×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • An algorithm for protecting software from illegal copying

    With the development of digitalization of all spheres of society, the relevance of developing new software, and therefore methods of protecting it from illegal copying and reproduction, increases significantly. The main risks are related to both hacking of the finished release and leakage of individual code segments at the development stage. At the same time, the chances of leakage directly depend on both the number of specialists involved in the development process at different stages and the number of stages themselves. The purpose of this work is to develop an embedded module aimed at protecting software or its individual elements from illegal copying and further reproduction.

    Keywords: software protection, information protection, embedded security module, hardware binding

  • Analysis of foreign experience in the application of intelligent methods in the tasks of protecting objects of critical information infrastructure of the financial sector

    The constant growth of cyber attacks on the financial sector requires the construction of a modern protection system based on the use of artificial intelligence or machine learning. The paper provides an analysis of specific products and solutions of the global market based on artificial intelligence technologies that can be used to protect critical information infrastructure.

    Keywords: cyber attacks, critical infrastructure, artificial intelligence, information security, machine learning

  • Detecting unauthorised intrusion into wireless peer-to-peer networks

    This paper analyses intrusion detection techniques and provides recommendations for preventing intrusions in peer-to-peer wireless networks. Peer-to-peer wireless networks are particularly vulnerable to attack due to their openness, dynamically changing topology, collaborative algorithms, lack of centralised monitoring, centralised control point and lack of clear protection. Intrusion detection techniques exist in wired networks but they are not applicable in wireless environment. The paper also presents a new intrusion defence method based on intrusion detection in peer-to-peer wireless networks.

    Keywords: security, vulnerability, information protection, attack, intrusion, wireless network, mobile network, detection system, IDS, MANET, DoS, DDoS

  • Development of the concept of securing the critical infrastructure of the financial sector

    The paper is devoted to the development of a security concept for the protection of critical information infrastructure of the financial sector. The critical information infrastructure of the financial sector is analyzed, and the main types of cyberattacks are considered in relation to the objects in this area. The concept of security is proposed, including access control, multilevel protection, data encryption, continuous monitoring and other measures. Models of the main threats to the security of information infrastructure objects of the financial sector are given. The question of the importance of cooperation and information exchange between financial institutions, regulators and law enforcement agencies to ensure collective security of the financial sector is raised. The article will be useful for specialists in the field of information security, financial sector and managers of organizations interested in developing and improving the security system of information infrastructure of the enterprise.

    Keywords: information security, information infrastructure, financial sector, mathematical modeling, software package

  • Statical algorithms for identifying unique features from a person's handwritten signature

    One of the most reliable methods of identity verification are biometric authentication methods. There are two types of methods: static and dynamic. Static methods include fingerprint scanning, 3D facial recognition, vein patterns, retina scanning, etc. Dynamic methods include voice verification, keyboard handwriting and signature recognition. As of today, static methods have the lowest type I and II error rates, because their primary principle of operation is based on capturing a person's biometric characteristics, which do not change throughout their lifetime. Unfortunately, this advantage, which accounts for such low type I and II error rates, is also a drawback when implementing this method for widespread use among internet services. If biometric data is compromised, user can no longer safely use method everywhere. Dynamic biometric authentication methods are based on a person's behavioral characteristics, allowing user to control information entered for authentication. However, behavioral characteristics are more vulnerable to changes than static, resulting in significantly different type I and II errors. The aim of this work is to analyze one of the dynamic methods of biometric authentication, which can be used in most internal and external information systems as a tool for authorization or confirmation of user intentions. Biometric user authentication based on their handwritten signature relies on comparing unique biometric features that can be extracted from signature image. These unique features are divided into two categories: static and dynamic. Static features are extracted from signature image, based on characteristics such as point coordinates, total length, and width of the signature. Dynamic features are based on coordinate dependency of the signature points over time. More unique features are identified and more accurately each is weighted, the better type I and II error rates will be. This work focuses on algorithms that extract unique features from static characteristics of signature, as most signature peculiarities are identified from the dependencies of writing individual segments of the signature image.

