×

You are using an outdated browser Internet Explorer. It does not support some functions of the site.

Recommend that you install one of the following browsers: Firefox, Opera or Chrome.

Contacts:

+7 961 270-60-01
ivdon3@bk.ru

  • The problem of single file sanitizing on solid-state drives

    This article considers the issues of guaranteed deletion of information on solid-state drives. A review of the requirements of the domestic regulatory framework in terms of formulating the requirements for guaranteed deletion of information is carried out. The analysis of domestic and foreign standards and methods of guaranteed deletion of information are carried out. The features of solid-state drives and the applicability of domestic and foreign standards of sanitizing data for such drives are also considered. The problem of guaranteed deletion of individual files on solid-state drives without the possibility of recovery is indicated. Key problems that arise during guaranteed deletion of individual files on a solid-state drive without taking it out of service are highlighted. Conclusions about the impossibility of effective implementation of guaranteed deletion of individual files on solid-state drives in the process of using the drive, without taking it out of service, are made.

    Keywords: data recovery, solid state drive, wear leveling, garbage collection, guaranteed data destruction

  • System for user recognition based on extracted voice features using Kalman filter

    The problem of personality recognition by voice using adaptive Kalman filter is considered. The extracted features of the acoustic signal are used as features of biometric authentication person. A comparative table of speaker separation errors and evaluation speaker separation system using Kalman filter is presented.

    Keywords: biometric authentication, voice, neural network compilation, adaptive Kalman filter

  • Detecting vulnerabilities and implementing website security practices

    Security vulnerabilities are always a burning issue that website administrators spend a lot of time on researching in order to keep the website running securely. These vulnerabilities allow hackers to exploit, attack, infiltrate and influence the data of any company's websites. For stable, smooth and secure website operation, it is necessary to know the basic information about website security vulnerabilities. This article analyses the methods of detecting website vulnerabilities and applying effective measures to ensure website security. The article provides current challenges in the field of information security, describes methods of vulnerability detection and gives recommendations for the application of specific measures to secure websites.

    Keywords: website security, vulnerability, information security, code, software, security vulnerability scanning

  • Reliability Model of RAID-60 Disk Arrays

    The general characteristics of the innovative RAID-60 data storage system, which combines the best aspects of RAID-6 and RAID-0E technologies, as well as the reliability model of this data storage sys-tem, are presented. The main purpose of this connection is to provide outstanding performance with maximum data redundancy. The arti-cle discusses in detail the structural analysis, advantages and various scenarios for the use of the specified RAID-60 data storage system and the proposed model of its reliability. An important aspect is also the comparison of the RAID-60 system with other widespread vari-ants of data storage systems, such as RAID-0, RAID-1 and RAID-5, as well as with the reliability models of these systems. Particular at-tention is paid to the formula that allows you to calculate the average operating time to failure of a disk array. Also, for completeness of the analysis, attention is paid to plotting the probability of a RAID-60 failure (P(t)) over time (t). This graph is an important tool for visu-alizing the dynamics of reliability of data storage systems.

    Keywords: RAID-60, reliability, disk array, data redundancy, manufacturer, parity blocks, data storage

  • Complex biometric authentication of information system users using neural networks

    The result of the research is a method of complex biometric authentication. The method is implemented in the form of a software complex consisting of a subsystem biometric authentication by face image and a subsystem biometric authentication by voice. The training sample consisting of stored files biometric images (facial images and audio recordings) allows to reduce the error rates of the first and second kind in user recognition. The proposed method of biometric authentication is designed to improve the efficiency user recognition processes.

    Keywords: authentication, biometrics, neural network architecture, training sampling

  • Method for ensuring data confidentiality using orthogonal matrices

    The application of orthogonal matrices in information processing and transformation systems is considered. A method is proposed for assessing the results of protective masking of audio information using Walsh-structured quasi-orthogonal Mersenne matrices.

    Keywords: orthogonal matrix, message masking, masking/unmasking algorithm, amplitude-frequency response, white noise, root mean square error, signal-to-noise ratio

  • Vulnerabilities and methods of protection of the ROS operating system when implementing a multi-agent system based on the Turtlebot3 robot

    The problem of vulnerabilities in the Robot Operating System (ROS) operating system when implementing a multi-agent system based on the Turtlebot3 robot is considered. ROS provides powerful tools for communication and data exchange between various components of the system. However, when exchanging data between Turtlebot3 robots, vulnerabilities may arise that can be used by attackers for unauthorized access or attacks on the system. One of the possible vulnerabilities is the interception and substitution of data between robots. An attacker can intercept the data, change it and resend it, which can lead to unpredictable consequences. Another possible vulnerability is unauthorized access to the commands and control of Turtlebot3 robots, which can lead to loss of control over the system. To solve these vulnerabilities, methods of protection against possible security threats arising during the operation of these systems have been developed and presented.

