Open Access Open Access  Restricted Access Access granted  Restricted Access Subscription Access

Vol 50, No 8 (2016)

Article

Management of information security risks in a context of uncertainty

Azhmukhamedov I.M., Vybornova O.N., Brumshtein Y.M.

Abstract

The article proposes a method for selecting the optimal tactics to reduce the current level of information security risks to an acceptable level specified by a decision maker based on the introduction of a metric of assessment characteristics of acceptable and current risks, as well as algorithms for constructing the acceptable risk curve and for determining the values of current information security risks.

Automatic Control and Computer Sciences. 2016;50(8):657-663
pages 657-663 views

Access control system for distributed computing networks

Konoplev A.S., Kalinin M.O.

Abstract

The architecture of access control system for user jobs access to computational resources of grid distributed computing networks, which provides protection of data being processed against threats of exceeding user privileges, is presented. The developed system is compared to the available analogues, and the results of efficiency assessment of performance of the developed system are discussed.

Automatic Control and Computer Sciences. 2016;50(8):664-668
pages 664-668 views

Tasks of providing information security in distributed computing networks

Konoplev A.S., Kalinin M.O.

Abstract

The issue of providing information security for data and computing resources in grid networks is reviewed. Specific features of architecture of distributed computing networks based on grid platforms are analyzed. Security threats specific for grid systems are typified. The available measures ensuring security for grid systems are considered, and their drawbacks are indicated. The set of applied issues associated with ensuring grid protection from unauthorized access is defined.

Automatic Control and Computer Sciences. 2016;50(8):669-672
pages 669-672 views

An approach to developing the SIEM system for the Internet of Things

Lavrova D.S.

Abstract

This article suggests an approach to building systems for analyzing security incidents in the Internet of Things as a self-similar system within the ambit of the normal operation of its constituent objects. The graph model of the Internet of Things as a cyberphysical system has been developed and used as basis to prove that the analysis of paired relations selected from a discrete message stream from devices will be enough to detect security incidents.

Automatic Control and Computer Sciences. 2016;50(8):673-681
pages 673-681 views

A prototype computer with non-von Neumann architecture based on strategic domestic J7 microprocessor

Molyakov A.S.

Abstract

We consider a prototype of a computer with non-von Neumann architecture based on the domestic J7 microprocessor and nonclassical massively parallel program organization with globally addressable memory and new data transmission technology, new design of 3D electronics packaging to enhance the security level.

Automatic Control and Computer Sciences. 2016;50(8):682-686
pages 682-686 views

Token scanning as a new scientific approach in the creation of protected systems: A new generation OS MICROTEK

Molyakov A.S.

Abstract

Token scanning, a new approach to the creation of protected information systems describing the state of the system with semantic content, namely, identification of uncontrollable context transitions, defined and possible on the whole set of variables using functional and nonprocedural programming languages, is described.

Automatic Control and Computer Sciences. 2016;50(8):687-692
pages 687-692 views

Development of automated system for identifying abnormal network activity and detecting threats

Nikonov V.V., Los’ V.P., Ross G.V.

Abstract

The features of a system for identifying abnormal network activity are considered. Algorithmic and software systems for identifying abnormal network activity and detecting threats are developed.

Automatic Control and Computer Sciences. 2016;50(8):693-702
pages 693-702 views

Planning of aggregation and normalization of data from the Internet of Things for processing on a multiprocessor cluster

Poltavtseva M.A., Lavrova D.S., Pechenkin A.I.

Abstract

An approach to preliminary processing of data from the Internet of Things is suggested. The suggested procedure is based on data aggregation and normalization and makes it possible to reduce the data dimension for further analysis and increase the rate of aggregation and normalization. To that end it is proposed to carry out data processing on a multiprocessor cluster. The article provides a detailed description of the approach to dividing the given task into connected subtasks and indicates which of them can be fulfilled in parallel. Algorithms of task distribution among the multiprocessor cluster nodes and task planning on a multiprocessor cluster node are developed.

Automatic Control and Computer Sciences. 2016;50(8):703-711
pages 703-711 views

Information security of data channels based on a multifunctional tailored software and hardware solution

Sukhoparov M.E., Lebedev I.S., Korzhuk V.M., Krivtsova I.E.

Abstract

A proposed solution lies in using methods to ensure the implementation of preventive measures aimed to increase the complexity of implementation of information security threats using a compact device based on a PC/104+ form factor. A counteraction to information attacks is estimated, the device status conditions in various modes and after the introduction of additional protection components are simulated.

