NBI Technologies最新文献

筛选
英文 中文
Graph Modeling of the Processes of Impulsive Time-Delay Systems 脉冲时滞系统过程的图建模
NBI Technologies Pub Date : 2018-12-01 DOI: 10.15688/NBIT.JVOLSU.2018.2.2
Amanulla Kadyrov, A. Kadyrova
{"title":"Graph Modeling of the Processes of Impulsive Time-Delay Systems","authors":"Amanulla Kadyrov, A. Kadyrova","doi":"10.15688/NBIT.JVOLSU.2018.2.2","DOIUrl":"https://doi.org/10.15688/NBIT.JVOLSU.2018.2.2","url":null,"abstract":"Impulsive systems are widely used in metallurgy, chemical, and oil and gas industries, heat power engineering, irrigation and other industries. Periodic nature of the discrete control devices operation is the reason for the appearance of pure delay in the control channels. Methods for studying linear impulsive time-delay systems in synchronous-in-phase modes of operation of discrete devices are developed with sufficient completeness. At the same time, the methods of modeling and research of multiple-time-scale, multivariable, nonlinear impulsive time-delay systems require their further development. In this paper we propose a method for modeling impulsive time-delay systems based on dynamic graphs.\u0000\u0000The result of simulation of pulse systems with delay based on dynamic graphs is completely the same as the results obtained by the modified Z-transformation. In the case of one-dimensional systems, calculations are much easier to perform on the basis of the proposed method of dynamic graphs. The application of the modified Z-transformation for analytical studies is particularly problematic in the case of multi-dimensional pulse systems with delay, as it is accompanied by difficulties of a fundamental nature due to the structural complexity and the problem of formalized mathematical description of the processes using the traditional approach.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116946101","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the Methods for Protecting Information from Unauthorized Access 改进保护信息免遭非法访问的方法
NBI Technologies Pub Date : 2018-12-01 DOI: 10.15688/NBIT.JVOLSU.2018.2.6
A. Rodionov, V. Belyanin, A. Gorbunov
{"title":"Improving the Methods for Protecting Information from Unauthorized Access","authors":"A. Rodionov, V. Belyanin, A. Gorbunov","doi":"10.15688/NBIT.JVOLSU.2018.2.6","DOIUrl":"https://doi.org/10.15688/NBIT.JVOLSU.2018.2.6","url":null,"abstract":"The research relevance is conditioned by the constantly growing technical capabilities for unauthorized access to protected information in the local area networks (LAN), the development of methods of attacks, and therefore, the need to improve methods of information protection. The paper describes the peculiarities of using the system of collecting and correlating information security events SIEM (Security Information and Event Management), which detects and notifies about the emergence of threats to leakage of protected information. In the modern world, due to the ever-growing technical capabilities of attackers for unauthorized access to LAN, improving the ways of carrying out attacks on them, there is a need to improve the existing methods of information protection and to develop new ones. In addition to the technical component, an important risk factor is the human factor, due to which up to 52 % of information leaks (intentional and unintended) occur around the world. They are distributed by categories of information: 62.3 % – personal data, 31.0 % – payment documents, 3.9 % – state secrets, 2.8 % – trade secrets.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124797761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Estimating the Quality of Manageability of the Communication Network for Military Purposes Taking into Account the Requirements of Information Protection 考虑信息保护要求的军事通信网可管理性质量评估
NBI Technologies Pub Date : 2018-12-01 DOI: 10.15688/NBIT.JVOLSU.2018.2.7
A. Shilina, V. Kuznetsova
{"title":"Estimating the Quality of Manageability of the Communication Network for Military Purposes Taking into Account the Requirements of Information Protection","authors":"A. Shilina, V. Kuznetsova","doi":"10.15688/NBIT.JVOLSU.2018.2.7","DOIUrl":"https://doi.org/10.15688/NBIT.JVOLSU.2018.2.7","url":null,"abstract":"The quality of any purposeful process can be considered as a set of the most essential operational properties that determine its suitability for its intended use. Given the fact that the handling is a characteristic of the communication network, the properties of the management process should be considered from the perspective of the ability of the authorities to implement the tasks in view of the provision of hidden control of troops and weapons. With regard to the study of the quality of communication network management, it is advisable to describe their properties of timeliness (efficiency), effectiveness and resource consumption. At the same time, each of them is complex, has its own structure and is in a certain dependence and relationship with the properties of the system and the properties of the results obtained during its operation. The authors propose the methods for estimating the quality of communication network manageability, describe the properties of efficiency, effectiveness and resource consumption. The quality of decisions is considered in terms of validity, adequacy and protection of information.