Voprosy kiberbezopasnosti最新文献

筛选
英文 中文
Developing a High-Performance OS Kernel Safe in Terms of Working with Memory 基于内存的高性能操作系统内核安全开发
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-3-51-56
Timofey Komarov, Nadezhda Chepik, M. Ivanov
{"title":"Developing a High-Performance OS Kernel Safe in Terms of Working with Memory","authors":"Timofey Komarov, Nadezhda Chepik, M. Ivanov","doi":"10.21681/2311-3456-2019-3-51-56","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-3-51-56","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127519974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Model for Building Competencies of a Computer Crime Investigator 建立计算机犯罪调查员能力的模型
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-3-57-62
D. Chukova, Dmitry A. Medvedev, M. Litvinenko
{"title":"Model for Building Competencies of a Computer Crime Investigator","authors":"D. Chukova, Dmitry A. Medvedev, M. Litvinenko","doi":"10.21681/2311-3456-2019-3-57-62","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-3-57-62","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"143 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114017731","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Innovative Development of Tools and Technologies to Ensure the Russian Information Security and Core Protective Guidelines 工具和技术的创新发展,以确保俄罗斯信息安全和核心保护准则
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-1-10-17
Roman V. Maximov, A. Krupenin, Sergey Sharifullin, S. Sokolovsky
{"title":"Innovative Development of Tools and Technologies to Ensure the Russian Information Security and Core Protective Guidelines","authors":"Roman V. Maximov, A. Krupenin, Sergey Sharifullin, S. Sokolovsky","doi":"10.21681/2311-3456-2019-1-10-17","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-1-10-17","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114785902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Logical-Linguistic Mechanism of Formation of “Paper” Bullets in the Information confrontation 信息对抗中“纸”子弹形成的逻辑-语言机制
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2023-1-93-99
S. Kapitsyn, Konstantin Ryumshin, V. Varenitsa
{"title":"Logical-Linguistic Mechanism of Formation of “Paper” Bullets in the Information confrontation","authors":"S. Kapitsyn, Konstantin Ryumshin, V. Varenitsa","doi":"10.21681/2311-3456-2023-1-93-99","DOIUrl":"https://doi.org/10.21681/2311-3456-2023-1-93-99","url":null,"abstract":"Purpose of the work consists in the analysis of approaches to the representation of the integrity of the seman- tics of knowledge of the information need of the target object of influence and the development of a logical-linguis- tic method for the formation of “paper” bullets based on phrase-structural grammar.Research method: the mechanism of the formation of «paper» bullets in the form of semantic-syntactic con- structions and a set of required semantic conclusions (inferences, the basis for the formation of a model of social behavior of the «defeated») of the target object of influence in the form of logical-linguistic models are illustrated. Research results: the technology of presenting logical-linguistic models (semantic-syntactic constructions) of «paper» bullets can be used in the development of the foundations of information weapons (information and recon- naissance strike systems) for selective impact on an object and a guaranteed change in its information needs in the interests of covert formation the required model of social behavior (the model of social behavior of the «van- quished»). Scientific novelty: representation of the integrity of the meaning of the required information needs in the form of semantic-syntactic constructions based on logic - the law of maintaining the integrity of the object.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123996289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Practical Aspects of Vulnerability Detection During Certification Tests of Information Security Software 信息安全软件认证测试中漏洞检测的实践问题
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-5-36-44
V. Varenitsa, Jsc Npo Echelon, A. Markov, V. Savchenko, V. Tsirlov, Bauman Moscow State Technical Universit
{"title":"Practical Aspects of Vulnerability Detection During Certification Tests of Information Security Software","authors":"V. Varenitsa, Jsc Npo Echelon, A. Markov, V. Savchenko, V. Tsirlov, Bauman Moscow State Technical Universit","doi":"10.21681/2311-3456-2021-5-36-44","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-5-36-44","url":null,"abstract":"Purpose: analysis of various techniques and techniques for identifying defects and vulnerabilities during certification tests. Research method: comparative analysis. Result: the conclusion is made about the relevance and priority of the study of open-source web applications. The study is given and the shortcomings of directive methods for identifying vulnerabilities and undeclared capabilities in software products are shown. The author’s statistics of the identified vulnerabilities are given with detailing by classes of computer attacks, manufacturers of information security tools, programming environments and methods for identifying vulnerabilities. A comparative analysis of author’s methods with known directive testing methods is given. The relevance of the implementation of the concept of developing secure software is shown. Recommendations on improving the security of software tools for information protection are given.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115450505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visual Analytics for Information Security: Efficiency Assessment and Analysis of Visualization Methods 信息安全的可视化分析:可视化方法的效率评估和分析
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-6-36-45
Igor Kotenko, Maxim Kolomeec, K. Zhernova, A. Chechulin