Automatic Control and Computer Sciences. 2016;50(8):712-716
pages 712-716 views

A risk-oriented approach to the control arrangement of security protection subsystems of information systems

Anisimov V.G., Zegzhda P.D., Anisimov E.G., Bazhin D.A.

Abstract

We have considered the methodological situation of the development of models and methods of decision-making support for control in the security protection subsystems of information systems to neutralize external and internal influences, which can lead to accidental or premeditated unauthorized access to stored and processed information in the system, and its distortion or destruction.

Automatic Control and Computer Sciences. 2016;50(8):717-721
pages 717-721 views

Intelligent data analysis in information security

Grusho A.A., Grusho N.A., Zabezhailo M.I., Timonina E.E.

Abstract

At present, there are a large number of trends and developments in artificial intelligence systems. This paper deals with the available intelligent data analysis in information security and the possibilities provided by data mining. Examples of tasks that can be solved using artificial intelligence systems are presented, including safe resource management, prediction of critical states and failures, resolution of conflicts in computational processes and information security regulations, and forensics.

Automatic Control and Computer Sciences. 2016;50(8):722-725
pages 722-725 views

Detection of anomalous behavior in a robot system based on deep learning elements

Utkin L.V., Zaborovskii V.S., Popov S.G.

Abstract

The preprocessing procedure for anomalous behavior of robot system elements is proposed in the paper. It uses a special kind of a neural network called an autoencoder to solve two problems. The first problem is to decrease the dimensionality of the training data using the autoencoder to calculate the Mahalanobis distance, which can be viewed as one of the best metrics to detect the anomalous behavior of robots or sensors in the robot systems. The second problem is to apply the autoencoder to transfer learning. The autoencoder is trained by means of the target data which corresponds to the extreme operational conditions of the robot system. The source data containing the normal and anomalous observations derived from the normal operation conditions is reconstructed to the target data using the trained autoencoder. The reconstructed source data is used to define a optimal threshold for making decision on the anomaly of the observation based on the Mahalanobis distance.

Automatic Control and Computer Sciences. 2016;50(8):726-733
pages 726-733 views

Technology of security services virtualization for high-speed computer networks

Zegzhda P.D., Kalinin M.O.

Abstract

The issue of performance degradation in distributed systems of electronic services using software for processing, coding, and data protection is considered. A model for the classification of network traffic flows is built and high-performance network traffic protection software that runs in a virtualized environment is developed based on it.

Automatic Control and Computer Sciences. 2016;50(8):734-738
pages 734-738 views

Applying the group signature for entity authentication in distributed grid computing networks

Aleksandrova E.B., Zegzhda D.P., Konoplev A.S.

Abstract

The paper describes the problem of unauthorized access to the data processed in distributed grid computing networks. Existing implementations of entity authentication mechanisms in grid systems are analyzed, and their disadvantages are considered. An approach to the use of group signature schemes, which prevents unauthorized access to a computing environment and provides the integrity of transferred data, is proposed.

Automatic Control and Computer Sciences. 2016;50(8):739-742
pages 739-742 views

Approaches to protection of applications based on the TLS protocol against attacks using revoked certificates

Busygin A.G., Konoplev A.S., Kalinin M.O.

Abstract

This article considers problems with security of applications based on the TLS protocol. Scenarios, when these applications fall under attacks using revoked certificates, are described. The current methods of checking the status of X.509 public key infrastructure certificates used together with the TLS protocol are compared, and their strong and weak points are specified.

Automatic Control and Computer Sciences. 2016;50(8):743-748
pages 743-748 views

Attainable upper estimate of the degree of distinguishability of a connected permutation automaton

Babash A.V.

Abstract

In this work, we yield an attainable upper estimate of the degree of distinguishability of a connected permutation automaton with an assigned diameter.

Automatic Control and Computer Sciences. 2016;50(8):749-758
pages 749-758 views

Asymptotic assessments of CRC error probabilities in some telecommunication protocols

Baranov A.P., Baranov P.A.

Abstract

We study the value distributions for the control cyclic redundancy check (CRC) of length k, drawn at the data section of volume n. The behavior of CRC value distribution is examined at large n and fixed values of k (k = const, n → ∞). With the application of the character theory, we find the conditions of asymptomatic uniformity of the CRC distribution. The asymptomatic results can be applied during the assessment of errors of a series of protocols such as USB, X.25, HDLC, Bluetooth, Ethernet, etc.

Automatic Control and Computer Sciences. 2016;50(8):759-764
pages 759-764 views

Assessment of CRC error probability at minor distortion of information

Baranov A.P., Baranov P.A.