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130940199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Technique of Forecasting the Structure of Targeted Cyber Attack on Information Telecommunication Networks 信息通信网络针对性网络攻击结构预测技术
NBI Technologies Pub Date : 2018-11-01 DOI: 10.15688/NBIT.JVOLSU.2018.1.2
V. Baranov, Mikhail Kotsynyak, Denis Ivanov
{"title":"The Technique of Forecasting the Structure of Targeted Cyber Attack on Information Telecommunication Networks","authors":"V. Baranov, Mikhail Kotsynyak, Denis Ivanov","doi":"10.15688/NBIT.JVOLSU.2018.1.2","DOIUrl":"https://doi.org/10.15688/NBIT.JVOLSU.2018.1.2","url":null,"abstract":"The main trend in recent years is the shift of emphasis from mass attacks to targeted (target) attacks, which are the actions of the enemy of a particular state or non-state structure in advance. The target attack is always built under the object of influence, being a thoughtful operation, not a simple technical action. Target cyber attack on the element of information and telecommunication network is implemented in the form of a set of activities aimed at studying the information system and software. This allows for revealing weaknesses in the structure of the information and telecommunication network. The authors develop the technique of hidden introduction and bypass of standard means of information protection, fix the infrastructure, distribute the harmful action. Under the impact of a targeted cyber attack, it is difficult to choose the methods and means of protecting the information and telecommunication network, as their resource is limited. One of the ways to resolve this contradiction is a differentiated approach to the protection of information and telecommunication network, which is to choose the most relevant for the current situation areas of protection. The article deals with the problem of targeted attacks proliferation and describes the principle of their realization. The authors also substantiate the need of working out the methodology for estimating the impact of targeted cyber attacks by the enemy on information and telecommunications networks as well as their key elements. The special attention is paid to the purpose and structure of this methodology. The authors describe the stages of targeted cyber attack and its application areas.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126781705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Development of Formal Model for Research of Information System’s Data Mining Programs 信息系统数据挖掘程序研究的形式化模型的开发
NBI Technologies Pub Date : 2018-08-01 DOI: 10.15688/NBIT.JVOLSU.2018.1.7
A. Nikishova, S. Mikhalchenko
{"title":"The Development of Formal Model for Research of Information System’s Data Mining Programs","authors":"A. Nikishova, S. Mikhalchenko","doi":"10.15688/NBIT.JVOLSU.2018.1.7","DOIUrl":"https://doi.org/10.15688/NBIT.JVOLSU.2018.1.7","url":null,"abstract":"According to statistics, the number of samples of new attacks against information systems is increasing due to inability to detect new patterns and the lack of modern attack detection systems. To resolve this issue, we implement intelligent data analysis to detect attacks. There are many data mining programs, so it is important to choose the best program. The authors investigate the problem of information security from the viewpoint of new attacks, the programs for mining of information system’s events. The criteria for their evaluation have been formulated. Besides, the formal model for the study of programs for mining of information system’s events has been developed. The proposed formal model will help to choose the best program for event mining. If the requirements for the analyzed programs change, then changing the values in the best vector can also become a right solution. Thus, the developed formal evaluation model is universal and effective.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115703309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Analysis of Technologies Protecting from Web Browsers Identification 网络浏览器识别防护技术分析
NBI Technologies Pub Date : 2018-08-01 DOI: 10.15688/nbit.jvolsu.2018.1.6
V. Moskovchenko, Danil Stolyarov, A. Gorbunov, V. Belyanin