{"title":"Visual Analytics for Information Security: Efficiency Assessment and Analysis of Visualization Methods","authors":"Igor Kotenko, Maxim Kolomeec, K. Zhernova, A. Chechulin","doi":"10.21681/2311-3456-2021-6-36-45","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-6-36-45","url":null,"abstract":"The purpose of the article: to identify and systematize information security problems that are solved using visual analytics methods, applied data visualization models and methods for assessing the effectiveness of visualization models. Research method: a systematic analysis of the application of visual analytics methods for solving information security problems. Analysis of relevant work in the field of information security and data visualization, as well as methods for assessing visualization. The objects of research are: solving information security problems through visual analysis and methods for assessing the effectiveness of visualization models. The result obtained: an interactive map of visualization models and their areas of application is presented, which will allow researchers and developers to choose the visualization models that are most appropriate for specific applied information security problems. A classification of methods for assessing visualization is presented. The scope of the proposed approach is the creation of visualization models that can be used to increase the efficiency of operator interaction with information security applications. The proposed article will be useful both for students studying in the direction of training “Information Security”, and for specialists who develop information security systems.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129542552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Procedure for Assuring the Continuity of Critical Information Infrastructure under Conditions of Information Influence 在信息影响条件下保证关键信息基础设施连续性的程序
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-6-37-48
S. Klimov, Sergey Polikarpov, Boris Rizhov, R. Tihonov, Igor Shpirnya
{"title":"Procedure for Assuring the Continuity of Critical Information Infrastructure under Conditions of Information Influence","authors":"S. Klimov, Sergey Polikarpov, Boris Rizhov, R. Tihonov, Igor Shpirnya","doi":"10.21681/2311-3456-2019-6-37-48","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-6-37-48","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129101604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Structural and Functional Model of Cyberspace 网络空间结构与功能模型
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2021-4-16-24
Y. Starodubtsev, P. Zakalkin, S. Ivanov
{"title":"Structural and Functional Model of Cyberspace","authors":"Y. Starodubtsev, P. Zakalkin, S. Ivanov","doi":"10.21681/2311-3456-2021-4-16-24","DOIUrl":"https://doi.org/10.21681/2311-3456-2021-4-16-24","url":null,"abstract":"Abstract. The aim of the research is to develop a structural and functional model of cyberspace as an element of its mathematical (analytical and simulation) model, which allows us to study the properties of cyberspace. Formation of the terminological basis of the research area. Research methods: theory of complex systems, synergetics. Research result: a structural and functional model has been developed that describes the process of forming information services based on cyberspace resources. In relation to cyberspace, the concept of “symbiont” is introduced as a universal concept that allows describing any element of cyberspace and its resources. The following terms are defined: cyberspace, information, computing and telecommunications resource. In addition, the formalization of resources and information services provided by cyberspace is presented. An example of forming an information service based on cyberspace resources is shown.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129920552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Studing the Issues of Applying Protected Digitalization Technologies as Exemplified by the Digital Student Rating 以数字学生评分为例研究受保护数字化技术的应用问题
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2019-3-33-38
A. Shcherbakov, Aleksandr Buligin, A. Elizarova, V. Ryabkov
{"title":"Studing the Issues of Applying Protected Digitalization Technologies as Exemplified by the Digital Student Rating","authors":"A. Shcherbakov, Aleksandr Buligin, A. Elizarova, V. Ryabkov","doi":"10.21681/2311-3456-2019-3-33-38","DOIUrl":"https://doi.org/10.21681/2311-3456-2019-3-33-38","url":null,"abstract":"","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128676844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ARCHITECTURE OF ADAPTIVE PROTECTION SYSTEM FOR SENSOR NETWORK 传感器网络自适应保护系统结构
Voprosy kiberbezopasnosti Pub Date : 1900-01-01 DOI: 10.21681/2311-3456-2022-6-22-39
A. Basan, E. Basan, O. Peskova, Nikita Sushkin, M. Shulika
{"title":"ARCHITECTURE OF ADAPTIVE PROTECTION SYSTEM FOR SENSOR NETWORK","authors":"A. Basan, E. Basan, O. Peskova, Nikita Sushkin, M. Shulika","doi":"10.21681/2311-3456-2022-6-22-39","DOIUrl":"https://doi.org/10.21681/2311-3456-2022-6-22-39","url":null,"abstract":"38Адаптивная система защиты сенсорных сетей от активных атак Вопросы кибербезопасности. 2022. No 6(52) Architecture of AdAptiVe protection system for sensor netWorK Basan A.S.6 , Basan E.S.7 , Peskova O.Yu.8 , Sushkin N.A.9 , Shulika M.G.10 Purpose: Development of the adaptive protection system architecture for sensor networks and cyber-physical systems for anomaly detection based on the collection and analysis of cyber-physical parameters. Method: The method is based on the use of probability theory, mathematical statistics, and information theory. The entropy measure and normalization of the raw data make it possible to unify the data and evaluate it in terms of anomaly detection. Results: The existing solutions for the protection of cyber-physical systems from external active attacks were analyzed. The architecture of an adaptive system for a cyber-physical system protection is proposed. As part of the representation of the node data collection and analysis subsystem, a method for estimating cyber-physical parameters to detect intrusions is proposed. Three parameter changes for four behavioral scenarios were analyzed in detail in this study. Even by three parameters, you can determine the difference between attacks and normal behaviors. It is possible to evaluate not only the fact of parameter change, but also the degree of its change. At the same time, the node autonomously compared changes in its parameters with changes in the parameters of the neighboring node and could identify the impact of the attack on the neighboring node. The scientific novelty primarily consists in the fact that for the first time a method for determining the abnormal activity of a cyber-physical system based on the evaluation of system parameters using a measure of entropy and normalization of raw data has been developed, which makes it possible to achieve a high level of detection of known and unknown attacks. This method can be effectively used also for autonomous systems. The original architecture of the adaptive system for protecting the cyber-physical system is also proposed, its main components are worked out. When implementing an attack in a distributed system, this development will allow the node to detect anomalies not only autonomously, but also distributed, that is, to detect the impact on neighboring nodes.","PeriodicalId":422818,"journal":{"name":"Voprosy kiberbezopasnosti","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121074425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信