Voprosy kiberbezopasnosti最新文献

筛选
英文 中文
Model of Automated Information System Operation in Cyberspace 网络空间信息系统自动化运行模式
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-6-69-78
R. Zakharchenko, I. Korolev
{"title":"Model of Automated Information System Operation in Cyberspace","authors":"R. Zakharchenko, I. Korolev","doi":"10.21681/2311-3456-2019-6-69-78","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-6-69-78","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114660482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Increasing Cyber Resilience of SCADA and WAMS in the Event of Cyber Attacks on the Information and Communication Subsystem of the Electric Power System 提高SCADA和WAMS在电力系统信息通信子系统遭受网络攻击时的网络弹性
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-2-18-26
L. Gurina
{"title":"Increasing Cyber Resilience of SCADA and WAMS in the Event of Cyber Attacks on the Information and Communication Subsystem of the Electric Power System","authors":"L. Gurina","doi":"10.21681/2311-3456-2022-2-18-26","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-2-18-26","url":null,"abstract":"Research objective: development of measures to ensure cyber resilience of SCADA and WAMS under realized threats, the consequence of which is a decrease in the quality of information required in the control of the electric power system (EPS). Research methods: probabilistic methods, methods of power system reliability analysis, Markov methods. Research result. A comparative analysis of possible states of information collection, transmission, and processing systems (SCADA, WAMS) during cyberattacks on the information and communication system was carried out. SCADA and WAMS cyber resilience models were developed. On the basis of the models proposed, measures to ensure cyber resilience of information collection, transmission, and processing system were put forward. Keywords: cyber-physical power system; resilience; information collection, processing, and transmission system; false data injection attack; DoS-attack; state estimation.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125400431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Visual Analytics for Information Security: Areas of Application, Tasks, Visualization Models 信息安全的可视化分析:应用领域,任务,可视化模型
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-4-2-15
Igor Kotenko, Maxim Kolomeec, K. Zhernova, A. Chechulin
{"title":"Visual Analytics for Information Security: Areas of Application, Tasks, Visualization Models","authors":"Igor Kotenko, Maxim Kolomeec, K. Zhernova, A. Chechulin","doi":"10.21681/2311-3456-2021-4-2-15","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-4-2-15","url":null,"abstract":"The purpose of the article: to identify and systematize the areas and problems of information security that are solved using visual analytics methods, as well as analysis of the applied data visualization models and their properties that affect the perception of data by the operator. Research method: a systematic analysis of the application of visual analytics methods for solving information security problems. Analysis of relevant papers in the field of information security and data visualization. The objects of research are: theoretical and practical solutions to information security problems through visual analysis. Visual analytics in the article is considered from several sides: from the point of view of the areas of application of visual analysis methods in information security, from the point of view of the tasks solved by the security analyst, from the point of view of the visualization models used and the data structures used, as well as from the point of view of the properties of data visualization models. The result: classification of visualization models is proposed, which differs from analogs in that it is based on the analysis of areas and tasks of information security and comparison of visualization models to them. The scope of the proposed approach is the creation of visualization models that can be used to increase the efficiency of operator interaction with information security applications. The proposed article will be useful both for specialists who develop information security systems and for students studying in the direction of training “Information Security”.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122567367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INFORMATION PROTECTION FROM LEAKAGE THROUGH TECHNICAL CHANNELS ON THE BASIS OF ADAPTIVE MULTIAGENT SECURITY SYSTEM AT THE INFORMATIZATION OBJECT 基于自适应多智能体安全系统的信息化对象信息泄漏技术保护
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-5-2-13
Yury Yazov, A. Avsentiev
{"title":"INFORMATION PROTECTION FROM LEAKAGE THROUGH TECHNICAL CHANNELS ON THE BASIS OF ADAPTIVE MULTIAGENT SECURITY SYSTEM AT THE INFORMATIZATION OBJECT","authors":"Yury Yazov, A. Avsentiev","doi":"10.21681/2311-3456-2022-5-2-13","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-5-2-13","url":null,"abstract":"Purpose: to show the creation and consideration perspective of the ways to build a multi-agent information security system at an informatization object with the implementation of a decentralized and mixed (centralizeddecentralized) principle of its design and functioning in order to exclude the extraction of various types of information, data about the characteristics of the informatization object and relationships between its structural elements. Method: the method of functional and structural analysis of technical channels of leaking information circulating in the form of speech information at the informatization objects of the internal affairs bodies in the course of their daily activities or during official activities, as well as ways to build an information security system from leakage through technical channels is applied. Result: the factors determined are those that are necessary to be taken into account when substantiating the composition and functions of agents of a multi-agent information security system, depending on the conditions characterizing the dynamics of the