


Vol 51, No 8 (2017)
- Year: 2017
- Articles: 30
- URL: https://journal-vniispk.ru/0146-4116/issue/view/10718
Article
Information security architecture synthesis in distributed information computation systems
Abstract
This work considers the task of synthesizing information security architecture in the distributed information computation systems. The synthesis has been based on elementary structures described in the form of diagrams of solving action protection problems in the process of computation in the computer system and during network exchange.



Cyber-physical system homeostatic security management
Abstract
Characteristic features of security management for the cyber-physical system (CPS) have been distinguished. Existing approaches to the CPS security management have been systematized and their limited use in the CPS has been shown. An homeostatic approach to security management based on the CPS functional stability preservation has been proposed. A structure of homeostat for controlling the CPS has been described. A homeostatic model has been developed using logical predicates. The criteria for assessing the functional stability of the CPS have been proposed. The results of experimental studies showing the applicability of the proposed criteria have been presented.



An ontological model of the domain of applications for the Internet of Things in analyzing information security
Abstract
In this paper, we have proposed an ontological model for the application domain of the Internet of Things (IoT) that provides a detailed representation of the relationships and interrelations between system elements at different levels of abstraction with different degrees of detail. The ontological model allows one to understand the technical aspects of developing security information and event management (SIEM) systems for the detection and analysis of security incidents in the IoT.



Indices of the effectiveness of information protection in an information interaction system for controlling complex distributed organizational objects
Abstract
In this paper, we present some indices for evaluating the effectiveness of information protection in an information interaction system when controlling complex distributed organizational objects and proposing a technique for determining these indices. The technique is based on a stochastic representation of the flow of destructive actions that affect the information interactions among controllers of the elements of a distributed organizational object.



Hierarchical approach to analyzing security breaches in information systems
Abstract
This paper proposes a hierarchical approach to analyzing information security in modern information systems that consists of multilevel collection, analysis, and control of events. We have analyzed the mechanisms and peculiarities of how malware acts at each level of the information system, determined the features of the mechanisms of action of malware, its masking, and possible methods for detecting malware.



Systematization and security assessment of cyber-physical systems
Abstract
In this paper, the features of cyber-physical systems (CPSs) from the point of view of information security have been considered and CPSs have been classified. The authors have analyzed approaches to security assessments and identified the requirements to indicators of CPS information security. A system of specific assessment indicators based on the system stability criterion and homeostatic approach is proposed.



The task of building a trusted computing environment on the Intel hardware platform
Abstract
The problem of building a trusted computing environment on the basis of modern computing devices has been considered. The main features of software execution at different levels of privilege have been indicated. The architecture of the Intel ME subsystem has been considered. The potential threats of Intel ME technology have been highlighted, and possible ways to eliminate them have been given.



Use of Intel SGX to ensure the confidentiality of data of cloud users
Abstract
In this article the problem of possible attacks on confidentiality of user data in cloud systems comes from cloud provider’s side has been investigated. A secure cloud computing system architecture based on Intel Software Guard Extensions technology has been proposed. The approach that provides confidentiality of data of users of cloud systems is given. A method for implementing this approach into existing cloud systems is presented.



Applying NFC for automated replication of user data
Abstract
The results of analyzing the mechanisms and channels for replicating user data have been given. The replication mechanisms have been classified. Their advantages and drawbacks have been found. A method has been proposed that uses NFC to establish the secure data replication channel.



Identifying a potential insider using classification models
Abstract
Classification models based on statistical data have been developed that make it possible to identify a potential insider based on the indicators that manifest in the context of data incompleteness regarding the insider’s behavior.



Application of clustering methods for analyzing the security of Android applications
Abstract
This paper presents the results from developing the system for detecting malicious Android applications based on the fuzzy clustering method. We have described the format of the application feature vector, as well as presented studies on the effectiveness of using different criteria for separability. The high efficiency of the proposed approach has been experimentally confirmed.



The use of an artificial neural network to detect automatically managed accounts in social networks
Abstract
The problem of detection of automatically managed accounts (bots) in social networks has been considered. The method of their detection based on machine learning methods is proposed. The paper describes an example of a method based on artificial neural network learning. The parameters of a page in a social network used to detect bots have been presented. An experimental evaluation of the proposed system performance is given that demonstrates a high level of detection of bots in social networks.



Siamese neural network for intelligent information security control in multi-robot systems
Abstract
Anomaly detection of the robot system behavior is one of the important components of the information security control. In order to control robots equipped with many sensors it is difficult to apply the well-known Mahalanobis distance which allows us to analyze the current state of the sensors. Therefore, the Siamese neural network is proposed to intellectually support the security control. The Siamese network simplifies the anomaly detection of the robot system and realizes a non-linear analogue of the Mahalanobis distance. This peculiarity allows us to take into account complex data structures received from the robot sensors.



Application of convolutional neural networks for preventing information leakage in open internet resources
Abstract
The architecture of convolutional neural networks has been considered, including the types of layers used and the principles of their operation, settings, and training features. The possibilities of applying this type of network to solve the problems of information leakage prevention in natural language have been described. The possibility of applying them to solve the problem of classifying Internet pages that serve as web resources to identify pages of interest has been studied.



