


Vol 50, No 8 (2016)
- Year: 2016
- Articles: 26
- URL: https://journal-vniispk.ru/0146-4116/issue/view/10685
Article
Management of information security risks in a context of uncertainty
Abstract
The article proposes a method for selecting the optimal tactics to reduce the current level of information security risks to an acceptable level specified by a decision maker based on the introduction of a metric of assessment characteristics of acceptable and current risks, as well as algorithms for constructing the acceptable risk curve and for determining the values of current information security risks.



Access control system for distributed computing networks
Abstract
The architecture of access control system for user jobs access to computational resources of grid distributed computing networks, which provides protection of data being processed against threats of exceeding user privileges, is presented. The developed system is compared to the available analogues, and the results of efficiency assessment of performance of the developed system are discussed.



Tasks of providing information security in distributed computing networks
Abstract
The issue of providing information security for data and computing resources in grid networks is reviewed. Specific features of architecture of distributed computing networks based on grid platforms are analyzed. Security threats specific for grid systems are typified. The available measures ensuring security for grid systems are considered, and their drawbacks are indicated. The set of applied issues associated with ensuring grid protection from unauthorized access is defined.



An approach to developing the SIEM system for the Internet of Things
Abstract
This article suggests an approach to building systems for analyzing security incidents in the Internet of Things as a self-similar system within the ambit of the normal operation of its constituent objects. The graph model of the Internet of Things as a cyberphysical system has been developed and used as basis to prove that the analysis of paired relations selected from a discrete message stream from devices will be enough to detect security incidents.



A prototype computer with non-von Neumann architecture based on strategic domestic J7 microprocessor
Abstract
We consider a prototype of a computer with non-von Neumann architecture based on the domestic J7 microprocessor and nonclassical massively parallel program organization with globally addressable memory and new data transmission technology, new design of 3D electronics packaging to enhance the security level.



Token scanning as a new scientific approach in the creation of protected systems: A new generation OS MICROTEK
Abstract
Token scanning, a new approach to the creation of protected information systems describing the state of the system with semantic content, namely, identification of uncontrollable context transitions, defined and possible on the whole set of variables using functional and nonprocedural programming languages, is described.






Planning of aggregation and normalization of data from the Internet of Things for processing on a multiprocessor cluster
Abstract
An approach to preliminary processing of data from the Internet of Things is suggested. The suggested procedure is based on data aggregation and normalization and makes it possible to reduce the data dimension for further analysis and increase the rate of aggregation and normalization. To that end it is proposed to carry out data processing on a multiprocessor cluster. The article provides a detailed description of the approach to dividing the given task into connected subtasks and indicates which of them can be fulfilled in parallel. Algorithms of task distribution among the multiprocessor cluster nodes and task planning on a multiprocessor cluster node are developed.



Information security of data channels based on a multifunctional tailored software and hardware solution
Abstract
A proposed solution lies in using methods to ensure the implementation of preventive measures aimed to increase the complexity of implementation of information security threats using a compact device based on a PC/104+ form factor. A counteraction to information attacks is estimated, the device status conditions in various modes and after the introduction of additional protection components are simulated.



A risk-oriented approach to the control arrangement of security protection subsystems of information systems
Abstract
We have considered the methodological situation of the development of models and methods of decision-making support for control in the security protection subsystems of information systems to neutralize external and internal influences, which can lead to accidental or premeditated unauthorized access to stored and processed information in the system, and its distortion or destruction.



Intelligent data analysis in information security
Abstract
At present, there are a large number of trends and developments in artificial intelligence systems. This paper deals with the available intelligent data analysis in information security and the possibilities provided by data mining. Examples of tasks that can be solved using artificial intelligence systems are presented, including safe resource management, prediction of critical states and failures, resolution of conflicts in computational processes and information security regulations, and forensics.



Detection of anomalous behavior in a robot system based on deep learning elements
Abstract
The preprocessing procedure for anomalous behavior of robot system elements is proposed in the paper. It uses a special kind of a neural network called an autoencoder to solve two problems. The first problem is to decrease the dimensionality of the training data using the autoencoder to calculate the Mahalanobis distance, which can be viewed as one of the best metrics to detect the anomalous behavior of robots or sensors in the robot systems. The second problem is to apply the autoencoder to transfer learning. The autoencoder is trained by means of the target data which corresponds to the extreme operational conditions of the robot system. The source data containing the normal and anomalous observations derived from the normal operation conditions is reconstructed to the target data using the trained autoencoder. The reconstructed source data is used to define a optimal threshold for making decision on the anomaly of the observation based on the Mahalanobis distance.



