Voprosy kiberbezopasnosti最新文献

筛选
英文 中文
Model of the Process of Conducting Computer Attacks Using Special Information Influences 利用特殊信息影响进行计算机攻击的过程模型
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-5-12-20
S. Kondakov, Ilya Rud
{"title":"Model of the Process of Conducting Computer Attacks Using Special Information Influences","authors":"S. Kondakov, Ilya Rud","doi":"10.21681/2311-3456-2021-5-12-20","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-5-12-20","url":null,"abstract":"Purpose of work: development of a model of the process of conducting a computer attack. Research method: theory of complex systems, comparative analysis within the framework of system analysis and synthesis. Result: it is shown that the application of the proposed model of the process of conducting computer attacks allows you to fully describe the process, taking into account its inherent features and characteristics. The use in the model of information from the MITRE ATTACK database of Mitre, which contains a description of the tactics, techniques and methods used by cybercriminals, allows you to reduce the level of abstraction and describe specific scenarios for conducting complex targeted computer attacks with the maximum approximation to practice. The developed model is supposed to be used to form scenarios of computer attacks when assessing the security of information systems.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128127755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Main Cryptographic Mechanisms for Protection of Data, Transmitted to Cloud Services and Storage Area Networks 保护传输到云服务和存储区域网络的数据的主要加密机制
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2020-03-66-75
S. Minakov
{"title":"The Main Cryptographic Mechanisms for Protection of Data, Transmitted to Cloud Services and Storage Area Networks","authors":"S. Minakov","doi":"10.21681/2311-3456-2020-03-66-75","DOIUrl":"https://doi.org/10.21681/2311-3456-2020-03-66-75","url":null,"abstract":". The purpose: development of the technology of cryptographic protection of information in third-party cloud services or storage area networks by using standartizated interfaces, protocols and block ciphers algorithms. Method: system analysis of degradation security information level by data recycling with cloud computing. Research and analysis a science papers of cryptology theory and practice, describe limitations of homomorphic encryption. Cryptosystem synthesis is with analogy methods, hash and block ciphers algorithms. The result : new cryptographic system «Utro» (Eng. – Morrow) for real-time protection of confidential data, transmitted to third-party cloud services or storage area networks. The paper is described main cryptographic mechanisms like","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125753313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RECOGNITION OF CYBER THREATS ON THE ADAPTIVE NETWORK TOPOLOGY OF LARGE-SCALE SYSTEMS BASED ON A RECURRENT NEURAL NETWORK 基于递归神经网络的大规模系统自适应网络拓扑网络威胁识别
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-6-93-99
E. Pavlenko, Nikita Gololobov, D. Lavrova, Andrey Kozachok
{"title":"RECOGNITION OF CYBER THREATS ON THE ADAPTIVE NETWORK TOPOLOGY OF LARGE-SCALE SYSTEMS BASED ON A RECURRENT NEURAL NETWORK","authors":"E. Pavlenko, Nikita Gololobov, D. Lavrova, Andrey Kozachok","doi":"10.21681/2311-3456-2022-6-93-99","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-6-93-99","url":null,"abstract":"The purpose of the article: the development of a method for recognizing cyber threats in adaptive network topologies of large-scale systems based on a recurrent neural network with a long short-term memory. Main research methods: system analysis of existing recognition methods, theoretical formalization, experiment Result: The approach showed a satisfactory efficiency of cyber threat recognition, and the results of the research made it possible to put forward proposals for the further development of this area. Scientific novelty: A model of adaptive network topology is formulated and a new way of recognizing cyber threats on the adaptive network topology of large-scale systems is proposed.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121531468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RESEARCH OF METHODS FOR MONITORING THE LEVEL OF INFORMATION SECURITY AT CRITICAL INFORMATION INFRASTRUCTURE FACILITIES 关键信息基础设施信息安全水平监测方法研究
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-6-40-52
I. Livshitz, Andrew Baksheev
{"title":"RESEARCH OF METHODS FOR MONITORING THE LEVEL OF INFORMATION SECURITY AT CRITICAL INFORMATION INFRASTRUCTURE FACILITIES","authors":"I. Livshitz, Andrew Baksheev","doi":"10.21681/2311-3456-2022-6-40-52","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-6-40-52","url":null,"abstract":"Purpose of work is to analyze the existing practices of performing security analysis and IT-security audit (NIST, OWASP, Cobit, OSSTMM, PTES and GOST R ISO/IEC), used to obtain objective and reliable data for operational security assessments of the CII objects and development of an IT-security audit model for CII objects. Research method: methods of analysis and structural decomposition from the theory of system analysis, identifying signs essential for optimizing the process of IT-security audit for CII objects. Research result: include the detailed analysis and comparison of the existing best practices for performing security analysis and IT-security audit (NIST, OWASP, Cobit, OSSTMM, PTES and GOST R ISO/IEC) for CII objects. A model of IT-security audit for CII objects has been developed. Scientific novelty: an IT-security audit model for CII facilities, characterized by the possibility of a “dual” mode for a full cycle of ensuring the safety of CII facilities – a full national conditional mode and a combined conditional mode, which allows, if necessary, to include additional functional blocks","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133994106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of a Research Apparatus for Assessing the Effectiveness of Measures to Ensure the Protection of Personal Data 发展一套研究仪器,以评估保障个人资料的措施的成效
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-5-45-51
S. Kondakov, Kirill Chudin
