"abstract":"The main trend in recent years is the shift of emphasis from mass attacks to targeted (target) attacks, which are the actions of the enemy of a particular state or non-state structure in advance. The target attack is always built under the object of influence, being a thoughtful operation, not a simple technical action. Target cyber attack on the element of information and telecommunication network is implemented in the form of a set of activities aimed at studying the information system and software. This allows for revealing weaknesses in the structure of the information and telecommunication network. The authors develop the technique of hidden introduction and bypass of standard means of information protection, fix the infrastructure, distribute the harmful action. Under the impact of a targeted cyber attack, it is difficult to choose the methods and means of protecting the information and telecommunication network, as their resource is limited. One of the ways to resolve this contradiction is a differentiated approach to the protection of information and telecommunication network, which is to choose the most relevant for the current situation areas of protection. The article deals with the problem of targeted attacks proliferation and describes the principle of their realization. The authors also substantiate the need of working out the methodology for estimating the impact of targeted cyber attacks by the enemy on information and telecommunications networks as well as their key elements. The special attention is paid to the purpose and structure of this methodology. The authors describe the stages of targeted cyber attack and its application areas.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126781705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
NBI TechnologiesPub Date : 2018-08-01DOI: 10.15688/NBIT.JVOLSU.2018.1.7
A. Nikishova, S. Mikhalchenko
{"title":"The Development of Formal Model for Research of Information System’s Data Mining Programs","authors":"A. Nikishova, S. Mikhalchenko","doi":"10.15688/NBIT.JVOLSU.2018.1.7","DOIUrl":"https://doi.org/10.15688/NBIT.JVOLSU.2018.1.7","url":null,"abstract":"According to statistics, the number of samples of new attacks against information systems is increasing due to inability to detect new patterns and the lack of modern attack detection systems. To resolve this issue, we implement intelligent data analysis to detect attacks. There are many data mining programs, so it is important to choose the best program. The authors investigate the problem of information security from the viewpoint of new attacks, the programs for mining of information system’s events. The criteria for their evaluation have been formulated. Besides, the formal model for the study of programs for mining of information system’s events has been developed. The proposed formal model will help to choose the best program for event mining. If the requirements for the analyzed programs change, then changing the values in the best vector can also become a right solution. Thus, the developed formal evaluation model is universal and effective.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115703309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
NBI TechnologiesPub Date : 2018-08-01DOI: 10.15688/nbit.jvolsu.2018.1.6
V. Moskovchenko, Danil Stolyarov, A. Gorbunov, V. Belyanin
{"title":"The Analysis of Technologies Protecting from Web Browsers Identification","authors":"V. Moskovchenko, Danil Stolyarov, A. Gorbunov, V. Belyanin","doi":"10.15688/nbit.jvolsu.2018.1.6","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2018.1.6","url":null,"abstract":"In the age of information technology, it is becoming increasingly difficult to maintain privacy. Sometimes anonymity on the Internet helps to protect everyone’s right. Anonymity on the Internet also helps to protect against possible illegal actions of third parties. There is a number of technologies that you can use to monitor site user activity. These include technologies such as cookies and fingerprints. Today, cookies technology is an important component of most operations on the Internet. This technology is considered to be one of the main tools that Internet resource owners use to track customers. However, this technique is gradually becoming obsolete and often does not give the desired effect. Fingerprint technology is a global identifier. Browser typos make its owner more recognizable not only on frequently visited Internet resources, but also in other electronic sources. Fingerprints capture the holistic picture that a resource receives from a web browser. This allows you to identify the client even if you make changes to your browser settings. This article deals with the problem of anonymity preservation in a network. The authors describe the main technologies for tracking the users’ website activity, the principles of their work, and the protection methods against these technologies. The advantages and disadvantages of the cookies and fingerprint technologies have also been determined.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116711220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
NBI TechnologiesPub Date : 2018-08-01DOI: 10.15688/NBIT.JVOLSU.2018.1.3
A. Vlasenko, A. Musienko
{"title":"Advantages of Using IPv6 for the Internet of Things from the Viewpoint of Information Security","authors":"A. Vlasenko, A. Musienko","doi":"10.15688/NBIT.JVOLSU.2018.1.3","DOIUrl":"https://doi.org/10.15688/NBIT.JVOLSU.2018.1.3","url":null,"abstract":"The Internet of Things is a concept of a computer network of physical objects (“things”) equipped with built-in technologies for interaction with each other or with the external environment, considering the organization of such networks as a phenomenon capable of restructuring economic and social processes, excluding the need for human actions and operations. The Internet of things consists of loosely connected disparate networks, each of which is deployed to solve specific tasks. For example, in modern cars there are multiple networks for controling the operation of the engine and other systems, for supporting third communications, etc. The offices and residential buildings are also equipped with many networks for controlling heating, ventilation, air-conditioning, telephone, security, lighting. As the Internet of things evolves, these and many other networks will be connected to each other and gain a higher level of security. As a result, the Internet of things will gain even more opportunities to open up new, broader perspectives for humanity. This article is devoted to the popular concept the Internet of things. The author analyzes the opportunities, as well as vulnerabilities of this phenomenon. It has benn suggested that the use of Internet Protocol of version 6 will solve many problems of this concept including those related to security.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"45 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125693146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
