Category Archives: Security systems

ABOUT FINDING ALL NONDOMINATED MAXIMIN STRATEGIES OF ONE OF THE PLAYERS IN A TWO-PERSON NONCOOPERATIVE GAME THAT MODELS A PROCESS OF PURCHASING PROTECTION MEANS FOR A COMPUTER SYSTEM

UDC 519.833
DOI:10.26102/2310-6018/2019.26.3.036

V.V.Sushkin


A two-person noncooperative game that models a process of purchasing protection means for a computer system is considered. One of the players in this game is a party responsible for the security of the system. Having a certain amount of money that can be spent on the purchase of the protection means this party determines which of these funds should be purchased. Actions of the other player (and it’s the external world in relation to the computer system) are attacks on the computer system implemented via the network. For each of the protection means that can be purchased as well as for each of the types of attacks that can be used in an assault on the computer system a probability with which the attack will be reflected by the protection mean is known. By choosing the protection means a party responsible for the security seeks to minimize overall losses which include first a cost of the purchased protection means and secondly a damage expected from use of the other party attacks on the computer system. A study of an optimality principle implementations of which are nondominated maximin strategies of a player, which is a party responsible for ensuring the security of the system, is carried out. A result of this study is statements that determine a method of finding all nondominated maximin strategies of the specified player.

Keywords: noncooperative game, maximin strategy, nondominated strategy, computer system, attack on a computer system, protection of a computer system.

Full text:
Sushkin_3_19_1.pdf

DISPERSION OF THE NUMBER OF FAILURES IN MODELS OF PROCESSES OF RESTORATION OF TECHNICAL AND INFORMATION SYSTEMS. OPTIMIZATION PROBLEMS

UDC 519.873, 004.056
DOI:10.26102/2310-6018/2019.26.3.021

I.I. Vainshtein, V.I. Vainshtein


In this work, for several models of recovery processes, dispersion formulas for the number of failures are obtained, depending both on the recovery functions of the considered model of the recovery process and on the recovery functions (average number of failures) of other models. Considering the formulas for the average and variance of the number of failures, the problem statements are given on the organization of the recovery process in which the minimum variance is achieved with a given limit on the average number of failures, or so that there is the smallest average number of failures with a given dispersion limit. The formulation tasks resemble Markowitz’s well-known task of forming a portfolio of securities, where the average makes sense of income, risk variance. The solution of the formulated problems is obtained for a simple recovery process with an exponential distribution of operating time, and for this case the Chebyshev inequality and the formula for the coefficient of variation are written. The developed mathematical apparatus is intended for use in the formulation and solution of various optimization problems of information and computer security, as well as in the operation of technical and information systems, software and hardware-software information protection when failures, threats of attacks, and security threats of a random nature occur.

Keywords: distribution function, recovery process, recovery function, failure rate dispersion, coefficient of variation

Full text:
VainshteinVainshtein_3_19_1.pdf

FORMALIZATION OF THE ACCESS CONTROL AUDIT PROCEDURE IN THE INFORMATION SYSTEM

UDC 004.56
DOI:10.26102/2310-6018/2019.26.3.018

V.S. Oladko


The article discusses current problems and tools for ensuring information security in information systems. The author analyzes the current trends in information security breaches in 2018-2019, concludes about the relevance of countering threats related to unauthorized access. The basic tools for protecting an information system from unauthorized access are many rights and rules for access control between objects and subjects. Therefore, to ensure the necessary level of security, the adequacy and consistency of the distribution of access rights is important. The methodology and conceptual scheme for conducting an audit of the access control subsystem based on ACL lists, consisting of procedures for initiating audits, collecting and analyzing audit data has been developed. The mathematically model of audit procedure is automation in the form of an audit software tool for the access control subsystem using the Windows operating system as an example. The main advantage of the proposed audit procedure is that it does not require complex testing procedures, calculation of probabilities, involvement and selection of experts. The main purpose of the program is to assess the compliance of the existing settings of the access control policy in the system with the security policy of the system under investigation.

Keywords: access rights, information protection, operating system, access control model, mathematical model, cybersecurity.

Full text:
Oladko_3_19_1.pdf

PREDICTION OF THE CONSEQUENCES OF THE PROPAGATION OF THE VIRUS IN A COMPUTER NETWORK USING A BASIC REPRODUCTION NUMBER

UDC 004.942
DOI:10.26102/2310-6018/2019.26.3.012

N.A. Semykina


Today, Internet is considered to be one of the most useful tools for people to communicate, find information and to buy goods and services. Most computers are connected to each other in some way. The Internet is the primary medium used by attackers to commit computer crimes. They share the same operating system software and communicate with all other computers using the standard set of protocols. This has spawned a new generation of criminals. The similarity between the spread of a biological virus and worm propagation encourages researchers to adopt an epidemic model to the network environment. This approach is most effective for describing the computer viruses propagation on the network. The article uses the results of the theory of mathematical epidemiology to analyze the SIRS model. The dynamics of the virus propagation to the computer network is described using a system of differential equations. The stability of the network to the spread of malware is investigated. An equilibrium position is found. The basic reproduction number is determined. The dependence of the virus attack evolution on the basic reproduction number is analyzed. Numerical simulations are provided to support our theoretical conclusions.

