Voprosy kiberbezopasnosti最新文献

筛选
英文 中文
Hybrid Crypto-Code Method for Monitoring and Recovery of Data Integrity for Protected Information and Analytical Systems 受保护信息和分析系统数据完整性监测和恢复的混合密码方法
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-6-17-36
S. Dichenko, O. Finko
{"title":"Hybrid Crypto-Code Method for Monitoring and Recovery of Data Integrity for Protected Information and Analytical Systems","authors":"S. Dichenko, O. Finko","doi":"10.21681/2311-3456-2019-6-17-36","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-6-17-36","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131985716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Text Analysis Approach for Identifying Psychological Characteristics (with Aggressiveness as an Example) 心理特征识别的文本分析方法(以攻击性为例)
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-4-72-79
A. Kovalev, Julia Kuznetsova, A. Minin, M. Penkina, I. Smirnov, M. Stankevich, N. Chudova
{"title":"Text Analysis Approach for Identifying Psychological Characteristics (with Aggressiveness as an Example)","authors":"A. Kovalev, Julia Kuznetsova, A. Minin, M. Penkina, I. Smirnov, M. Stankevich, N. Chudova","doi":"10.21681/2311-3456-2019-4-72-79","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-4-72-79","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134408885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Formalization of the Problem of Creating a Data Transmission System in a Robotic System Operating in Conditions of Antagonistic Cyber-Electromagnetic Activity 在对抗网络电磁活动条件下工作的机器人系统中创建数据传输系统问题的形式化
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-6-113-122
V. Golovskoy, Y. Chernuha, D. Semenyuk
{"title":"Formalization of the Problem of Creating a Data Transmission System in a Robotic System Operating in Conditions of Antagonistic Cyber-Electromagnetic Activity","authors":"V. Golovskoy, Y. Chernuha, D. Semenyuk","doi":"10.21681/2311-3456-2019-6-113-122","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-6-113-122","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132170449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Subsystem for Prevention of Computer Attacks Against Objects of Critical Information Infrastructure: Analysis of Functioning and Implementation 关键信息基础设施对象计算机攻击防范子系统:功能与实现分析
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2023-1-13-27
Igor Kotenko, I. Saenko, R. Zakharchenko, Dmitry Velichko
{"title":"Subsystem for Prevention of Computer Attacks Against Objects of Critical Information Infrastructure: Analysis of Functioning and Implementation","authors":"Igor Kotenko, I. Saenko, R. Zakharchenko, Dmitry Velichko","doi":"10.21681/2311-3456-2023-1-13-27","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-1-13-27","url":null,"abstract":"The purpose of the article: conducting a system analysis of the requirements for the subsystem for preventing computer attacks on critical information infrastructure in order to substantiate the directions for further improved scientific and methodological apparatus for the full functioning of the subsystem for preventing computer attacks. Research method: theoretical and systematic analysis of the requirements of legal acts, scientific publications, protection technologies and means of their implementation in departmental systems for detecting and counteringcomputer attacks.The result obtained: the rationale for the need to build mechanisms for preventing computer attacks on critical information infrastructure objects and the requirements for the subsystem for preventing computer attacks was carried out, an approach was proposed to prevent computer attacks at the stages of reconnaissance by an attacker of critical information infrastructure objects, based on the introduction of a security event correlation mechanism with automatic adaptation to the analyzed information infrastructure and the functions it performs at the current time and a detailed specification of the correlation rules.Scope of the proposed approach: a subsystem for preventing computer attacks of departmental systems for detecting and countering computer attacks, which should identify and prevent attempts to conduct computer attacks on critical information infrastructure objects in advance.The scientific novelty consists in a comprehensive analysis of the need to build mechanisms for preventing computer attacks on critical information infrastructure objects, an analysis of the requirements for the computer attack prevention subsystem, its functions and means of implementation. It is shown that the functions of preventing computer attacks in domestic technical solutions are not fully implemented, and that there is a substitution of the concept of “subsystem for preventing computer attacks” by the concept of “control and technical measures”. It is substantiated that for the implementation of the functions of preventing computer attacks, there is a technological backlog in the form of a ready-made technology based on the technology for building SIEM systems. It is shown that there is a need to refine the scientific and methodological apparatus for implementing computer warning functions based on artificial intelligence methods and big data technologies.Contribution: Kotenko I.V. - analysis of the functionality of the subsystem for preventing computer attacks, setting the task and proposals for developing the functionality of the subsystem for preventing computer attacks on critical information infrastructure objects; Saenko I.B. - analysis of the subsystem for preventing computer attacks in the general context of the theory of information security, substantiation of the implementation of the functions of preventing computer attacks based on the technology of building SIEM systems a","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133946304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EVOLUTION OF CYBERSPACE MANAGEMENT SYSTEMS 网络空间管理制度的演变
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-1-76-86
P. Zakalkin