    Keywords: Robotic operating system (ROS), multi-agent system, system packages, encryption, SSL, TLS, authentication and authorization system, communication channel, access restriction, threat analysis, Turtlebot3

  • Securing of images in the city traffic management system from unauthorized use

    The paper discusses a stegoalgorithm with localization of the embedding area in the YCbCr color space to protect images of a license plate, a vehicle from different angles, a traffic event, as well as issues of developing a software system that implements the stegoalgorithm. Image protection allows you to effectively implement the concept of multimodal interaction of socio-cyberphysical systems in an automotive self-organizing network. Evaluations of the effectiveness of the developed method are provided.

    Keywords: VANET, intelligent transport networks, city traffic management system, steganography, information security, watermark

  • Hierarchical Dynamic Information Security Management System for an Enterprise Information System

    The problem of developing the architecture of a dynamic information security management system for an enterprise information system, based on the hierarchical organization of the management system, analysis of the state of the computer system in the information space, analysis of the spread of risk flow, as well as multi-agent organization of the processes of collecting, analyzing data and making decisions is considered.

    Keywords: information protection, enterprise information system, security policy, information security management, risk analysis, zero trust architecture, multi-agent technologies, neural network forecasting

  • On the role of information impacts in the context of national security

    The article discusses issues related to the level of existing technological development and the role of information impacts in the modern world. The necessity of an interdisciplinary approach in training an information security specialist is substantiated. A number of examples are considered on the historical material, indicating the causal relationship between actions in the information space and the events of the material nature, the scale of the consequences has been noted. The process of forming a value system and the potential possibility of changing it are considered. The influence of the level of development of information delivery means on the effectiveness of information impact is noted. An example of using media content to transmit non-verbal signals is given. Using the example of cinematographic products, the principles of deformation of the system of traditional values through the introduction of a new term and a change in attitude towards it are considered. The need for additional measures to counter information threats is substantiated. Ways to reduce the risk of negative consequences from harmful information influences are proposed.

    Keywords: information space, information security, information threat, information delivery tools, information impact, counteraction of the threat

  • Feasibility study for the selection of optimal attack (intrusion) detection tools for the needs of monitoring centers of the Russian Federation

    The subject of the study is the technical and economic characteristics of attack detection tools that affect the effectiveness of their use for the system for detecting, preventing and eliminating the consequences of computer attacks on critical information infrastructure facilities of the Russian Federation. An analysis of approaches to selecting the best solutions is presented, the result of which formed the basis of the proposed solution. The article contains a study of approaches to solving the problem of feasibility study of choice, formalizing the formulation of the problem and a mathematical model for solving the problem of choosing the optimal attack detection tool for implementing the corresponding tasks. The research methods used include systems analysis, modeling and peer review methods. The purpose of developing the methodology is to increase the level of validity of decision-making on choosing the best of the proposed attack detection tools. The research results presented in the article can be used to carry out a feasibility study of decisions made when choosing attack detection tools for the needs of monitoring centers of the Russian Federation. The proposed methodology for conducting competitive analysis can be used as the basis for conducting appropriate research for each means of the system for detecting, preventing and eliminating the consequences of computer attacks on the information resources of the Russian Federation.

    Keywords: attack detection tools, intrusion detection tools, feasibility study, competitive analysis, information security tools, decision support system, information security system, optimization, integer linear programming

  • Zero Trust Architecture Design Patterns

    The features of designing security systems based on the zero trust model are considered. The problem of developing security policy patterns is considered. The problem of choosing the points of application of the security policy based on the analysis of the risk flow is discussed. An example of a security pattern in the DRAKON language is given.

    Keywords: information security, zero trust architecture, enterprise architecture, security policy patterns

  • Model of configuration of structural and functional characteristics of departmental information systems

    This paper considers the conditions and factors affecting the security of information systems functioning under network reconnaissance conditions. The developed model is based on the techniques that realize the dynamic change of domain names, network addresses and ports to the network devices of the information system and false network information objects functioning as part of them. The formalization of the research problem was carried out. The theoretical basis of the developed model is the theories of probability and random processes. The modeled target system is represented as a semi-Markov process identified by an oriented graph. The results of calculation of probabilistic-temporal characteristics of the target system depending on the actions of network reconnaissance are presented, which allow to determine the mode of adjustment of the developed protection measures and to evaluate the security of the target system under different conditions of its functioning.