{"title":"Development of a Research Apparatus for Assessing the Effectiveness of Measures to Ensure the Protection of Personal Data","authors":"S. Kondakov, Kirill Chudin","doi":"10.21681/2311-3456-2021-5-45-51","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-5-45-51","url":null,"abstract":"The purpose of the article: to investigate the prerequisites for the development of a methodological apparatus for ensuring the protection of personal data in the activities of the personnel body of the state secret protection service. Research method. system analysis, synergetics. The result: the procedure for the formation of the appropriate research environment is formulated, the stages of formation of the concept of building a research apparatus for assessing the effectiveness of measures to ensure the protection of personal data in the activities of the personnel body of the state secret protection service are given. The concept of building a research apparatus for assessing the characteristics of measures to ensure the protection of personal data in the activities of the personnel body of the state secret protection service is proposed, which allows forming an environment for an adequate assessment of the effectiveness of such measures, as well as determining a set of hypotheses and analogies necessary for setting and solving the problem of increasing the adequacy of assessing the effectiveness of measures to ensure the protection of personal data in the activities of the personnel body of the state secret protection service as a task of developing mathematical models of the characteristics of threats to the security of personal data and the processes of their protection.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134188590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SELECTING THE MOST DANGEROUS VULNERABILITIES FOR PROSPECTIVE INFORMATION SYSTEMS FOR CRITICAL APPLICATIONS 为关键应用的潜在信息系统选择最危险的漏洞
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-1-66-75
Vitaliy Gryzunov, Anna Grishecko, Dmitriy Sipovich
{"title":"SELECTING THE MOST DANGEROUS VULNERABILITIES FOR PROSPECTIVE INFORMATION SYSTEMS FOR CRITICAL APPLICATIONS","authors":"Vitaliy Gryzunov, Anna Grishecko, Dmitriy Sipovich","doi":"10.21681/2311-3456-2022-1-66-75","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-1-66-75","url":null,"abstract":"Abstract The development of information systems of critical application is ahead of changes in regulatory documents of regulators and educational programs of universities. Purpose of work: to determine the most dangerous vulnerabilities for promising information systems of critical application (IS CA). Research method: application of the analysis hierarcihes method to compile a hierarchy of alternatives, including the type of platform for a promising IS CA, aspects of information security, types of vulnerabilities. Conducting a survey of experts using a point assessment. Converting results to a matrix of pairwise comparisons. Getting local and global priorities of alternatives. Result of the study: 25 experts of different ages and with different work experience were interviewed. From the point of view of the interviewed specialists, the best type of platform for a prospective distributed information system of critical application is edge computing. Availability, authenticity and integrity are highlighted as the most important aspects of information security. The most dangerous are the vulnerabilities associated with: 1) incomplete verification of input (input) data, buffer overflow, the possibility of injections, injection of arbitrary code, cross-site scripting, injection of operating system commands, etc.; 2) identification, authentication, granting access and privilege escalation; 3) incorrect configuration of software parameters, management of system resources, access to service information. Less dangerous are vulnerabilities that use the health of hardware and reduce its resistance to the actions of technical means of reconnaissance and electronic warfare. The results can be used to prioritize the procurement of information security products, to update the regulatory framework of regulators and training programs for training information security specialists.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132940818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Assessment of the Risk of a Cybersecurity Breach in a Commercial Bank (by the Example of an Attacks “Brute Force” and “Black Box” on ATMS) 商业银行网络安全漏洞风险评估(以自动柜员机“暴力破解”和“黑盒”攻击为例)
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-3-20-30
P. Revenkov, A. Berdyugin, P. Makeev
{"title":"Assessment of the Risk of a Cybersecurity Breach in a Commercial Bank (by the Example of an Attacks “Brute Force” and “Black Box” on ATMS)","authors":"P. Revenkov, A. Berdyugin, P. Makeev","doi":"10.21681/2311-3456-2021-3-20-30","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-3-20-30","url":null,"abstract":"Abstract. During the XX–XXI century there was a development of technologies, which resulted in the creation of a global financial system that allows you to quickly make money transactions in opposite points of the Earth. The progress of digital transformation of society and, in particular, financial and economic systems leads to the complication of the problems of information security of competing entities. By focusing on scientific research, we can achieve success in these areas. The purpose of the study: to increase the level of security of banking services for individuals and legal entities in accordance with the recommendations of information security standards by analyzing the risk of information security violations in electronic banking technologies (on the example of the “Brute force” and “Black box” attacks). Research methods: empirical methods of scientific knowledge (observation, measurement, experiment), theoretical methods (analysis, synthesis, induction, deduction, abstraction, formalization), graphical interpretation of information, probability theory methods and computer programming. The result of the study: standards for effective management of information security management at the enterprise are considered. The advantage of social engineering methods over the “Brute force” method of PIN codes is shown quantitatively. The time characteristics of its commission and protective measures against attacks of the “Black box” type are analyzed. A method for improving the effectiveness of the response and protection of ATMS from attacks of the “Black box” type is proposed.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134131597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES 物联网设备的安全和隐私测量系统