    Keywords: static algorithms, metrics, signature length, scaling, signature angle

  • Dynamic algorithms for identifying unique features from a person's handwritten signature

    Currently, to access information contained in autonomous and external information systems, user must pass an authorization process using modern methods of identity verification, such as: password protection, protection based on one-time codes, electronic signature-based protection, etc. These methods as always have worked well and still continue to provide secure access, however, biometric authentication methods are more reliable when access to confidential information should be limited to a single user. Today, there are two types of biometric authentication methods: static and dynamic. Static methods based on a person's biological characteristics that remain with them throughout their life, while dynamic methods based on a person's behavioral characteristics. Static methods are considered some of the most accurate, because most biometric parameters do not change over a lifetime. However, this method should only be used if chance of data compromise is very low, because in the event of leak, user will not be able to continue using these types of methods anywhere else. Dynamic methods, due to their behavioral characteristics, do not have sufficiently satisfactory type I and II error rates, as they directly depend on user's psychological and physical state. However, unlike static methods, user can control the information that will serve as a secret key for authorization in the future, so in case of a leak, user can always change the contents of the key for current and future services. This work examines one of these dynamic methods of biometric authentication: verification by handwritten signature. This method is considered more attractive among its counterparts, as in case of successful type I and II error rates, it can be applied in most existing services as a tool for authentication and confirmation of user intentions when signing various types of documents. The article discusses the main algorithms for verifying handwritten signatures by identifying unique dynamic features, dependent on the temporal and coordinate values of the analyzed samples of handwritten signatures.

    Keywords: dynamic algorithms, feature extraction, signature writing time, proximity of point coordinate functions, Fourier transform

  • Principles of creating a server architecture for stable operation of iTOP CMDB and ensuring protection of the server from hacker attacks

    In the development of cloud providers, not only the types of services they provide play a significant role, but also fault tolerance to service failures. It is important for a cloud service provider to prepare and configure the server and service for fault-tolerant operation so that the customer works with a high degree of readiness and reliability in the system allocated to him. To prepare such a server, it is very important to think carefully about the architecture of the virtual machine, on which all the necessary means of data exchange and integration for the operation of the service will be installed, and protection against network threats that can disrupt the server's performance will be configured. The purpose of the work is to create a virtual machine architecture protected from network threats, which provides customers with access to the iTOP CMDB system. Despite the fact that there can be any number of customers, the iTOP CMDB system should be provided to each customer with its own version, which he can administer. The user can log in using an Internet browser by entering the name of his organization as a domain. The authors present a demonstration of the iTOP CMDB system, which is located on a virtual machine protected from network threats.

    Keywords: virtual machine, architecture, firewall, iTOP CMDB system, server, network threat, network attack, IP address, firewall, request

  • Organization of a cartographic database management system with associative protection

    The concept of a two-dimensional associative masking mechanism, introduced earlier and necessary for further consideration, is used to protect the data of cartographic scenes represented by point, linear and areal objects. The masking mechanism is the basis of associative steganography. In this case, the objects and coordinates of the scene are represented by code words in the alphabet of postal symbols and are masked with the further formation of stegocontainers. A set of masks is a secret key used further to recognize a scene represented in a protected form by a set of stegocontainers. The article deals with the organization of specialized DBMS for the protection of cartographic scene data with the introduction of two levels of such DBMS – server and client. Mono- and multicluster organization of request processing is offered for the server part of the DBMS. Practical recommendations on the use of mono- and multiclusters are given.

    Keywords: associative steganography, masking, stegomessage, cartographic databases, parallel DBMS, mono- and multicluster, scene analysis, cryptography, stegostability, information security

  • Choosing Strategies for Ensuring Information Security of the Protected Object in Conditions of Uncertainty and Counteraction

    The work is devoted to the problem of decision support in the field of information security. The aim of the work is to build (within the framework of the game-theoretic approach) an iterative procedure for determining a mixed game strategy for ensuring information security under the uncertainty of the state of the protected object and countering an intruder. The use of the methodological apparatus of simulation modeling (along with the use of the Brown-Robinson fictitious enactment method) is due to the possible non-Poisson type of event flows leading to a change in the state of the protected object, as well as the complexity of solving stochastic games with three participants. The application of the developed procedure makes it possible to increase the scientific validity of managerial decisions on the choice of protection strategies for stochastically dynamic (changing their state randomly) objects.