    Keywords: departmental information system, network intelligence, structural and functional characterization, false network information object

  • Intelligent detection of steganography transform based on containers classification

    The possibility of detection of steganography in digital images based on the classification of stegocontainers is investigated. The obtained results demonstrate the effectiveness of using deep neural networks for solving this problem. The LSB method can be detected using EfficientNet b3 architecture. The achieved classification accuracy is above 97%. Using of steganography methods in frequency domain can be effectively detected by classifying their representation in the form of a digital YCrBr model, with augmentation (vertical and horizontal rotations). The classification accuracy is above 77%.

    Keywords: Steganography, stegocontainer, machine learning, classification, digital image, deep learning, CNN, EfficientNet b3, confidentiality, information protection

  • Text information extraction from images of modified text

    This article describes development of a module which provides opportunity to extract text from images of modified text, which can be used to bypass existing information security software and spread sensitive information out of company. The developed module is based on Python programming language with additional libraries expanding basic functional. After creating a module, additional module allowing user to create modified text by themselves was made. Additional module uses a special dictionary that can change any letter to alternative and generate more modified texts in order to test and find the weak spots of a module. To integrate the module into company’s information infrastructure DLP-systems were chosen, because of their popularity and ease of the integration method. To integrate DLP-system and text extraction module we used a mail-server with BCC copies of a mail traffic to send text and images to our module local mail server, additional mechanisms extracts pictures and process them within the module, after what it sends back the image and the text from it. A few rounds of testing were done resulting in nearly 97% accuracy. Future development consider expanding for multi-row processing and adding new alternative symbols after first mention them in text by using a CNN or standard deviation of images pixel and pixel comparison.

    Keywords: information security, data leakage, text analisys, image analisys, modified data analisys, protection against steganography

  • Features of designing security systems based on zero trust architecture

    To optimize the life cycle of information systems, the design uses abstract models that describe the main elements of the system architecture. Zero trust architecture is a new concept of information security that takes into account the remote format of employee access to the assets of an enterprise information system. The main features of zero trust architecture are considered.

    Keywords: information security, enterprise information system, zero trust architecture, security policy

  • Designing the ontological model for the domain model of «Information security»

    This article describes aspects of ontology design for the sphere of information security. There are some examples of the use of ontologies in the sphere of information security including risk management, classification of threats and vulnerabilities, monitoring incidents, as well as examples of existing developments of ontologies for information security. The relevance of the development of legal ontologies is determined and examples of their use in practice are given. Also, the importance of designing a legal ontology for the subject area of information security under consideration is given due to the presence of a large legal framework. The paper presents the developed ontology model for one of the regulatory documents in the field of personal data protection. The approach to ontology design presented in the paper is proposed to be applied in the development of an information security learning system.

    Keywords: security, information security, protection of information, information, domain model, normative legal act, ontology, ontological approach, design, legal ontology

  • Efficiency of data encryption in wireless broadband access technology

    The article is devoted to an overview of protocols used in broadband wireless networks and methods of protecting the information's transmission in them using encryption algorithms. Theoretical and practical aspects, features and principles of wireless access protocols in Wi-Fi, WiMAX, GSM, etc. are considered. An overview of the used data encryption methods, vulnerabilities encountered in algorithms, and methods for solving these problems considered in various laboratories is carried out. The purpose of the study is to review the encryption algorithms used in wireless access protocols. Based on the analyzed data, a conclusion was made on the use of the AES and A5(128) algorithms, as well as the attack protocols and solution methods identified on the data. The object of the study is the technology of wireless local broadband access. The subject of the study is the encryption algorithms underlying wireless broadband networks Scientific novelty. A review was carried out in encryption algorithms used in various wireless network standards. The information security threats arising in the AES and A5 encryption standards related to attacks using linked and session keys are considered.

    Keywords: information technology, cryptography, data protection, encryption algorithm, AES, A5, WiMAX, Wi-Fi

  • Features of building a special communication system based on fiber-optic lines

    The article discusses the features of constructing a special connection based on fiber-optic communication lines. An analysis is conducted on the reliability of using fiber-optic communication lines in terms of the possibility of unauthorized interception of transmitted information. The advantages of practical use of communication systems based on fiber-optic lines are presented. The methods of protecting fiber-optic communication lines from unauthorized access are considered, where the priority method of protecting information is encryption using various methods. In conclusion, the measures necessary for building a reliable communication system based on fiber-optic lines are emphasized.

    Keywords: information, special communication, communication segments, public communication, optical fiber, fiber-optic lines, unauthorized access, encryption, communication system construction, cryptographic protocols

  • Modeling the concept of a smart home in a virtual environment Cisco Packet Tracer

    This article discusses the technology of the Internet of things, which is used to connect smart objects to the network, for intelligent control of the power system and automation of household processes. Intelligent power system management aimed at ensuring a more uniform use of electricity and minimizing energy losses during transmission and consumption of electricity. This technology is currently being promoted globally by utilities, scientific organizations, and governments. In this work, also, a conceptual model of a smart home is built in the Cisco Packet Tracer virtual constructor and diagrams of device interaction at all levels of network construction are given.

