This article describes aspects of ontology design for the sphere of information security. There are some examples of the use of ontologies in the sphere of information security including risk management, classification of threats and vulnerabilities, monitoring incidents, as well as examples of existing developments of ontologies for information security. The relevance of the development of legal ontologies is determined and examples of their use in practice are given. Also, the importance of designing a legal ontology for the subject area of information security under consideration is given due to the presence of a large legal framework. The paper presents the developed ontology model for one of the regulatory documents in the field of personal data protection. The approach to ontology design presented in the paper is proposed to be applied in the development of an information security learning system.
Keywords: security, information security, protection of information, information, domain model, normative legal act, ontology, ontological approach, design, legal ontology
The article is devoted to an overview of protocols used in broadband wireless networks and methods of protecting the information's transmission in them using encryption algorithms. Theoretical and practical aspects, features and principles of wireless access protocols in Wi-Fi, WiMAX, GSM, etc. are considered. An overview of the used data encryption methods, vulnerabilities encountered in algorithms, and methods for solving these problems considered in various laboratories is carried out. The purpose of the study is to review the encryption algorithms used in wireless access protocols. Based on the analyzed data, a conclusion was made on the use of the AES and A5(128) algorithms, as well as the attack protocols and solution methods identified on the data. The object of the study is the technology of wireless local broadband access. The subject of the study is the encryption algorithms underlying wireless broadband networks Scientific novelty. A review was carried out in encryption algorithms used in various wireless network standards. The information security threats arising in the AES and A5 encryption standards related to attacks using linked and session keys are considered.
Keywords: information technology, cryptography, data protection, encryption algorithm, AES, A5, WiMAX, Wi-Fi
The article discusses the features of constructing a special connection based on fiber-optic communication lines. An analysis is conducted on the reliability of using fiber-optic communication lines in terms of the possibility of unauthorized interception of transmitted information. The advantages of practical use of communication systems based on fiber-optic lines are presented. The methods of protecting fiber-optic communication lines from unauthorized access are considered, where the priority method of protecting information is encryption using various methods. In conclusion, the measures necessary for building a reliable communication system based on fiber-optic lines are emphasized.
Keywords: information, special communication, communication segments, public communication, optical fiber, fiber-optic lines, unauthorized access, encryption, communication system construction, cryptographic protocols
This article discusses the technology of the Internet of things, which is used to connect smart objects to the network, for intelligent control of the power system and automation of household processes. Intelligent power system management aimed at ensuring a more uniform use of electricity and minimizing energy losses during transmission and consumption of electricity. This technology is currently being promoted globally by utilities, scientific organizations, and governments. In this work, also, a conceptual model of a smart home is built in the Cisco Packet Tracer virtual constructor and diagrams of device interaction at all levels of network construction are given.
Keywords: internet of Things, IoT, cybersecurity, automation, Cisco Packet Tracer
The article is devoted to the analysis of modern data encryption algorithms. The introduction gives an overview of the most common encryption algorithms, such as AES, RSA and SHA. The main part of the article includes an analysis of vulnerabilities of modern encryption algorithms and considers various attack methods. It concludes by drawing conclusions that it is necessary to use comprehensive data protection methods and periodically update the encryption algorithms used to prevent possible attacks.
Keywords: Encryption algorithm, data security, vulnerability, attack method, complex method of data protection
Electrocardiogram signals have unique characteristics and structure that are difficult to fake. This is due to the fact that the electrical activity of the heart is unique for each person. In addition, the main biometric parameters are hidden during ECG authentication, which makes the process more secure and protected from counterfeiting. The purpose of this study is to evaluate the effectiveness of neural networks for ECG authentication for signals with non-periodic cardiac arrhythmias. The Siamese neural network has been developed as a model. The stages of preprocessing of ECG signals taken from the MIT-BIH database are also described. The model presented in the paper has achieved the following results. Accuracy: 99.69%. Sensitivity: 99.43%. Specificity: 99.94%. ROC-AUC: 99.69%. The results allow us to conclude that the proposed model can effectively authenticate users who have non-periodic cardiac arrhythmias, provided at least a small number of registered standards with violations.
Keywords: biometric authentication, ECG, Siamese neural network, convolutional neural network, Euclidean distance, ROC analysis
We describe the process and results of reverse analysis of malware Raccoon Stealer v.1.7.3. We describe instruments of analysis, the process of code analysis, unpacking, getting of original code. We describe the process of code analysis, construction of malware working algorithm. We describe recomendations for defense from Raccoon Stealer.