{"title":"The Analysis of Technologies Protecting from Web Browsers Identification","authors":"V. Moskovchenko, Danil Stolyarov, A. Gorbunov, V. Belyanin","doi":"10.15688/nbit.jvolsu.2018.1.6","DOIUrl":"https://doi.org/10.15688/nbit.jvolsu.2018.1.6","url":null,"abstract":"In the age of information technology, it is becoming increasingly difficult to maintain privacy. Sometimes anonymity on the Internet helps to protect everyone’s right. Anonymity on the Internet also helps to protect against possible illegal actions of third parties. There is a number of technologies that you can use to monitor site user activity. These include technologies such as cookies and fingerprints. Today, cookies technology is an important component of most operations on the Internet. This technology is considered to be one of the main tools that Internet resource owners use to track customers. However, this technique is gradually becoming obsolete and often does not give the desired effect. Fingerprint technology is a global identifier. Browser typos make its owner more recognizable not only on frequently visited Internet resources, but also in other electronic sources. Fingerprints capture the holistic picture that a resource receives from a web browser. This allows you to identify the client even if you make changes to your browser settings. This article deals with the problem of anonymity preservation in a network. The authors describe the main technologies for tracking the users’ website activity, the principles of their work, and the protection methods against these technologies. The advantages and disadvantages of the cookies and fingerprint technologies have also been determined.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116711220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advantages of Using IPv6 for the Internet of Things from the Viewpoint of Information Security 从信息安全的角度看物联网使用IPv6的优势
NBI Technologies Pub Date : 2018-08-01 DOI: 10.15688/NBIT.JVOLSU.2018.1.3
A. Vlasenko, A. Musienko
{"title":"Advantages of Using IPv6 for the Internet of Things from the Viewpoint of Information Security","authors":"A. Vlasenko, A. Musienko","doi":"10.15688/NBIT.JVOLSU.2018.1.3","DOIUrl":"https://doi.org/10.15688/NBIT.JVOLSU.2018.1.3","url":null,"abstract":"The Internet of Things is a concept of a computer network of physical objects (“things”) equipped with built-in technologies for interaction with each other or with the external environment, considering the organization of such networks as a phenomenon capable of restructuring economic and social processes, excluding the need for human actions and operations. The Internet of things consists of loosely connected disparate networks, each of which is deployed to solve specific tasks. For example, in modern cars there are multiple networks for controling the operation of the engine and other systems, for supporting third communications, etc. The offices and residential buildings are also equipped with many networks for controlling heating, ventilation, air-conditioning, telephone, security, lighting. As the Internet of things evolves, these and many other networks will be connected to each other and gain a higher level of security. As a result, the Internet of things will gain even more opportunities to open up new, broader perspectives for humanity. This article is devoted to the popular concept the Internet of things. The author analyzes the opportunities, as well as vulnerabilities of this phenomenon. It has benn suggested that the use of Internet Protocol of version 6 will solve many problems of this concept including those related to security.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"45 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125693146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Model of Information Security Threat Profile of Corporate Information System 企业信息系统信息安全威胁概况模型
NBI Technologies Pub Date : 2018-08-01 DOI: 10.15688/NBIT.JVOLSU.2018.1.1
A. Babenko, S. Kozunova
{"title":"The Model of Information Security Threat Profile of Corporate Information System","authors":"A. Babenko, S. Kozunova","doi":"10.15688/NBIT.JVOLSU.2018.1.1","DOIUrl":"https://doi.org/10.15688/NBIT.JVOLSU.2018.1.1","url":null,"abstract":"The level of information security of corporate information systems depends on the security of information assets of the enterprise in which the enterprise information systems are implemented. To protect data processed in corporate information systems, it is advisable to ensure the information security of the system, to identify and predict threats to information security violations. Such measures will ensure effective management of information security and high-quality response to threats in corporate information systems in real time. Thus, the research of threats management and information security of corporate information systems allows the authors to develop a model of threat