intruder’s actions to obtain protected information, the dynamics of the application of measures and means of protection. It is shown that a multi-agent protection system composition can include two classes of agents - simple and intelligent, and the system itself must be a multilayer structure, each layer of which is tied to a certain type of technical information leakage channels, and contain one or more agents (meta-agents), which provide solution of decision support tasks for information protection in each layer and in the security system as a whole and control of other agents. Examples of the composition and structure of a multi-agent system for protecting against leakage through technical channels, as well as examples of the structure of a simple and intelligent agent for such a system are given. The scientific novelty of the article is in the fact that the idea of creating a multi-agent system is considered for the first time in relation to solving the problem of protecting information from leakage through technical channels, the composition, structure and functions of such systems are determined, as well as the directions for the development of methodological support for their creation and operation.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"154 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123502606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Assessment of Cyber Resilience of Operational Dispatch Control System of EPS EPS作战调度控制系统网络弹性评估
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-3-23-31
L. Gurina
{"title":"Assessment of Cyber Resilience of Operational Dispatch Control System of EPS","authors":"L. Gurina","doi":"10.21681/2311-3456-2022-3-23-31","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-3-23-31","url":null,"abstract":"The research objective is to develop an algorithm for assessing the cyber resilience of the operational dispatch control (ODC) system of electric power system (EPS) during cyberattacks on data collecting, processing, and transmitting systems. The research methods include the probabilistic methods, fuzzy set theory methods, and methods of EPS reliability analysis. Result of the research: the impact of cyberattacks on the functionality of the EPS ODC system is analyzed. The factors ensuring the cyber resilience of the EPS ODC system in the case of materialization of cyber threats are identified. A model of cyber resilience of the EPS ODC system is proposed. An algorithm for assessing the cyber resilience of the EPS ODC system is developed factoring in the cybersecurity risks.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114749315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Penetration Testing in Accordance with NIST SP 800-115 Standard 按照NIST SP 800-115标准进行渗透测试
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-3-44-57
S. Makarenko
{"title":"Penetration Testing in Accordance with NIST SP 800-115 Standard","authors":"S. Makarenko","doi":"10.21681/2311-3456-2022-3-44-57","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-3-44-57","url":null,"abstract":"Relevance. Security issues of information systems in critical infrastructure objects become important now. However, current tasks of information security audit of critical infrastructure objects are mainly limited to checking them for compliance with requirements of standards and documents. With this approach to the audit, security of these objects from real attacks by hackers remains unclear. Therefore, objects are subjected to a testing procedure, namely, penetration testing, in order to objectively verify their security. For example, there are instructions of the Bank of Russia to carry out such testing when the information security of banking systems are checked. However, there is no formal national standard for conducting penetration testing in Russia. This is the deterrent factor to testing critical infrastructure objects. The goal of the paper is to analysis of the American testing standard – NIST SP 800-115 to estimate the possibility of its used for development of the Russian national penetration testing standard. Research methods. Methods of analysis and decomposition from the theory of system analysis are used in the paper to achieve the research goal. Results. In-depth analysis of the NIST SP 800-115 standard is provided in the paper. The following are considered: types of information security assessment measures; stages of information security assessment; methods of analysis and testing which used in the assessment of information security; types and sequence of penetration testing; tested vulnerabilities; recommended tools for analysis and testing, are presented in NIST SP 800-11. Conclusions about the strengths and weaknesses of the NIST SP 800-115 standard are made. Recommendations about as NIST SP 800-115 is used in the development of the national Russian standard of penetration testing are presented.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"66 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128024369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Fraudal Schemes When Publicating Articles in Scientific Journals 在科技期刊上发表文章时的欺诈行为分析
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-5-12-18
Y. Lavrich, Alexey Los
{"title":"Analysis of Fraudal Schemes When Publicating Articles in Scientific Journals","authors":"Y. Lavrich, Alexey Los","doi":"10.21681/2311-3456-2019-5-12-18","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-5-12-18","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132487178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ensuring the Resistance of Critical Information Infrastructure Objects to Advanced Persistent Threats 确保关键信息基础设施对象抵御高级持续性威胁
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-2-39-51
A. Lapsar’, Sergey Nazaryan, Alisa Vladimirova