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-5-28-46
E. Fedorchenko, E. Novikova, Igor Kotenko, D. Gaifulina, O. Tushkanova, D. Levshun, A. Meleshko, I. Murenin, Maxim Kolomeec
{"title":"THE SECURITY AND PRIVACY MEASURING SYSTEM FOR THE INTERNET OF THINGS DEVICES","authors":"E. Fedorchenko, E. Novikova, Igor Kotenko, D. Gaifulina, O. Tushkanova, D. Levshun, A. Meleshko, I. Murenin, Maxim Kolomeec","doi":"10.21681/2311-3456-2022-5-28-46","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-5-28-46","url":null,"abstract":"The purpose of the article: elimination of the gap in existing need in the set of clear and objective security and privacy metrics for the IoT devices users and manufacturers and an absence of such a set incorporating the interconnected security and privacy metrics, the algorithms for their calculation and generation of the integral clear and objective score by the development of the security and privacy measuring system for the IoT devices. Research method: theoretical and system analysis for determination and classification of the security and privacy metrics, semantic analysis for generating of the semantic model of personal data processing scenarios, analytical modeling methods for generating of the attack traces, log analysis methods, statistical methods and machine learning methods for searching of the anomalies in device behavior, development of the database and software implementing the proposed security and privacy measuring system. The result obtained: the security and privacy measuring system for the IoT devices users and manufacturers is proposed. The proposed system allows automated calculation of the security and privacy metrics based on the available data on the device and generation of the integral security and privacy score. The hierarchy of security and privacy metrics is developed in the scope of the proposed system. The proposed metrics are calculated using static and dynamic data on the device and its behavior. Original algorithms for calculation of the outlined metrics are developed, including the algorithms for calculation of the integral security and privacy score. The architecture of the security measuring system is developed. It integrates the components implementing the developed algorithms for metrics calculation. The system operation is demonstrated on the case study. The area of use of the proposed approach - the developed security and privacy measuring system can be used by the IoT devices manufacturers to analyse their security and privacy, and to provide the users with simple and clear security and privacy metrics. Novelty: the hierarchy of static and dynamic security and privacy metrics for the Internet of Things is developed; the approach to security and privacy assessment for the Internet of Things on the basis of the developed metrics and available data is proposed; novel algorithms for metrics calculation are developed; novel algorithms for integral metrics calculation considering available data are developed. Contribution: Fedorchenko E. – development of the approach, metrics hierarchy, and system architecture, problem statement for the components and their development, Novikova E. – the component for calculation of privacy risks, the component for calculation of integral risk scores, Kotenko I. – project management, problem statement, system architecture, Gaifulina D. – the component for event logs processing and integration, Tushkanova O., Murenin I. – the component for calculation of the dynamic risks sco","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129604987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Way to Ensure Universal Protection of Information Transmitted via Communication Channels 确保通过通信渠道传播的信息得到普遍保护的方法
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-3-45-50
M. Ivanov
{"title":"Way to Ensure Universal Protection of Information Transmitted via Communication Channels","authors":"M. Ivanov","doi":"10.21681/2311-3456-2019-3-45-50","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-3-45-50","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133172092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research of the Passive Information Protection Device in the Acoustoelectric Leakage Channels Using Matlab Environment 基于Matlab环境的声电泄漏通道无源信息保护装置研究
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-5-75-86
A. Horev, Oksana Lukmanova, Dmitry Surovenkov
{"title":"Research of the Passive Information Protection Device in the Acoustoelectric Leakage Channels Using Matlab Environment","authors":"A. Horev, Oksana Lukmanova, Dmitry Surovenkov","doi":"10.21681/2311-3456-2021-5-75-86","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-5-75-86","url":null,"abstract":"Purpose: design of the passive device of the speech information protection from acoustoelectric leakage channels and study of the characteristics of protection device using a virtual laboratory bench developed in the Matlab environment. Methods: mathematical modeling using Matlab environment. Practical relevance: designed in the Matlab modeling environment: an equivalent circuit of the telephone set, which makes it possible to simulate acoustoelectric information leakage channels, schematic diagrams of passive protection devices for telephone sets that implement protection methods: limiting low-amplitude signals, filtering high-frequency injection signals and disabling acoustoelectric transducers, a virtual laboratory stand for research of the characteristics of protective device. Using a virtual laboratory stand, the main characteristics of the developed protection devices were studied and their performance was assessed when connected to the telephone network.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130065059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信