    Keywords: information security, uncertainty, counteraction, game-theoretic approach, simulation modeling

  • Approach for implementation of stream cipher based on fuzzy pseudo-random secquences generator

    An approach for cosntruction of stream ciphers based on new type of cipher gamma generators with a non-linear (fuzzy) shift register selection function is proposed. The best configuration of generator is selected for generating a gamma whose properties are closest to white noise. It is shown that the proposed approach makes it possible to generate a gamma sequence with a quality that exceeds a number of other classical generators.

    Keywords: cryptography, stream cipher, gamma, PNSG, random test, fuzzy logic,membership function, linguistic variable, defuzzification, linear feedback shift register

  • The use of universal adversarial attacks in the tasks of increasing the effectiveness of protection systems against robots and spam

    This article discusses the use of universal adversarial as well as to improve the effectiveness of protection systems against robots and spam. In particular, the key features that need to be taken into account to ensure an optimal level of protection against robots and spam are considered. It is also discussed why modern methods of protection are ineffective, and how the use of universal adversarial attacks can help eliminate existing shortcomings. The purpose of this article is to propose new approaches and methods of protection that can improve the effectiveness and stability of protection systems against robots and spam.

    Keywords: machine learning, clustering, data recognition, library Nanonets, library Tesseract

  • Developing the associative file protection application

    In today's information environment, characterized by the increasing digitalization of various aspects of daily life, information security is of paramount importance. Many types of personal information, including identity, financial and medical records, are digitally stored. Organizations need to protect their intellectual assets, sensitive data and business information from competitors and insider threats. The synergistic approach of combining cryptography and steganography provides increased sophistication in analyzing transmitted data and reduces its vulnerability to attacks based on statistical analysis and other pattern detection techniques. Associative Steganography is a methodology that integrates the basic principles of steganography and cryptography to provide strong data protection. The development of a software application designed for associative file protection can be applied in a wide range of areas and has significant potential in the context of information security. In this article the prerequisites for creating this application are discussed, the program design of the application is described using UML (Unified Modeling Language) and aspects of its implementation are analyzed. In addition, the results of testing the application are investigated and further prospects for the development of associative steganography are proposed.

    Keywords: associative steganography, stego messaging, stego resistance, cryptography, information security, Unified Modeling Language, .NET Framework runtime, Windows Presentation Foundation, DeflateStream, BrotliStream, MemoryStream, parallel programming

  • The method for the technical and economic assessment of options for building an organizational and technical system of the "cyberpolygon" class

    The article is devoted to the study of problematic issues of the formation of organizational and technical systems of the "cyberpolygons" class using the original methodological apparatus for the feasibility study of system engineering solutions for their construction. The features of existing approaches to the justification of system engineering solutions for the construction of organizational and technical systems, information technology and technical systems are considered. Directions for their development are proposed, taking into account the dynamics of the phased creation and modernization of organizational and technical systems with simultaneously developing infrastructure projects and solutions. Formal aspects in the methodological apparatus are reflected in the change in the composition of the functional components in the conceptual and analytical models, the corresponding formal descriptions of their relationships and characteristics, as well as in the modification of the procedures for the technical and economic assessment of options for building a cyberpolygon. The method of technical and economic evaluation of options for constructing a cyberpolygon proposed in this study makes it possible to rank alternative options for the infrastructures of the created cyberpolygon according to the value of their technical and economic efficiency and to select the rational one from them.

    Keywords: information security, infrastructure, cyberpolygon, feasibility study, means of protection

  • Method of normalization of fields of external sources of the MITRE CTI cyberattack data repository

    The growing complexity of industrial systems significantly increases the surface of possible cyber attacks, and therefore requires reliable methods for assessing the security of infrastructure. Modern methods of security assessment rely on working with a large amount of data, the presentation of which is often not standardized. One of these sources is the MITRE ATT&CK knowledge base, which contains information about attacking techniques in a format that allows you to interact with it programmatically. This work is aimed at solving the problem of normalizing the fields of external sources describing the attacking technique in order to increase the efficiency of working with the repository described above. The method proposed in this paper is based on the possibility of the specification of the STIX language used to describe the data presented in MITRE ATT&CK to expand and use open dictionaries. The development of the proposed method was based on data on the attacking techniques of the Enterprise matrix, as the most complete among all domains of the ATT&CK knowledge base, however, the proposed method is independent and does not depend on a specific domain.