    Keywords: internet of Things, IoT, cybersecurity, automation, Cisco Packet Tracer

  • Analysis of modern data encryption algorithms

    The article is devoted to the analysis of modern data encryption algorithms. The introduction gives an overview of the most common encryption algorithms, such as AES, RSA and SHA. The main part of the article includes an analysis of vulnerabilities of modern encryption algorithms and considers various attack methods. It concludes by drawing conclusions that it is necessary to use comprehensive data protection methods and periodically update the encryption algorithms used to prevent possible attacks.

    Keywords: Encryption algorithm, data security, vulnerability, attack method, complex method of data protection

  • Investigation of the effectiveness of Siamese neural networks for biometric authentication by ECG for signals with non-periodic cardiac arrhythmias

    Electrocardiogram signals have unique characteristics and structure that are difficult to fake. This is due to the fact that the electrical activity of the heart is unique for each person. In addition, the main biometric parameters are hidden during ECG authentication, which makes the process more secure and protected from counterfeiting. The purpose of this study is to evaluate the effectiveness of neural networks for ECG authentication for signals with non-periodic cardiac arrhythmias. The Siamese neural network has been developed as a model. The stages of preprocessing of ECG signals taken from the MIT-BIH database are also described. The model presented in the paper has achieved the following results. Accuracy: 99.69%. Sensitivity: 99.43%. Specificity: 99.94%. ROC-AUC: 99.69%. The results allow us to conclude that the proposed model can effectively authenticate users who have non-periodic cardiac arrhythmias, provided at least a small number of registered standards with violations.

    Keywords: biometric authentication, ECG, Siamese neural network, convolutional neural network, Euclidean distance, ROC analysis

  • Reverse analysis of malware Raccoon Stealer

    We describe the process and results of reverse analysis of malware Raccoon Stealer v.1.7.3. We describe instruments of analysis, the process of code analysis, unpacking, getting of original code. We describe the process of code analysis, construction of malware working algorithm. We describe recomendations for defense from Raccoon Stealer.

    Keywords: Reverse analysis, reverse engineering, malware, code analysis, debuger, disassembler, hex redactor, database, browser, information security

  • Network traffic monitoring using artificial intelligence methods for detect attacks

    Nowadays, the organization security against cyber-attacks is a matter of great importance and a challenging area, as it affects them financially and functionally. Novel attacks are emerging daily, threatening a large number of businesses around the world. For this reason, the implementation and optimization of the performance of Intrusion Detection Systems is an urgent task. To solve this problem, the scientific community uses deep learning methods. In this paper, we pay special attention to attack detection methods built on different kinds of architectures, such as multilayer perceptron, gated recurrent unit, long short-term memory network, recurrent neural network, and convolutional neural network. To train and test their models, we used dataset UNSW-NB 15. The Australian Centre created this dataset for Cyber Security. It created to generate traffic, which is a hybrid of normal and attack activities. In finally we summarize this paper and discuss some ways to improve the performance of attack detection under thoughts of utilizing deep learning structures.Nowadays, the organization security against cyber-attacks is a matter of great importance and a challenging area, as it affects them financially and functionally. Novel attacks are emerging daily, threatening a large number of businesses around the world. For this reason, the implementation and optimization of the performance of Intrusion Detection Systems is an urgent task. To solve this problem, the scientific community uses deep learning methods. In this paper, we pay special attention to attack detection methods built on different kinds of architectures, such as multilayer perceptron, gated recurrent unit, long short-term memory network, recurrent neural network, and convolutional neural network. To train and test their models, we used dataset UNSW-NB 15. The Australian Centre created this dataset for Cyber Security. It created to generate traffic, which is a hybrid of normal and attack activities. In finally we summarize this paper and discuss some ways to improve the performance of attack detection under thoughts of utilizing deep learning structures.

    Keywords: network traffic, computer attack, artificial neural network, traffic analysis, neural network configuration

  • Analysis of technologies for building an automated system "Smart Home"

    One of the topics of automation and monitoring that is gaining popularity is the technology of building the Smart Home system. This technology is a home automation system, which refers to the remote monitoring and control of home appliances. With the growth of the Internet and the development of technologies such as artificial intelligence, the Internet of things and cloud technologies, there is great potential and opportunity for remote access, control and monitoring of network devices. This article will review various smart home automation systems and technologies in terms of different functions. In the study, the main focus is on the concept of a home automation system in which control and monitoring operations are carried out using wireless communications.

    Keywords: internet of things, smart home, NB-IoT automation, cyber security