{"title":"EVOLUTION OF CYBERSPACE MANAGEMENT SYSTEMS","authors":"P. Zakalkin","doi":"10.21681/2311-3456-2022-1-76-86","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-1-76-86","url":null,"abstract":"The purpose of the study: to identify the main systems that control cyberspace and the key elements whose management will allow controlling a given segment of cyberspace. Research method: theory of complex systems; synergetic. Result: The paper considers the main control systems that play a key role in the management of cyberspace, highlights the structural elements of cyberspace and their interrelations with each other. Regional and local Internet registrars are considered, their coherence graph is presented, as well as the coherence graph by country. Based on the study, the author’s vision of the organizational structure of the cyberspace management system (in relation to domain names and IP addresses). Autonomous systems and traffic exchange points are considered, the structure of external connectivity of autonomous systems and its change over time are given on examples. The largest telecommunication alliances are presented, which have an impact on the activities of telecom operators (directly or indirectly) and, as a result, on the set of resources and services (as well as their cost) received by end users provided by telecommunication operators. Scientific novelty: the considered structure of the cyberspace management system made it possible to identify the main systems that control cyberspace and the key elements whose management will allow controlling a given segment of cyberspace.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"11 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129190205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Three-Level Parallel Programming System for the Hybrid 21-Core Scalar-Vector Microprocessor NM6408MP 混合21核标量矢量微处理器NM6408MP的三级并行编程系统
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-4-22-34
Dmitry Bikonov, A. Puzikov, A. Sivtsov, L. Eisymont
{"title":"Three-Level Parallel Programming System for the Hybrid 21-Core Scalar-Vector Microprocessor NM6408MP","authors":"Dmitry Bikonov, A. Puzikov, A. Sivtsov, L. Eisymont","doi":"10.21681/2311-3456-2019-4-22-34","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-4-22-34","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"325 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128456097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Major milestone in open source security 开源安全的重要里程碑
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2023-1-2-12
A. Markov
{"title":"Major milestone in open source security","authors":"A. Markov","doi":"10.21681/2311-3456-2023-1-2-12","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-1-2-12","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116661658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-Healing Cloud Computing 自修复云计算
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-1-80-89
S. Petrenko
{"title":"Self-Healing Cloud Computing","authors":"S. Petrenko","doi":"10.21681/2311-3456-2021-1-80-89","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-1-80-89","url":null,"abstract":"Purpose of the article: development of tools for building a cyber-stable private cloud. The relevance of building a cyber-resilient private cloud is confirmed by the dynamics of growth in the market volume of relevant solutions. According to PRnewswire, the market for private cloud solutions will reach 183 billion USD by 2025. At the same time, the average annual growth rate of the CAGR will be 29.4% during the forecast period. According to the analytical company Grand view research, the global market for private cloud solutions in 2018 was estimated at 30.24 billion US dollars, and it is expected that in the period from 2019 to 2025, the CAGR will be 29.6%. Research methods: It uses a set of open-source solutions that applies the advanced cloud technologies, including distributed data processing models and methods, container orchestration technologies, softwaredefined data storage architecture, and a universal database. Results: Developed tools for building a cyber-stable private cloud. Considered a possible approach to building a cyber-resilient private cloud based on the well-known and proprietary models and methods of the artificial immune systems (AIS), as well as technologies for distributed data processing, container orchestration, and others. In addition, the unique centralized fault-tolerant logging and monitoring subsystem has been developed for the described platform, as well as an innovative cybersecurity subsystem based on the following original technologies.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126886244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Metagrammatic Approach to the Analysis of Hierarchies for Synthesis of Security Systems nuclear Power Plants 核电厂安全系统综合层次分析的元元方法
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2023-1-82-92
O. Atakishchev, V. Gribunin, Igor Borisenkov, Mikhail Lysachev
{"title":"Metagrammatic Approach to the Analysis of Hierarchies for Synthesis of Security Systems nuclear Power Plants","authors":"O. Atakishchev, V. Gribunin, Igor Borisenkov, Mikhail Lysachev","doi":"10.21681/2311-3456-2023-1-82-92","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-1-82-92","url":null,"abstract":"The purpose of the work is to analyze the features of the application of the integrated metagrammar approach of hierarchy analysis to solve the problem of structural-parametric synthesis of information security systems of automated control systems of low-power nuclear power plants.Research method: in order to achieve the goal of the work, the metagrammar approach of hierarchy analysis was used, which is an integration of the metagrammar approach and the Saati hierarchy analysis method.The result of the research: the metagrammar approach of hierarchy analysis is presented in the paper, the features of its application to solve the problem of structural-parametric synthesis of information security systems of automated control systems of low-power nuclear power plants are considered in detail.The scientific novelty lies in the development and analysis of the scientific and applied features of a new integrated metagrammar approach to hierarchy analysis, which allows the synthesis of complex structured information security systems in conditions of partial uncertainty.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"31 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120984522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile banking: Information Security Risk Assessment 手机银行:信息安全风险评估
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-2-21-28
P. Revenkov, Dmitry Krupenko
{"title":"Mobile banking: Information Security Risk Assessment","authors":"P. Revenkov, Dmitry Krupenko","doi":"10.21681/2311-3456-2019-2-21-28","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-2-21-28","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128012346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信