    Keywords: threat analysis, knowledge base, information security, MITRE ATT&CK, standardization

  • Application of ontologies in learning systems

    The article provides general information about ontologies (including definitions of ontology), its formal (mathematical) model, and also provides a step-by-step process for developing an ontology. The areas of application of ontologies are considered and special attention is paid to the use of ontologies in the field of education. There are some suggestions about using ontologies as a knowledge base for an information security learning system. Also the fragment of a graphical representation of an ontology for biometrics, which is one of the areas of information security, is given. Ontology for biometrics is based on the national standard and developed in the Protege system.

    Keywords: biometrics, knowledge, information security, knowledge representation model, learning system, learning, ontology, ontological model, OWL, RDF

  • Blockchain as a service for protecting information about the authenticity of educational diplomas

    The problem of fake diplomas of education causes alarm and concern to society. In the digital age, falsification has reached great proportions. In this regard, a mechanism for recording and confirming the authenticity of diplomas using technology is proposed. A sector-token method of accessing a blockchain record is proposed. The recording technology and the blockchain formation model are shown. The proposed technology guarantees that the diplomas are genuine, protected from forgery, belong to the specialists who received them.

    Keywords: blockchain, data protection, diploma forgery, educational institution, authentication

  • Advantages and disadvantages of using personal mobile devices in financial institutions

    This article discusses information system vulnerabilities associated with the use of personal mobile devices in financial services companies. The recommendations of this study will help to understand the importance of formulating an information security policy in this situation. The use of personal devices by employees has become commonplace in the workplace due to the increased reliance of business processes on Internet-based services and advances in technology. The organization benefits from the fact that employees buy, use their own devices, thus, the organization reduces the cost of providing employees with computer equipment and software for workplaces. However, a company can suffer huge losses if the use and connection of personal devices to the company's information technology infrastructure is not regulated and controlled. Hacking personal devices by intruders allows you to gain unauthorized access to the assets of information systems. Financial institutions handle highly sensitive information, which makes them more vulnerable when using personal devices. A qualitative research method was conducted with specially selected participants working in the information security departments of financial institutions. The study revealed the lack of an information security policy regarding personal devices and the use of an unlimited number of such devices by employees.

    Keywords: personal mobile devices, information security, unauthorized access, vulnerabilities, cyber attack

  • Development of a training system for modeling and demonstrating cryptographic protocols quantum key distribution

    The analysis of the foundations of modern cryptographic systems is carried out. Problems of classical cryptography arising in the development of quantum computers are considered. Considered are cryptographic protocols of quantum key distribution, their advantages and disadvantages. The analysis of stands for simulation of quantum key distribution available on the market is carried out. The rationale for the need to develop a training system has been made. The authors have developed a system for modeling and demonstrating quantum cryptographic protocols BB84, B92 and BB84 (4 + 2), intended for a detailed study of the principles of quantum cryptographic protocols in dynamics. The system provides the process of work both in text and graphic form. The developed system fully meets the needs of teaching students modern quantum information security technologies.

    Keywords: information security; encryption; quantum cryptography; modeling; education system

  • Methodology for the automated process of a complex technical system construction managing

    When building complex technical systems, as a rule, the resources of an existing system are used as a basis, which may be redundant due to the lack of a clear definition of what the system is needed for. This necessitates the determination of the system intended purpose, the selection of elements for its construction and management in the process of its operation, aimed at achieving the intended purpose and optimizing the resource support used to build the system. The paper proposes an approach to building a system based on the development of its functioning profile, which characterizes the achievement of its intended purpose, modeling the process of a complex technical system functioning and evaluating the effectiveness of the profile. The use of the proposed methodology will allow, at the stage of building a complex system, to improve the quality and efficiency of designing a complex technical system by taking into account the functional needs of the system, as well as determining the amount of resources required to fulfill them.

    Keywords: profile, complex technical system, criticality, system design, system construction, control process automation, functions, tasks, resource

  • Information security as an element of economic security

    This article discusses and demonstrates the need for writing and functioning of a high-quality information security system for a modern enterprise that performs activities in various fields (industry, energy, humanitarian activities, etc.). Its role in creating conditions is also analyzed. for the economic security of the organization itself and the country as a whole. The paper presents the current classification of information security threats. The activities that are aimed at protecting data in the world of the modern world are analyzed once again, and examples of activities aimed at protecting data in the world of the modern world are given, as well as an example of the most common reasons for its leakage today.