Keywords: Reverse analysis, reverse engineering, malware, code analysis, debuger, disassembler, hex redactor, database, browser, information security
Nowadays, the organization security against cyber-attacks is a matter of great importance and a challenging area, as it affects them financially and functionally. Novel attacks are emerging daily, threatening a large number of businesses around the world. For this reason, the implementation and optimization of the performance of Intrusion Detection Systems is an urgent task. To solve this problem, the scientific community uses deep learning methods. In this paper, we pay special attention to attack detection methods built on different kinds of architectures, such as multilayer perceptron, gated recurrent unit, long short-term memory network, recurrent neural network, and convolutional neural network. To train and test their models, we used dataset UNSW-NB 15. The Australian Centre created this dataset for Cyber Security. It created to generate traffic, which is a hybrid of normal and attack activities. In finally we summarize this paper and discuss some ways to improve the performance of attack detection under thoughts of utilizing deep learning structures.Nowadays, the organization security against cyber-attacks is a matter of great importance and a challenging area, as it affects them financially and functionally. Novel attacks are emerging daily, threatening a large number of businesses around the world. For this reason, the implementation and optimization of the performance of Intrusion Detection Systems is an urgent task. To solve this problem, the scientific community uses deep learning methods. In this paper, we pay special attention to attack detection methods built on different kinds of architectures, such as multilayer perceptron, gated recurrent unit, long short-term memory network, recurrent neural network, and convolutional neural network. To train and test their models, we used dataset UNSW-NB 15. The Australian Centre created this dataset for Cyber Security. It created to generate traffic, which is a hybrid of normal and attack activities. In finally we summarize this paper and discuss some ways to improve the performance of attack detection under thoughts of utilizing deep learning structures.
Keywords: network traffic, computer attack, artificial neural network, traffic analysis, neural network configuration
One of the topics of automation and monitoring that is gaining popularity is the technology of building the Smart Home system. This technology is a home automation system, which refers to the remote monitoring and control of home appliances. With the growth of the Internet and the development of technologies such as artificial intelligence, the Internet of things and cloud technologies, there is great potential and opportunity for remote access, control and monitoring of network devices. This article will review various smart home automation systems and technologies in terms of different functions. In the study, the main focus is on the concept of a home automation system in which control and monitoring operations are carried out using wireless communications.
Keywords: internet of things, smart home, NB-IoT automation, cyber security
The concept of the Internet of Things (IoT) allows devices to communicate with each other and share resources using the Internet as a wireless medium. In smart homes, IoT allows the owner, who is far from home, to control it via the Internet. The ease of use and rich features of home automation systems have made them popular. Some people need home automation systems to make their home appliances easier and more convenient to operate, and they are also very useful for people with disabilities and the elderly. However, the useful features and functionality of IoT devices do not stop there. Scientific directions are being formed to analyze the efficiency of energy consumption and methods for preventing various disasters, where the main role is played by the technologies of the Internet of things. This article analyzes the standard models of smart home automation devices. The paper discusses the functionality of IoT devices through a virtual environment for building network models Cisco Packet Tracer.
Keywords: internet of things, IoT, automation, data analysis, data collection, cyber security
The article describes the algorithmic realisation of a software module for evidence of learner’s identification in the testing process. The advantage of this module is simple operation, ease of implementation and execution as well as convenience of application by various categories of users. The need for such a module was engendered by the problem of examinee identification during testing in the e-learning system. The technology of program module operation is based on forming questions with the use of information stored in the learner’s personal account; the operation result is demonstrated through confirmation or non-confirmation of the examinee’s identity in real time.
Keywords: distance learning, identification, student testing, software module, learner’s personal account
In the modern world, the number of different complex technical systems is only increasing every year, and any system incorporates or uses a third-party communication system. Disruption of the communication system and its elements functioning can lead to a situation where a complex technical system cannot realize its functions. It is required to ensure the guaranteed functioning of the communication system and its elements. One of the ways to ensure the stable operation of complex technical systems is the implementation of the control function by the control system, while in the process of system operation it is necessary to take into account not the characteristics and parameters of individual elements that describe their operation, but the ability of the system to perform tasks and functions. The paper proposes an approach to describing the functioning of a communication system through the formation of the system functioning profile, which is a set of matrices, which is used in the control system.
