Open Access Open Access  Restricted Access Access granted  Restricted Access Subscription Access

Vol 51, No 8 (2017)

Article

Information security architecture synthesis in distributed information computation systems

Grusho A.A., Grusho N.A., Timonina E.E.

Abstract

This work considers the task of synthesizing information security architecture in the distributed information computation systems. The synthesis has been based on elementary structures described in the form of diagrams of solving action protection problems in the process of computation in the computer system and during network exchange.

Automatic Control and Computer Sciences. 2017;51(8):799-804
pages 799-804 views

Cyber-physical system homeostatic security management

Zegzhda D.P., Pavlenko E.Y.

Abstract

Characteristic features of security management for the cyber-physical system (CPS) have been distinguished. Existing approaches to the CPS security management have been systematized and their limited use in the CPS has been shown. An homeostatic approach to security management based on the CPS functional stability preservation has been proposed. A structure of homeostat for controlling the CPS has been described. A homeostatic model has been developed using logical predicates. The criteria for assessing the functional stability of the CPS have been proposed. The results of experimental studies showing the applicability of the proposed criteria have been presented.

Automatic Control and Computer Sciences. 2017;51(8):805-816
pages 805-816 views

An ontological model of the domain of applications for the Internet of Things in analyzing information security

Lavrova D.S., Vasil’ev Y.S.

Abstract

In this paper, we have proposed an ontological model for the application domain of the Internet of Things (IoT) that provides a detailed representation of the relationships and interrelations between system elements at different levels of abstraction with different degrees of detail. The ontological model allows one to understand the technical aspects of developing security information and event management (SIEM) systems for the detection and analysis of security incidents in the IoT.

Automatic Control and Computer Sciences. 2017;51(8):817-823
pages 817-823 views

Indices of the effectiveness of information protection in an information interaction system for controlling complex distributed organizational objects

Anisimov V.G., Anisimov E.G., Zegzhda P.D., Saurenko T.N., Prisyazhnyuk S.P.

Abstract

In this paper, we present some indices for evaluating the effectiveness of information protection in an information interaction system when controlling complex distributed organizational objects and proposing a technique for determining these indices. The technique is based on a stochastic representation of the flow of destructive actions that affect the information interactions among controllers of the elements of a distributed organizational object.

Automatic Control and Computer Sciences. 2017;51(8):824-828
pages 824-828 views

Hierarchical approach to analyzing security breaches in information systems

Pavlenko E.Y., Yarmak A.V., Moskvin D.A.

Abstract

This paper proposes a hierarchical approach to analyzing information security in modern information systems that consists of multilevel collection, analysis, and control of events. We have analyzed the mechanisms and peculiarities of how malware acts at each level of the information system, determined the features of the mechanisms of action of malware, its masking, and possible methods for detecting malware.

Automatic Control and Computer Sciences. 2017;51(8):829-834
pages 829-834 views

Systematization and security assessment of cyber-physical systems

Zegzhda D.P., Poltavtseva M.A., Lavrova D.S.

Abstract

In this paper, the features of cyber-physical systems (CPSs) from the point of view of information security have been considered and CPSs have been classified. The authors have analyzed approaches to security assessments and identified the requirements to indicators of CPS information security. A system of specific assessment indicators based on the system stability criterion and homeostatic approach is proposed.

Automatic Control and Computer Sciences. 2017;51(8):835-843
pages 835-843 views

The task of building a trusted computing environment on the Intel hardware platform

Chernov A.Y., Konoplev A.S., Reshetov D.V.

Abstract

The problem of building a trusted computing environment on the basis of modern computing devices has been considered. The main features of software execution at different levels of privilege have been indicated. The architecture of the Intel ME subsystem has been considered. The potential threats of Intel ME technology have been highlighted, and possible ways to eliminate them have been given.

Automatic Control and Computer Sciences. 2017;51(8):844-847
pages 844-847 views

Use of Intel SGX to ensure the confidentiality of data of cloud users

Zegzhda D.P., Usov E.S., Nikol’skii A.V., Pavlenko E.Y.