profile. The difference from the previously proposed models is that the present solution defines the actions that need to be taken when threats are detected and to prevent them. Application of the proposed model will allow implementing special procedures of information security management of the enterprise, using private information security policies for corporate information systems. The authors highlight the key aspects of managing threats to information security of corporate information systems. The vulnerabilities typical for corporate information systems have been allocated. The sources of threats have been formed, and the potential violators have been described. A unique model of the profile of threats to information security for corporate information system has been developed.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130038581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Aspects of Analyzing the Security and Vulnerabilities of Mobile Applications 移动应用安全漏洞分析的几个方面
NBI Technologies Pub Date : 2018-08-01 DOI: 10.15688/NBIT.JVOLSU.2018.1.5
A. Makaryan, M. Karmanov
{"title":"Aspects of Analyzing the Security and Vulnerabilities of Mobile Applications","authors":"A. Makaryan, M. Karmanov","doi":"10.15688/NBIT.JVOLSU.2018.1.5","DOIUrl":"https://doi.org/10.15688/NBIT.JVOLSU.2018.1.5","url":null,"abstract":"The given article deals with the variants of mobile applications’ local data protection on devices with operation systems Android and iOS. The following programs have been investigated: messengers WhatsApp, Viber, Telegram, WeChat, Signal. The conducted analysis let define and classify the programs for protection mechanisms, the types of stored data, the required tools and technologies, as well as the techniques for improving the protection of the stored local data. As it turned out in the course of this research work, locally stored software data on the device is not given enough attention in terms of protection, as in some cases, this protection is based solely on the mechanisms of the operating system of the device. For more reliable protection of locally stored data of the application it is necessary to implement the following approaches in the application: encryption of both the database in full and some critical data in it separately by an additional layer of encryption; encryption of files that appear during the program execution (media files, for example); coding and representation of data in a program using proprietary algorithms; the use of confusing names of critical files and data (the key file should not be called “key”, as in the case of WhatsApp), and data traps; the encoding of the configuration files containing sensitive information to ensure the security of the data; making the functionality of the kernel cryptographic transformations in a separate plug-in library in order to make the study of the decompiled source code on the subject of these reforms meaningless.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125431641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Counteraction to Unauthorized Flights of Unmanned Aerial Vehicles 对未经授权飞行的无人机的反击
NBI Technologies Pub Date : 2018-08-01 DOI: 10.15688/NBIT.JVOLSU.2018.1.8
B. Shvyrev, D. Pogorelov, Mariya Berdnik
{"title":"Counteraction to Unauthorized Flights of Unmanned Aerial Vehicles","authors":"B. Shvyrev, D. Pogorelov, Mariya Berdnik","doi":"10.15688/NBIT.JVOLSU.2018.1.8","DOIUrl":"https://doi.org/10.15688/NBIT.JVOLSU.2018.1.8","url":null,"abstract":"The development of wireless technologies has formed a significant cluster of devices that both improve the quality of life and bring a variety of difficulties associated with the control of these devices by unknown persons or organizations in order to obtain any of their own or third-party benefits. Such negative embodiments of wireless technologies include wireless means of coverting audio and video capture, wireless aircraft-copters and gliders which can gain impressive speed, etc. Aircraft is an object involved in the covert removal of information, and can be used by criminals for the delivery of certain goods, substances illegal trafficking of which is punishable by Russian legislation. Countering new modern threats to information security is an important and urgent task. Permitted radio frequency ranges are used to detect a channel for information leakage and to control unmanned aerial vehicles that violate the rights of citizens. The article presents the comparative analysis of wireless technologies at a frequency of 2.4 GHz. The authors suggest program measures of counteraction to uncontrolled flights of unmanned aerial vehicles.","PeriodicalId":205855,"journal":{"name":"NBI Technologies","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131850873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信