{"title":"Ensuring the Resistance of Critical Information Infrastructure Objects to Advanced Persistent Threats","authors":"A. Lapsar’, Sergey Nazaryan, Alisa Vladimirova","doi":"10.21681/2311-3456-2022-2-39-51","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-2-39-51","url":null,"abstract":"The purpose of the study: to improve security of significant objects of critical information infrastructure in conditions of destructive information impact, implemented in the form of advanced persistent threat (APT). Methods: comparative analysis of destructive information impact within the framework of a systematic approach; Markov theory of evolutionary processes; synergetics. Results: the authors carried out analysis of APT properties and their impact on objects of critical information infrastructure. To identify APTs, the use of a combination of various detection methods with the priority of heuristic analysis is substantiated. A scheme has been developed for the implementation of the method for assessing the state of an object of a critical information infrastructure based on a modified Markov-parametric model with a system for detecting computer attacks integrated into its structure. The preliminary assessment of computer attacks danger level as well as development of recommendations for their neutralization simultaneously with conducting the assessment of the properties and characteristics of destructive information impact are proposed.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134408396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Toward to Information Security of AI-Enhanced Weapons 人工智能增强型武器信息安全研究
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-5-5-11
V. Gribunin, S. Kondakov
{"title":"Toward to Information Security of AI-Enhanced Weapons","authors":"V. Gribunin, S. Kondakov","doi":"10.21681/2311-3456-2021-5-5-11","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-5-5-11","url":null,"abstract":"Purpose of the article: Analysis of intellectualized weapons using machine learning from the point of view of information security. Development of proposals for the deployment of work in the field of information security in similar products. Research method: System analysis of machine learning systems as objects of protection. Determination on the basis of the analysis of rational priority directions for improving these systems in terms of ensuring information security. Obtained result: New threats to information security arising from the use of weapons and military equipment with elements of artificial intelligence are presented. Machine learning systems are considered by the authors as an object of protection, which made it possible to determine the protected assets of such systems, their vulnerabilities, threats and possible attacks on them. The article analyzes the measures to neutralize the identified threats based on the taxonomy proposed by the US National Institute of Standards and Technology. The insufficiency of the existing regulatory methodological framework in the field of information protection to ensure the security of machine learning systems has been determined. An approach is proposed that should be used in the development and security assessment of systems using machine learning. Proposals for the deployment of work in the field of ensuring the security of intelligent weapons using machine learning technologies are presented.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134594739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CELLULAR AUTOMATA AND THEIR GENERALIZATIONS IN CRYPTOGRAPHY. PART 2. 元胞自动机及其在密码学中的推广。第2部分。
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-1-37-48
P. Klyucharev
{"title":"CELLULAR AUTOMATA AND THEIR GENERALIZATIONS IN CRYPTOGRAPHY. PART 2.","authors":"P. Klyucharev","doi":"10.21681/2311-3456-2022-1-37-48","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-1-37-48","url":null,"abstract":"The purpose of the article is an analytical review of the application of cellular automata and their generalizations in cryptography. Research method: an analysis of scientific publications on the topic of the article. Results: The review article analyzes the literature devoted to the use of cellular automata and their generalizations for the construction of cryptographic algorithms. The article consists of two parts. The first part was devoted to classical cellular automata and symmetric cryptographic algorithms based on them. It briefly discussed the history of the theory of cellular automata and its application in various scientific fields. A review of the works of a number of authors who proposed symmetric cryptographic algorithms and pseudorandom sequence generators based on one-dimensional cellular automata was presented. The security of such cryptographic algorithms turned out to be insufficient. The following was a review of articles devoted to the use of two-dimensional cellular automata for constructing ciphers (this approach gave the best results). Multidimensional cellular automata were also mentioned. This second part of the article is devoted to a review of works devoted to the use of generalized cellular automata in cryptography – on the basis of such automata, it is possible to create symmetric encryption algorithms and cryptographic hash functions that provide a high level of security and high performance in hardware implementation (for example, on FPGA), as well as having fairly low requirements for hardware resources. In addition, an attention is paid to interesting connections of generalized cellular automata, in the context of their use in cryptography, with the theory of expander graphs. Attention is also paid to the security of cryptographic algorithms based on generalized cellular automata. The works devoted to the implementation of various cryptographic algorithms based on generalized cellular automata on FPGA and GPU are mentioned. In addition, an overview of asymmetric cryptoalgorithms based on cellular automata is given. The questions about the belonging of some problems on cellular automata and their generalizations to the class of NP-complete problems, as well as to some other complexity classes, are also considered.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133546554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信