Abstract

In this article the problem of possible attacks on confidentiality of user data in cloud systems comes from cloud provider’s side has been investigated. A secure cloud computing system architecture based on Intel Software Guard Extensions technology has been proposed. The approach that provides confidentiality of data of users of cloud systems is given. A method for implementing this approach into existing cloud systems is presented.

Automatic Control and Computer Sciences. 2017;51(8):848-854
pages 848-854 views

Applying NFC for automated replication of user data

Ivanov D.V., Moskvin D.A., Myasnikov A.V., Suprun A.F.

Abstract

The results of analyzing the mechanisms and channels for replicating user data have been given. The replication mechanisms have been classified. Their advantages and drawbacks have been found. A method has been proposed that uses NFC to establish the secure data replication channel.

Automatic Control and Computer Sciences. 2017;51(8):855-859
pages 855-859 views

Identifying a potential insider using classification models

Zaytsev A.S., Malyuk A.A.

Abstract

Classification models based on statistical data have been developed that make it possible to identify a potential insider based on the indicators that manifest in the context of data incompleteness regarding the insider’s behavior.

Automatic Control and Computer Sciences. 2017;51(8):860-866
pages 860-866 views

Application of clustering methods for analyzing the security of Android applications

Pavlenko E.Y., Yarmak A.V., Moskvin D.A.

Abstract

This paper presents the results from developing the system for detecting malicious Android applications based on the fuzzy clustering method. We have described the format of the application feature vector, as well as presented studies on the effectiveness of using different criteria for separability. The high efficiency of the proposed approach has been experimentally confirmed.

Automatic Control and Computer Sciences. 2017;51(8):867-873
pages 867-873 views

The use of an artificial neural network to detect automatically managed accounts in social networks

Zegzhda P.D., Malyshev E.V., Pavlenko E.Y.

Abstract

The problem of detection of automatically managed accounts (bots) in social networks has been considered. The method of their detection based on machine learning methods is proposed. The paper describes an example of a method based on artificial neural network learning. The parameters of a page in a social network used to detect bots have been presented. An experimental evaluation of the proposed system performance is given that demonstrates a high level of detection of bots in social networks.

Automatic Control and Computer Sciences. 2017;51(8):874-880
pages 874-880 views

Siamese neural network for intelligent information security control in multi-robot systems

Utkin L.V., Zaborovsky V.S., Popov S.G.

Abstract

Anomaly detection of the robot system behavior is one of the important components of the information security control. In order to control robots equipped with many sensors it is difficult to apply the well-known Mahalanobis distance which allows us to analyze the current state of the sensors. Therefore, the Siamese neural network is proposed to intellectually support the security control. The Siamese network simplifies the anomaly detection of the robot system and realizes a non-linear analogue of the Mahalanobis distance. This peculiarity allows us to take into account complex data structures received from the robot sensors.

Automatic Control and Computer Sciences. 2017;51(8):881-887
pages 881-887 views

Application of convolutional neural networks for preventing information leakage in open internet resources

Zhukov D.O., Akimov D.A., Red’kin O.K., Los’ V.P.

Abstract

The architecture of convolutional neural networks has been considered, including the types of layers used and the principles of their operation, settings, and training features. The possibilities of applying this type of network to solve the problems of information leakage prevention in natural language have been described. The possibility of applying them to solve the problem of classifying Internet pages that serve as web resources to identify pages of interest has been studied.

Automatic Control and Computer Sciences. 2017;51(8):888-893
pages 888-893 views

An adaptive model of a distributed intrusion detection system

Platonov V.V., Semenov P.O.

Abstract

We have proposed an adaptive model of a system for detecting intrusions in a distributed computer network. The basis of the detection system consists of various data-mining methods that make it possible to classify network interaction as normal or anomalous using many attributes extracted from network traffic.

Automatic Control and Computer Sciences. 2017;51(8):894-898
pages 894-898 views

Security evaluation of a wireless ad-hoc network with dynamic topology

Kalinin M.O., Minin A.A.