    Keywords: information security, economic security of an enterprise, information protection, threats and risks of information security, artificial intelligence

  • Methods of processing biometric data of handwriting

    This paper presents methods of processing handwritten biometric data. The initial data are coordinates of a position of a pen on a graphics tablet. For this, the proprietary database of handwriting samples and the open signature database SVC 2004 were used. The proprietary database includes 29 users, 754 random and 754 simple forgeries. At the stage of biometric data processing, the following methods were used – «interpolation of handwriting» (entering points at an equal distance between the initial points of the handwritten signature), the histogram approach, «pen movement speed» (the path traveled by the pen at different stages of handwriting input process). Such methods eliminate the variability of the biometric data over time and over spatial axes. As a result, we recommended a standardization approach (Z-score), discretization (one-dimensional linear interpolation and discretization with variable step based on arithmetic progression) of biometric data. The table of results presents the values of the quality of biometric features. The obtained experimental results will be useful for researchers to improve their studies in the field of biometric security systems

    Keywords: handwriting, biometric data, graphic tablet, verification, authentication, standardization, discretization, interpolation, information security

  • A study of the subliminal impact factors of audio-visual information

    An urgent task in the context of digitalization of all spheres of society is to create a system of protection against the negative impact of digital images on the person. The solution to this problem is impossible without assessing the subliminal impact of audio-visual information. The study presents a solution to the problem of systematization of subliminal factors of audio-visual information and optimization of methods to deal with them. Risk factors and limitations as the basis for the design of the protection system at the level of technical.

    Keywords: information security, modeling, risk factors, subliminal impact, digital image

  • A method for detecting and counteracting the spread of malicious information in swarm robotic systems in the process of task distribution

    The growing popularity of the use of group robotics, including swarm robotic systems (SRS), actualizes the issues of information security. Known approaches to detecting malicious behavior of agents or malicious information do not take into account the scalability and decentralization properties of SRS, which does not allow ensuring the integrity of information circulating through communication channels within SRS. In turn, the dissemination of malicious information in the process of distributing tasks between SRS agents initially reduces the efficiency of performing these tasks, that is, an attack is carried out on the very first and most critical stage of the system's functioning. The purpose of this work is to improve the efficiency of the functioning of SRS agents in the presence of malicious agents by developing a method for detecting and counteracting the spread of malicious information. The elements of scientific novelty of this work include the following. As part of solving the problem, a number of specific criteria are proposed that take into account the distribution of tasks in the SRS, as well as a classifier based on an artificial neural network to detect malicious information. To improve the accuracy of detection and counteracting the spread of malicious information in SRS, a modification of the reputation mechanism is proposed. A distinctive feature of the modification is not only the formation of an indicator of the truth of the message information in the process of task distribution, but also the assessment of the influence of malicious agents on the process of forming this indicator. The presented solution is implemented in the form of software in the Python programming language, which can be used in modeling decentralized control systems of SRS.

    Keywords: swarm robotic systems, task distribution, artificial neural networks, trust and reputation mechanism

  • Overview of the Internet of Things Security Threats

    The concept of the Internet of Things (IoT) was introduced by Kevin Ashton at the Massachusetts Institute of Technology in 1998. The vision of the concept is that objects, “things”, embrace each other and, therefore, see IoT, in which each object has its own individual volume identity and can interact with other objects. Internet objects can make a big difference in size from small to very large. The Internet of Things is turning into ordinary products such as cars, buildings, and machines into smart devices, connected objects that can communicate with people, applications, and others with devices. In the article, we observe the widespread use of the Internet in large cities and its impact on various industries. The paper discusses the security threat of the Internet of Things, resulting in security recommendations.

    Keywords: IoT, NB-IoT, security, security threats, Cybercrime, Computer security

  • The role of Blockchain technology in the implementation of cybersecurity

    Blockchain technology has been adopted in various fields, primarily in finance, through the use of cryptocurrencies. However, this technology is also useful in cyber security. This article discusses various Blockchain methodologies for the cybersecurity sector proposed by various researchers. This study showed that most researchers are focused on using Blockchain to secure IoT devices, networks and data. This paper looked at the strategies used by earlier researchers to secure three problematic IT areas using Blockchain. The main conclusion of the study was to ensure the integration and uniformity of solutions so that future researchers focus on a single Blockchain to create cybersecurity applications.

    Keywords: blockchain, Internet of things, IoT, cyber security, computer security