×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • The approach to evaluating DLP-systems using fuzzy logic

    Currently, the software market offers a multitude of diverse DLP-systems designed to protect confidential information from leaks. Since such systems have a relatively high cost, it is advisable to select the optimal option before acquisition and implementation, as incorrect selection will lead to unnecessary costs and ineffective control of information. The paper describes the base of the rules of the fuzzy inference system, designed to evaluate the DLP-system. Practical use of the proposed fuzzy system allows to perform a reasoned choice of such a DLP-system that most fully meets the requirements of a particular organization and provides the required level of protection of information from leaks. At the same time, the evaluation is performed according to several criteria, the values ​​of which, based on expert estimates, are input variables of the fuzzy inference system. At the output of the system of fuzzy inference, a comprehensive evaluation of the DLP-system is formed, which reflects the degree of its suitability for implementation at a particular enterprise.

    Keywords: Information security, data protection, protection of confidential information, DLP-system, artificial intelligence, fuzzy logic, fuzzy inference system

  • Application of the combined neural network method for web-oriented low-rate DDoS-attack detection

    In this paper we present the method of detecting of low-rate DDoS-attacks on the http-services. A low-rate attack model in the form of a chronological series of events with an additive superposition of attack and normal traffic is used. The task of developing a method of detection of low-rate attacks is formulated as allocation of homogeneous groups (patterns) of the time series, based on pattern recognition models, and the subsequent construction of prediction model for each separate group.

    Keywords: intrusion detection; low-rate attacks; denial of service, artificial neural network; networks security, pattern recognition

      The article is devoted to improving the performance of cryptographic transformations performed encoders stream ciphers made on the basis of the inner product generator. Such generators are a variety of clock-controlled shift register that can improve the statistical properties of the resulting sequence. The disadvantage is that to get a one character of sequence to submit several clock. The scheme of the inner product generator, based on the algorithm reimplementing feedback shift register recurrence, which allows for one step to produce a single character of sequence, is constructed and described in this article.

    Keywords: parallel logical computations; cryptographic transformation; Linear Feedback Shift Register; stream ciphers; clock-controlled shift register, inner product generator

  • Develop a system to protect electronic documents from being copied

    The article describes the development of a system to protect electronic documents from being copied. The article discusses the legal aspects of information security, the main threat to leak the information and statistics information leakage channels. The analysis of the analogues. A scheme of work developed by the Web service.

    Keywords: information security, electronic documents, eToken, copyright, web-service.