Abstract

This article reviews the approach to security evaluation of wireless ad-hoc networks (mesh networks, MANET/VANET networks, networks of smart houses, etc.), which is based on the method of principal component analysis.

Automatic Control and Computer Sciences. 2017;51(8):899-901
pages 899-901 views

Approaches to detecting active network nodes in IPv6 address space

Ivanov D.V., Moskvin D.A., Ovasapyan T.D.

Abstract

Approaches to detecting active network nodes in the IPv6 address space have been considered. Two principal families of approaches have been considered, i.e., with and without the initial sample.

Automatic Control and Computer Sciences. 2017;51(8):902-906
pages 902-906 views

Architectures for building secure vehicular networks based on SDN technology

Kalinin M.O., Krundyshev V.M., Semianov P.V.

Abstract

The article studies the approach to building secured vehicle networks (VANET, FANET, MARINET, etc.) using the software-defined network technology. The experimental results on evaluating the effectiveness of architectures of secured traffic networks created using supercomputer modeling have been presented.

Automatic Control and Computer Sciences. 2017;51(8):907-914
pages 907-914 views

Detection of encrypted executable files based on entropy analysis to determine the randomness measure of byte sequences

Alekseev I.V., Platonov V.V.

Abstract

A method has been proposed for identifying malicious programs that use encryption as a disguise. In this paper, a modification of the statistical spectral test based on entropy analysis has been described.

Automatic Control and Computer Sciences. 2017;51(8):915-920
pages 915-920 views

Data protection in radio channels of local differential satellite navigation subsystems

Sikarev I.A., Shakhnov S.F.

Abstract

We consider data protection in radio channels of control–correction stations of the GLONASS/GPS local differential subsystem of the river on inland waterways of Russia under the influence of mutual and industrial noise. Based on the investigation of coefficients of the relative sensitivity to variations in the parameters and structure of signals and noise and on the required bit error rate of the element-by-element receiving of digital messages, we introduce estimate criteria for the noise-immunity and functional stability of radio channels. We provide methods to compute the noiseimmunity and functional stability of radio channels. We investigate the variational–parametrical sensitivity of the range size of a control–correction station to variations in parameters of the mutual and industrial noise, as well as its variational–functional sensitivity to variations in the frequency–time structure of the signal and the mutual noise. We find that the parameter variations in industrial noise provide the most sensitive influence on the size of the range of control–correction stations.

Automatic Control and Computer Sciences. 2017;51(8):921-927
pages 921-927 views

Elliptic curves generation for isogeny-based cryptosystems

Aleksandrova E.B., Shtyrkina A.A., Yarmak A.V.

Abstract

Methods of generating supersingular and ordinary elliptic curves for isogeny-based cryptosystems have been studied. The influence of the class field polynomial on the time of generating ordinary elliptic curves has been analyzed and the comparative time of generating curves using Weber and Hilbert polynomials have been presented. Parameters that influence on the cryptographic security of isogeny-based cryptosystems have been considered.

Automatic Control and Computer Sciences. 2017;51(8):928-935
pages 928-935 views

Authentication in dynamic peer-to-peer networks based on homomorphic secret sharing

Shenets N.N.

Abstract

We have proposed a new method for authentication and secret key establishment in ad-hoc networks through public channels based only on verifiable homomorphic threshold secret sharing. The secrecy of the method has been analyzed in standard assumptions with regard to the model of an active adversary represented by a coalition consisting of a pre-threshold number of network nodes. The perfect security of the method is proved in the passive adversary model.

Automatic Control and Computer Sciences. 2017;51(8):936-946
pages 936-946 views

Methods of group authentication for low-resource vehicle and flying self-organizing networks

Aleksandrova E.B.

Abstract

It has been suggested to provide group authentication in self-organizing networks using group signature. Due to the hardware peculiarities of unmanned aerial vehicles, the EDR-BBS scheme on elliptic curves has been selected as the group-signature scheme for FANET. Algebraic structures have been represented by elliptic curves over extended fields of special processor-oriented characteristics.

Automatic Control and Computer Sciences. 2017;51(8):947-958
pages 947-958 views

Models of the formation of CRC values and monitoring sums under the conditions of multiple distortions

Baranov A.P., Baranov P.A.