An adaptive model of a distributed intrusion detection system
Abstract
We have proposed an adaptive model of a system for detecting intrusions in a distributed computer network. The basis of the detection system consists of various data-mining methods that make it possible to classify network interaction as normal or anomalous using many attributes extracted from network traffic.









Architectures for building secure vehicular networks based on SDN technology
Abstract
The article studies the approach to building secured vehicle networks (VANET, FANET, MARINET, etc.) using the software-defined network technology. The experimental results on evaluating the effectiveness of architectures of secured traffic networks created using supercomputer modeling have been presented.






Data protection in radio channels of local differential satellite navigation subsystems
Abstract
We consider data protection in radio channels of control–correction stations of the GLONASS/GPS local differential subsystem of the river on inland waterways of Russia under the influence of mutual and industrial noise. Based on the investigation of coefficients of the relative sensitivity to variations in the parameters and structure of signals and noise and on the required bit error rate of the element-by-element receiving of digital messages, we introduce estimate criteria for the noise-immunity and functional stability of radio channels. We provide methods to compute the noiseimmunity and functional stability of radio channels. We investigate the variational–parametrical sensitivity of the range size of a control–correction station to variations in parameters of the mutual and industrial noise, as well as its variational–functional sensitivity to variations in the frequency–time structure of the signal and the mutual noise. We find that the parameter variations in industrial noise provide the most sensitive influence on the size of the range of control–correction stations.



Elliptic curves generation for isogeny-based cryptosystems
Abstract
Methods of generating supersingular and ordinary elliptic curves for isogeny-based cryptosystems have been studied. The influence of the class field polynomial on the time of generating ordinary elliptic curves has been analyzed and the comparative time of generating curves using Weber and Hilbert polynomials have been presented. Parameters that influence on the cryptographic security of isogeny-based cryptosystems have been considered.



Authentication in dynamic peer-to-peer networks based on homomorphic secret sharing
Abstract
We have proposed a new method for authentication and secret key establishment in ad-hoc networks through public channels based only on verifiable homomorphic threshold secret sharing. The secrecy of the method has been analyzed in standard assumptions with regard to the model of an active adversary represented by a coalition consisting of a pre-threshold number of network nodes. The perfect security of the method is proved in the passive adversary model.



Methods of group authentication for low-resource vehicle and flying self-organizing networks
Abstract
It has been suggested to provide group authentication in self-organizing networks using group signature. Due to the hardware peculiarities of unmanned aerial vehicles, the EDR-BBS scheme on elliptic curves has been selected as the group-signature scheme for FANET. Algebraic structures have been represented by elliptic curves over extended fields of special processor-oriented characteristics.



Models of the formation of CRC values and monitoring sums under the conditions of multiple distortions
Abstract
Some probability-theoretical models of packet-mode-transmitted information distortions have been considered. The main attention has been paid to distortions, including the possible interferences that affect several transmission cycles. Distortions are simulated by a sequence of impacts determined by dependent random variables. Correspondingly, k-dimensional CRC values also allow them to be represented as the sum of k-dimensional, differently distributed, dependent random terms. In some cases, they can be reduced to the sums of independent terms in a k-dimensional vector space over a field of two elements; then, the known limit theorems on the convergence to uniform distributions become applicable to them. For impacts that stretch to m cycles, the prospects of obtaining convergence conditions for CRC distributions in the case of sums of m-dependent terms or terms that form a nonhomogeneous Markov chain have been discussed.



A method of providing the integrity of information in the group of robotic engineering complexes based on crypt-code constructions
Abstract
The system of cryptographic code transformation of information based on the aggregated application of block encryption algorithms and polynomial codes of the residual class system has been considered. The complexation of information processing methods ensures the restoration of the integrity of information stored in a group of robotic complexes (RCs) that is subjected to the actions (algebraic manipulations) of the violator, while the physical loss of some predetermined limit number of RCs does not lead to the partial or complete loss of it.



X-PACE: Modified Password Authenticated Connection Establishment protocol
Abstract
In this work the Password Authenticated Connection Establidhment (PACE) protocol, which is used in Europenian smartcard enviroments, is considered. Protocol modifications have been proposed that can enhance its execution speed without decreasing its security. The new version is called X-PACE.






Intelligent data analysis in decision support systems for penetration tests
Abstract
Intelligent data analysis is extensively applied in various fields of technology, including information security. The development of decision support systems (DSSs) for penetration tests is more complicated due to incomplete, undefined, and expandable unstructured data. This article suggests an approach to formalizing information from subject domains, quantitative relevance estimates of object characteristics, and estimates of object similarity.



Modeling of information influence on remote wireless network devices
Abstract
A wireless network being affected by a broadcast storm attack has been considered to determine the availability of autonomous nodes and its ability to perform functional tasks under information influence. The conditions for the hacker attacks from a potential intruder have been determined. A wireless device availability analysis has been carried out. A model for determining the technical characteristics of the wireless self-organizing network device has been proposed.



Analysis of the constructing principles and methodology for evaluating the security of shoulder-surfing resistant graphic passwords
Abstract
In the recent scientific literature, many proposals have been made to increase the resistance of password systems to shoulder surfing attacks. These passwords are called shoulder-surfing resistant graphic passwords (SSRGPs). This paper presents a general methodological approach to analyzing and evaluating the resistance of SSRGPs, which can be described in terms of the input tables.