Technology of security services virtualization for high-speed computer networks
Abstract
The issue of performance degradation in distributed systems of electronic services using software for processing, coding, and data protection is considered. A model for the classification of network traffic flows is built and high-performance network traffic protection software that runs in a virtualized environment is developed based on it.



Applying the group signature for entity authentication in distributed grid computing networks
Abstract
The paper describes the problem of unauthorized access to the data processed in distributed grid computing networks. Existing implementations of entity authentication mechanisms in grid systems are analyzed, and their disadvantages are considered. An approach to the use of group signature schemes, which prevents unauthorized access to a computing environment and provides the integrity of transferred data, is proposed.



Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates
Abstract
This article considers problems with security of applications based on the TLS protocol. Scenarios, when these applications fall under attacks using revoked certificates, are described. The current methods of checking the status of X.509 public key infrastructure certificates used together with the TLS protocol are compared, and their strong and weak points are specified.






Asymptotic assessments of CRC error probabilities in some telecommunication protocols
Abstract
We study the value distributions for the control cyclic redundancy check (CRC) of length k, drawn at the data section of volume n. The behavior of CRC value distribution is examined at large n and fixed values of k (k = const, n → ∞). With the application of the character theory, we find the conditions of asymptomatic uniformity of the CRC distribution. The asymptomatic results can be applied during the assessment of errors of a series of protocols such as USB, X.25, HDLC, Bluetooth, Ethernet, etc.



Assessment of CRC error probability at minor distortion of information
Abstract
The authors of [1, 2] suggested a model of information distortion by white noise. The present work discusses the asymptotic behavior of CRC error probabilities at low values of p, which is the probability of distortion of transferred information bits. On the basis of the theoretical results in two specific protocols—Е1 and ETSI EN 302307—as well as in the examples, the probability values for the error in recognizing the given packet as nondistorted in the presence of at least one distortion are assessed.



KDP scheme of preliminary key distribution in discretionary security policy
Abstract
A modification of the KDP scheme for the distribution of encryption keys is considered as applied to a distributed computer system with a discretionary security model. Limited access is specified as forbidden channels of data transmission. The scheme of preliminary key distribution is designed in such a way that it is impossible for forbidden channels to create a key-pair for the data exchange. An example of the construction of the proposed scheme is presented.



Distribution of cryptographic keys in systems with a hierarchy of objects
Abstract
An algorithm for the distribution of cryptographic keys is presented, which is based on the hierarchical structure of objects in the system. The performance of the algorithm for some types of the graph of the object hierarchy is substantiated. A mechanism for setting mandatory and discretionary access differentiation is proposed using the algorithm.



User identification and authentication system based on a hybrid fuzzy approach
Abstract
This paper is devoted to organizing the process of user identification and authentication in an automatic system of a university. It is shown that currently available solutions for identification and authentication data mining do not ensure adequate security of the network as a whole. Fuzzy logic is used as the main solution for the problem of analyzing the sets of subjects and objects. Functions for evaluating separability and compactness, as well as an optimized maximin method, are used. An algorithm for clustering indefinite subjects and objects is presented.



Implementation of symmetric encryption by State Standard 28147–89 algorithm on a graphical processor
Abstract
A new method for implementation of symmetric encryption by the GOST (State Standard) 28147–89 algorithm using the technology of NVIDIA CUDA was suggested. The highest-performance option and system parameters providing maximal performance are defined. The effectiveness of the suggested solution as well as a comparative analysis of the given approach with existing solutions is assessed.



Tripartite outsoursing key-agreement protocol on bilinear pairings
Abstract
The implementation of cryptographic protocols in systems with resource-constrained devices and possible transfer of laborious calculations to a cloud server is considered. In this case, the device performs “simple” arithmetic operations. A tripartite key-agreement with two servers and the model with one malicious computer is proposed.



A text steganography method based on Markov chains
Abstract
A new method of text steganography based on Markov chains of different orders that allows the introduction of hidden information in texts is presented together with test results of a software solution which generate texts with a good approximation to the natural language model.



Multiagent system controllability evaluation using the multilevel structure of the graph of agents
Abstract
A new approach is proposed to the calculation of the upper and lower bounds of the multiagent system controllability index formalized as the existence probability of the path from any node to the control center with the message transmission time not larger than the constant t. Controllability is one of the properties of this system that determines the stability of its functioning. A regular graph in the form of a tree with virtual nodes, which makes it possible to apply the methods of calculating the number of vertices in a particular level, is proposed in order to compute controllability boundaries.



Sustainability as a criterion for information security in cyber-physical systems
Abstract
A new point of view on security of cyber-physical systems as a single complex combining both physical and information components is presented. An approach is proposed to the assessment of the security of such systems based on homeostasis, i.e., a property to maintain the functioning stability under destabilizing factors. The dynamic model of the cyber-physical system security is given.