Abstract

Some probability-theoretical models of packet-mode-transmitted information distortions have been considered. The main attention has been paid to distortions, including the possible interferences that affect several transmission cycles. Distortions are simulated by a sequence of impacts determined by dependent random variables. Correspondingly, k-dimensional CRC values also allow them to be represented as the sum of k-dimensional, differently distributed, dependent random terms. In some cases, they can be reduced to the sums of independent terms in a k-dimensional vector space over a field of two elements; then, the known limit theorems on the convergence to uniform distributions become applicable to them. For impacts that stretch to m cycles, the prospects of obtaining convergence conditions for CRC distributions in the case of sums of m-dependent terms or terms that form a nonhomogeneous Markov chain have been discussed.

Automatic Control and Computer Sciences. 2017;51(8):959-964
pages 959-964 views

A method of providing the integrity of information in the group of robotic engineering complexes based on crypt-code constructions

Samoylenko D.V., Eremeev M.A., Finko O.A.

Abstract

The system of cryptographic code transformation of information based on the aggregated application of block encryption algorithms and polynomial codes of the residual class system has been considered. The complexation of information processing methods ensures the restoration of the integrity of information stored in a group of robotic complexes (RCs) that is subjected to the actions (algebraic manipulations) of the violator, while the physical loss of some predetermined limit number of RCs does not lead to the partial or complete loss of it.

Automatic Control and Computer Sciences. 2017;51(8):965-971
pages 965-971 views

X-PACE: Modified Password Authenticated Connection Establishment protocol

Shenets N.N., Trukhina E.E.

Abstract

In this work the Password Authenticated Connection Establidhment (PACE) protocol, which is used in Europenian smartcard enviroments, is considered. Protocol modifications have been proposed that can enhance its execution speed without decreasing its security. The new version is called X-PACE.

Automatic Control and Computer Sciences. 2017;51(8):972-977
pages 972-977 views

Protection of Wi-Fi network users against rogue access points

Zegzhda D.P., Moskvin D.A., Dakhnovich A.D.

Abstract

Results of an analysis of the mechanisms for protecting Wi-Fi networks have been presented. A Wi-Fi access point authentication method that can be used in various purpose networks has been proposed.

Automatic Control and Computer Sciences. 2017;51(8):978-984
pages 978-984 views

Intelligent data analysis in decision support systems for penetration tests

Poltavtseva M.A., Pechenkin A.I.

Abstract

Intelligent data analysis is extensively applied in various fields of technology, including information security. The development of decision support systems (DSSs) for penetration tests is more complicated due to incomplete, undefined, and expandable unstructured data. This article suggests an approach to formalizing information from subject domains, quantitative relevance estimates of object characteristics, and estimates of object similarity.

Automatic Control and Computer Sciences. 2017;51(8):985-991
pages 985-991 views

Modeling of information influence on remote wireless network devices

Suhoparov M.E., Bazhaev N.A., Krivtsova I.E., Lebedev I.S.

Abstract

A wireless network being affected by a broadcast storm attack has been considered to determine the availability of autonomous nodes and its ability to perform functional tasks under information influence. The conditions for the hacker attacks from a potential intruder have been determined. A wireless device availability analysis has been carried out. A model for determining the technical characteristics of the wireless self-organizing network device has been proposed.

Automatic Control and Computer Sciences. 2017;51(8):992-999
pages 992-999 views

Analysis of the constructing principles and methodology for evaluating the security of shoulder-surfing resistant graphic passwords

Yakovlev V.A., Arkhipov V.V., Adadurov S.E.

Abstract

In the recent scientific literature, many proposals have been made to increase the resistance of password systems to shoulder surfing attacks. These passwords are called shoulder-surfing resistant graphic passwords (SSRGPs). This paper presents a general methodological approach to analyzing and evaluating the resistance of SSRGPs, which can be described in terms of the input tables.

Automatic Control and Computer Sciences. 2017;51(8):1000-1010
pages 1000-1010 views