Abstract

The authors of [1, 2] suggested a model of information distortion by white noise. The present work discusses the asymptotic behavior of CRC error probabilities at low values of p, which is the probability of distortion of transferred information bits. On the basis of the theoretical results in two specific protocols—Е1 and ETSI EN 302307—as well as in the examples, the probability values for the error in recognizing the given packet as nondistorted in the presence of at least one distortion are assessed.

Automatic Control and Computer Sciences. 2016;50(8):765-772
pages 765-772 views

KDP scheme of preliminary key distribution in discretionary security policy

Belim S.V., Belim S.Y.

Abstract

A modification of the KDP scheme for the distribution of encryption keys is considered as applied to a distributed computer system with a discretionary security model. Limited access is specified as forbidden channels of data transmission. The scheme of preliminary key distribution is designed in such a way that it is impossible for forbidden channels to create a key-pair for the data exchange. An example of the construction of the proposed scheme is presented.

Automatic Control and Computer Sciences. 2016;50(8):773-776
pages 773-776 views

Distribution of cryptographic keys in systems with a hierarchy of objects

Belim S.V., Bogachenko N.F.

Abstract

An algorithm for the distribution of cryptographic keys is presented, which is based on the hierarchical structure of objects in the system. The performance of the algorithm for some types of the graph of the object hierarchy is substantiated. A mechanism for setting mandatory and discretionary access differentiation is proposed using the algorithm.

Automatic Control and Computer Sciences. 2016;50(8):777-786
pages 777-786 views

User identification and authentication system based on a hybrid fuzzy approach

Sumkin K.S., Los’ V.P., Ross G.V.

Abstract

This paper is devoted to organizing the process of user identification and authentication in an automatic system of a university. It is shown that currently available solutions for identification and authentication data mining do not ensure adequate security of the network as a whole. Fuzzy logic is used as the main solution for the problem of analyzing the sets of subjects and objects. Functions for evaluating separability and compactness, as well as an optimized maximin method, are used. An algorithm for clustering indefinite subjects and objects is presented.

Automatic Control and Computer Sciences. 2016;50(8):787-791
pages 787-791 views

Implementation of symmetric encryption by State Standard 28147–89 algorithm on a graphical processor

Sukhoparov M.E., Lebedev I.S.

Abstract

A new method for implementation of symmetric encryption by the GOST (State Standard) 28147–89 algorithm using the technology of NVIDIA CUDA was suggested. The highest-performance option and system parameters providing maximal performance are defined. The effectiveness of the suggested solution as well as a comparative analysis of the given approach with existing solutions is assessed.

Automatic Control and Computer Sciences. 2016;50(8):792-795
pages 792-795 views

Tripartite outsoursing key-agreement protocol on bilinear pairings

Aleksandrova E.B., Shkorkina E.N.

Abstract

The implementation of cryptographic protocols in systems with resource-constrained devices and possible transfer of laborious calculations to a cloud server is considered. In this case, the device performs “simple” arithmetic operations. A tripartite key-agreement with two servers and the model with one malicious computer is proposed.

Automatic Control and Computer Sciences. 2016;50(8):796-801
pages 796-801 views

A text steganography method based on Markov chains

Shniperov A.N., Nikitina K.A.

Abstract

A new method of text steganography based on Markov chains of different orders that allows the introduction of hidden information in texts is presented together with test results of a software solution which generate texts with a good approximation to the natural language model.

Automatic Control and Computer Sciences. 2016;50(8):802-808
pages 802-808 views

Multiagent system controllability evaluation using the multilevel structure of the graph of agents

Zegzhda D.P., Stepanova T.V., Suprun A.F.

Abstract

A new approach is proposed to the calculation of the upper and lower bounds of the multiagent system controllability index formalized as the existence probability of the path from any node to the control center with the message transmission time not larger than the constant t. Controllability is one of the properties of this system that determines the stability of its functioning. A regular graph in the form of a tree with virtual nodes, which makes it possible to apply the methods of calculating the number of vertices in a particular level, is proposed in order to compute controllability boundaries.

Automatic Control and Computer Sciences. 2016;50(8):809-812
pages 809-812 views

Sustainability as a criterion for information security in cyber-physical systems

Zegzhda D.P.

Abstract

A new point of view on security of cyber-physical systems as a single complex combining both physical and information components is presented. An approach is proposed to the assessment of the security of such systems based on homeostasis, i.e., a property to maintain the functioning stability under destabilizing factors. The dynamic model of the cyber-physical system security is given.

Automatic Control and Computer Sciences. 2016;50(8):813-819
pages 813-819 views