{"title":"Steganalytical Module for Detecting Embeddings in Images with a Low Stego Container Filling","authors":"D. E. Vil’khovskii","doi":"10.3103/S0146411624700792","DOIUrl":"10.3103/S0146411624700792","url":null,"abstract":"<p>The study describes the business logic and results of the steganalysis software, a steganalytical complex that operates on the basis of the author’s image steganalysis algorithms, which make it possible to detect embeddings even with low filling of the stego container (10–25% of the total volume). This solution is aimed at increasing the information security of an organization by identifying media files (images) containing an embedding and preventing unauthorized forwarding of such files or viewing and extraction of the received hidden message, as well as preventing the installation of malicious programs, whose module is embedded in the image using a steganographic method. The software package works with embeddings performed using the Koch–Zhao and least-significant-bit substitution (LSB-substitution) methods.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1164 - 1168"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143621765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent Synthesis of Cyber-Resilient Network Structures: Methods, Experiments, and Architecture Implementation","authors":"E. Yu. Pavlenko","doi":"10.3103/S0146411624700743","DOIUrl":"10.3103/S0146411624700743","url":null,"abstract":"<p>This paper studies issues related to the implementation of intellectual synthesis of cyber-resilient structures. Methods are proposed that implement synthesis both at the stage of designing the network structure and at the stage of its recovery during a cyberattack or failure. The experimental results confirming the efficiency of the proposed methods are presented. The architecture of the system for detecting cyberattacks and intellectual synthesis of cyber-resilient network structures is described.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1119 - 1131"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of a Method for Ensuring Data Integrity in Edge Computing Networks Based on Blockchain Technology","authors":"I. R. Fedorov, A. A. Kovalev","doi":"10.3103/S0146411624701219","DOIUrl":"10.3103/S0146411624701219","url":null,"abstract":"<p>In light of the rapid development of edge computing and the increase in the number of connected devices, this paper addresses the pressing issue of ensuring data integrity. The main focus is on the use of blockchain technology, which offers unique opportunities to solve this problem. This paper provides a brief overview of the existing methods and a new method for ensuring integrity based on blockchain technology. It is proposed to use the Hot Stuff consensus algorithm in the case of multiple active nodes, which ensures fast operation and scalability of the system. Particular attention is paid to the use of a secondary blockchain based on Ethereum to provide additional security and create checkpoints in large blockchain networks. This makes it possible to simplify the work of edge servers and ensure data integrity verification upon the user’s request using smart contracts. The proposed new approaches to ensure data integrity and use blockchain technology can be applied not only in the field of edge computing but also in various variations of the Internet of Things.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1422 - 1428"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Construction of Deterministic and Stochastic Mathematical Models of Information System Protection","authors":"O. V. Rybkina","doi":"10.3103/S0146411624700718","DOIUrl":"10.3103/S0146411624700718","url":null,"abstract":"<p>Mathematical models are proposed for protecting an information system (IS) from information security threats (ISTs) based on the classical model of the struggle between two opponents: the Lanchester model. Using the method of constructing systems of differential equations with the given set of invariants—first integrals—a deterministic model with invariant control and a stochastic model with Wiener perturbations, a model with programmed control with a probability 1, are constructed. The behavior of systems is assessed using mathematical modeling in the MathCad environment. The behavior of the constructed models depending on the initial conditions is considered. The existence of a stochastic model of protection of an IS from ISTs, protected with a probability 1, is established.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1100 - 1107"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Probability-Theoretical Models of Physical Random Number Generators","authors":"D. S. Bogdanov, A. S. Logachev, V. O. Mironkin","doi":"10.3103/S0146411624700962","DOIUrl":"10.3103/S0146411624700962","url":null,"abstract":"<p>This article presents the main probability-theoretic models that describe a wide class of physical random number generators and allow us to propose general approaches to their synthesis and analysis.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1303 - 1310"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Method of Searching for Clones of the Program Code in Binary Executive Files","authors":"E. V. Zavadskii, A. V. Bulat, N. A. Gribkov","doi":"10.3103/S0146411624700913","DOIUrl":"10.3103/S0146411624700913","url":null,"abstract":"<p>The modern trend of increasing labor productivity and business process efficiency entails the optimization of software development processes through the use of generative artificial intelligence models trained on various code bases and manual copying of code fragments. Given the growing number of registered vulnerabilities, methods for detecting clones of the software code are needed. A method for assessing the similarity of fragments of the program code of binary executable files, which is based on the representation of the code in the form of an FA-AAST tree and the apparatus of graph neural networks, is proposed. The results obtained during testing on open and closed source software demonstrate the correctness of the proposed method and higher accuracy compared to the solutions considered.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1263 - 1270"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attack Graph-Based Data Presentation for Use in Automated Security Analysis Systems","authors":"E. M. Orel, D. A. Moskvin, A. A. Lyashenko","doi":"10.3103/S0146411624701232","DOIUrl":"10.3103/S0146411624701232","url":null,"abstract":"<p>A mathematical model for data representation is developed for use in automated security analysis systems. The model allows linking information about the system obtained by a specialist during the security analysis process with the set of attack scenarios in which they may be involved. Each time a scenario is applied, new information emerges, which helps expand the attack graph.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1436 - 1441"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protection Against Unauthorized Access of Mobile Devices When Using the BYOD Concept","authors":"A. A. Kornienko, S. V. Kornienko, N. S. Razzhivin","doi":"10.3103/S0146411624700998","DOIUrl":"10.3103/S0146411624700998","url":null,"abstract":"<p>The problems of using mobile devices in the work process of an organization when applying the BYOD concept are analyzed. An adapted methodology for assessing security threats is proposed for BYOD concepts. As a supplement to the traditional approach to building a system for ensuring information security in a corporate information system based on BYOD, a software tool for controlling unauthorized access to mobile devices is developed and tested.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1326 - 1335"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. A. Poltavtseva, A. A. Podorov, E. B. Aleksandrova
{"title":"Verification of Access Control in Big Data Systems Using Temporal Logics","authors":"M. A. Poltavtseva, A. A. Podorov, E. B. Aleksandrova","doi":"10.3103/S0146411624700974","DOIUrl":"10.3103/S0146411624700974","url":null,"abstract":"<p>Ensuring consistent access control is one of the key security challenges in heterogeneous big data systems. The problem is the large number of data processing tools, as well as sources and users of information; heterogeneity of security models; and complexity of granular access rules. Analysis of the time factor in this case will improve the consistency and reliability of access control. The aim of this study is to select a methodology and tools for implementing temporal logic in the processes of access control verification of big data systems. The types of temporal logic and verification methods based on the temporal logic of actions (TLAs) are analyzed. The use of TLA+ is proposed to solve the given problem and an example of the corresponding specification is given.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1311 - 1317"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intelligent Recommendation System for Countering Network Attacks","authors":"I. A. Goretskii, D. S. Lavrova","doi":"10.3103/S0146411624701050","DOIUrl":"10.3103/S0146411624701050","url":null,"abstract":"<p>This paper studies an approach to counteract network attacks based on network reconfiguration to eliminate the possibility of the successful completion of an attack by an intruder. To implement this approach, it is proposed to use a recommender system mechanism that provides both the generation of possible network topologies and their ranking. The proposed intelligent recommendation system is based on a reinforcement learning algorithm based on the actor-critic model. The conducted experimental studies confirm the effectiveness of the developed system.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"58 8","pages":"1386 - 1391"},"PeriodicalIF":0.6,"publicationDate":"2025-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143622220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}