NBI TechnologiesPub Date : 2018-08-01DOI: 10.15688/NBIT.JVOLSU.2018.1.1
A. Babenko, S. Kozunova
{"title":"The Model of Information Security Threat Profile of Corporate Information System","authors":"A. Babenko, S. Kozunova","doi":"10.15688/NBIT.JVOLSU.2018.1.1","DOIUrl":"https://doi.org/10.15688/NBIT.JVOLSU.2018.1.1","url":null,"abstract":"The level of information security of corporate information systems depends on the security of information assets of the enterprise in which the enterprise information systems are implemented. To protect data processed in corporate information systems, it is advisable to ensure the information security of the system, to identify and predict threats to information security violations. Such measures will ensure effective management of information security and high-quality response to threats in corporate information systems in real time. Thus, the research of threats management and information security of corporate information systems allows the authors to develop a model of threat profile. The difference from the previously proposed models is that the present solution defines the actions that need to be taken when threats are detected and to prevent them. Application of the proposed model will allow implementing special procedures of information security management of the enterprise, using private information security policies for corporate information systems. The authors highlight the key aspects of managing threats to information security of corporate information systems. The vulnerabilities typical for corporate information systems have been allocated. The sources of threats have been formed, and the potential violators have been described. A unique model of the profile of threats to information security for corporate information system has been developed.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130038581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
NBI TechnologiesPub Date : 2018-08-01DOI: 10.15688/NBIT.JVOLSU.2018.1.5
A. Makaryan, M. Karmanov
{"title":"Aspects of Analyzing the Security and Vulnerabilities of Mobile Applications","authors":"A. Makaryan, M. Karmanov","doi":"10.15688/NBIT.JVOLSU.2018.1.5","DOIUrl":"https://doi.org/10.15688/NBIT.JVOLSU.2018.1.5","url":null,"abstract":"The given article deals with the variants of mobile applications’ local data protection on devices with operation systems Android and iOS. The following programs have been investigated: messengers WhatsApp, Viber, Telegram, WeChat, Signal. The conducted analysis let define and classify the programs for protection mechanisms, the types of stored data, the required tools and technologies, as well as the techniques for improving the protection of the stored local data. As it turned out in the course of this research work, locally stored software data on the device is not given enough attention in terms of protection, as in some cases, this protection is based solely on the mechanisms of the operating system of the device. For more reliable protection of locally stored data of the application it is necessary to implement the following approaches in the application: encryption of both the database in full and some critical data in it separately by an additional layer of encryption; encryption of files that appear during the program execution (media files, for example); coding and representation of data in a program using proprietary algorithms; the use of confusing names of critical files and data (the key file should not be called “key”, as in the case of WhatsApp), and data traps; the encoding of the configuration files containing sensitive information to ensure the security of the data; making the functionality of the kernel cryptographic transformations in a separate plug-in library in order to make the study of the decompiled source code on the subject of these reforms meaningless.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125431641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
NBI TechnologiesPub Date : 2018-08-01DOI: 10.15688/NBIT.JVOLSU.2018.1.8
B. Shvyrev, D. Pogorelov, Mariya Berdnik
{"title":"Counteraction to Unauthorized Flights of Unmanned Aerial Vehicles","authors":"B. Shvyrev, D. Pogorelov, Mariya Berdnik","doi":"10.15688/NBIT.JVOLSU.2018.1.8","DOIUrl":"https://doi.org/10.15688/NBIT.JVOLSU.2018.1.8","url":null,"abstract":"The development of wireless technologies has formed a significant cluster of devices that both improve the quality of life and bring a variety of difficulties associated with the control of these devices by unknown persons or organizations in order to obtain any of their own or third-party benefits. Such negative embodiments of wireless technologies include wireless means of coverting audio and video capture, wireless aircraft-copters and gliders which can gain impressive speed, etc. Aircraft is an object involved in the covert removal of information, and can be used by criminals for the delivery of certain goods, substances illegal trafficking of which is punishable by Russian legislation. Countering new modern threats to information security is an important and urgent task. Permitted radio frequency ranges are used to detect a channel for information leakage and to control unmanned aerial vehicles that violate the rights of citizens. The article presents the comparative analysis of wireless technologies at a frequency of 2.4 GHz. The authors suggest program measures of counteraction to uncontrolled flights of unmanned aerial vehicles.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131850873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}