Keywords: functional stability, criticality, communication system, control system, complex technical system, functions, tasks, profile, regulations
The article provides a general overview of current information about the applied artificial intelligence technologies in outer space. The main role and effectiveness of the use of Russian intellectual developments in the space sphere are outlined. The popular modern developments of scientists who are engaged in research activities in the field of artificial intelligence in space are shown. Excerpts from articles proving the prospects for the development of artificial intelligence in the life of society are presented.
Keywords: outer space, space stations, artificial intelligence, intelligent systems, artificial intelligence technologies, artificial intelligence, neural networks, research, machine learning, neural network technologies
The work is devoted to the problems of protecting the document management system of public administration bodies. The aim of the work is to build a simulation model of the implementation of a targeted computer attack, taking into account the simultaneous (occurring with a slight delay) response of the security tools of the document management system. For modeling, it is proposed to use the apparatus of Petri-Markov networks, combining the representation of the change of states of the attacked system in the form of Markov (semi-Markov) processes and the expressive capabilities of Petri nets to describe the interaction of processes. The constructed model reflects both the specifics of attacks with increased user privileges, and the features of document processing processes, as well as the mechanisms used to counteract unauthorized access. Computational experiments conducted using the constructed simulation model allow us to assess possible risks and make a decision on choosing the most effective system of protection against the considered type of attacks.
Keywords: electronic document management system, computer attack, simulation modeling, Petri-Markov network
This article presents an overview of the tools for solving the problem of monitoring the network infrastructure. Foreign solutions are considered, their characteristics are presented, key features are described, as well as their shortcomings. The problem of import substitution in the Russian Federation is emphasized. The results were summed up, and the relevance of developing a domestic IT infrastructure monitoring system with additional functionality was developed.
Keywords: monitoring, IT infrastructure, network infrastructure, negios, zabbix, cacti, import substitution, information security, Linux, Windows
The article confirms the need for a systematic approach to the scientific justification of the electronic document management systems security(EDMS) and the relevance of the study, presents the results of the analysis of guidance documents regarding the development of mathematical models and existing experience, summarizes the procedure for the scientific justification of EDMS security, highlights the main trends in modeling today, a new approach to the construction of EDMS security models is proposed, defines its role and place in the existing theory and practice.
Keywords: Security models of computer systems, security policy, electronic document management system, systematic approach
The development of an automatic system for installing a magneto-optical magnetic field sensor in a neutral position has been carried out. Installation in the neutral position is carried out by an automatic piezoelectric drive control system based on a microcontroller. A mathematical model is constructed and numerical simulation of the automatic control system is performed. The results and parameters of the simulation are presented. The developed system provides a significant increase in the autonomy of the sensor, which makes it possible to eliminate or significantly reduce the cost of regulating the sensor.
Keywords: magnetic field sensor, magneto-optical sensor, automatic control system, piezo motor
The article describes an approach to the operation of a data transmission network protection system against computer attacks based on a hybrid neural network. It is proposed to use a hybrid neural network as a machine learning method. To calculate the output value of neural network signals, the activation function is used. The neural network model consists of recurrent cells - LSTM and GRU. Experiments have demonstrated that the proposed network protection system for detecting computer attacks based on an assessment of the self-similarity of the system functioning parameters using fractal indicators and predicting the impact of cyber attacks by applying the proposed structure of the LSTM neural network has a sufficiently high efficiency in detecting both known and unknown spacecraft. The probability of detecting known spacecraft is 0.96, and the zero-day attack is 0.8.
Keywords: data transmission network, computer attack, neural network, protection system, network traffic, auto-encoder, accuracy, completeness, detection, classifier, self-similarity, recurrent cells with long short-term memory
One of the main conditions for ensuring information security is to prevent the spread of false and intentionally distorted information. Filtering the content of Internet information resources can serve as a solution to this problem. Recently, an approach using methods and mathematical models of artificial intelligence has been increasingly considered for the analysis and classification of disseminated data. The use of neural networks allows you to automate the process of processing a large array of information and connect a person only at the decision-making stage. The paper focuses on the learning process of a neural network. Various learning algorithms are considered: stochastic gradient descent, Adagrad, RMSProp, Adam, Adama and Nadam. The results of the implementation of text subject recognition using a recurrent neural network of the LSTM model are presented. The results of computational experiments are presented, an analysis is carried out and conclusions are drawn.
Keywords: information security, text analysis, artificial intelligence method, artificial neural network, recurrent LSTM network