Keywords: mathematical model, computer virus, virus dynamics, basic reproduction number, nonlinear system of differential equations, stability of the system.

Full text:
Semykina_3_19_1.pdf

GENERALIZED COMPUTATIONAL METHOD TO COMPARE THE ACCURACY OF QUANTITATIVE ESTIMATES OF SECURITY OF WIRELESS SECURITY SYSTEMS

UDC 004.05
DOI:10.26102/2310-6018/2019.26.3.002

A.A. Gavrishev


In this paper, the author for the purposes of comparative analysis of the accuracy of quantitative methods for assessing the security of wireless security systems, developed a generalized computational method for comparing the accuracy of quantitative assessments of the security of wireless security systems on the example of fire alarm systems. For this purpose, the known security assessments of wireless security systems are described. The numerical indicators of security assessments of the known technologies of protection of the radio channel of fire alarm systems from unauthorized by two security assessments are presented. The known approaches of the comparative analysis of the accuracy of quantitative estimates of protection are shown, their shortcomings are specified. As a perspective approach of the comparative analysis of the accuracy of quantitative estimates of security, free from the shortcomings of known approaches, the apparatus of mathematical statistics is indicated. The application of mathematical statistics to the comparative analysis of the accuracy of quantitative estimates of security of wireless security systems is shown. The developed generalized computational method of comparison of the accuracy of quantitative estimates of security of wireless security systems is described. Its advantages over known methods, as well as its limitations are indicated. Recommendations on its application to the comparative analysis of the accuracy of quantitative security assessments are given. It is also indicated that the developed computational method is generalized – its potential can be used for comparative evaluation of the same type of quantitative security assessments of a wide class of wireless security systems for the purposes of determining which of the security assessments has greater accuracy of security.

Keywords: security assessment, radio channel, security systems, computational method, mathematical statistics.

Full text:
Gavrishev_3_19_1.pdf

MODELING AND ESTIMATION OF EFFICIENCY OF THE
UNINTERRUPTIBLE POWER SUPPLY SYSTEMS
OF OBJECTS OF THE INTERNAL AFFAIRS

UDC 004.051
doi:10.26102/2310-6018/2019.25.2.014

A. A. Rogozhin, M. A. Ledovskaya, D. L. Kuropyatnik


Currently, the problem of power outages in the power supply systems of objects of the internal Affairs bodies remains relevant. The article analyzes the statistics of emergency shutdowns of electrical equipment caused by accidents or unplanned shutdowns of power grid facilities. The classification of categories of consumers whose interruption of power supply may entail a danger to people’s lives, a threat to the security of the state, significant material damage, disruption of complex technological process, disruption of the functioning of particularly important elements of public utilities, communication and television facilities. For ensuring appropriate level of reliability of power supply of the most important consumers, the block diagram of uninterrupted power supply of technical means of objects of law-enforcement bodies, on the basis of the combined use of sources of uninterrupted power supply and the device of multistage automatic input of a reserve, allowing to provide the constant mode of power supply of the most responsible receivers of electric energy is developed. Modeling and calculation of the integrated indicator of the effectiveness of the system of uninterrupted power supply of technical means of the objects of the police Department. Assess the effectiveness of the systems of uninterruptible power supply ATS a structural-parametric model that allows to quantify the efficiency of the uninterrupted power supply of objects of the internal Affairs bodies. The General logic-probabilistic method and the technology of automated structural-logical modeling are used for the computational experiment.

Keywords: uninterrupted power supply, electric receiver, the general logiko-probabilistic method, technology of the automated structural and logical modeling, the scheme of functional integrity, estimation of efficiency

Full text:
RogozhinSoavtori_2_19_1.pdf

METHOD OF AUDITING THE PROTECTION OF AUTOMATED SYSTEMS

UDC 004.56
doi: 10.26102/2310-6018/2019.24.1.036

V.L. Tokarev, A.A. Sychugov


The analysis of the currently existing regulatory framework and methods for analyzing the protection of information resources was carried out. It is noted that the basis of the methods is the use of technical methods of analysis, which involve the use of both active and passive testing of the information protection system. Another existing solution to this problem is the use of expert assessments. However, both approaches are laborious and often subjective. On the basis of the theory of fuzzy sets, a mathematical model is proposed for auditing the security of automated systems on the basis of which an appropriate method has been proposed. Fuzzy models are considered as a tool for auditing automated systems that process confidential information. As an example of the use of the proposed method, an assessment of one of the information security aspects is considered – the security of access to confidential information in an automated system. The proposed method will make it possible to effectively use the obtained estimates for solving the problem of ensuring the security of information in automated systems. The main advantage of the method is that it does not require complex testing procedures, calculating probabilities, attracting and selecting experts, etc., and can be used to evaluate most various aspects of information security.

Keywords: :information security, access security, evaluation.

Full text:
TokarevSychugov_1_19_1.pdf

ИНТЕЛЛЕКТУАЛЬНАЯ СИСТЕМА АНАЛИЗА ИНЦИДЕНТОВ ИНФОРМАЦИОННОЙ БЕЗОПАСНОСТИ (НА ОСНОВЕ МЕТОДОЛОГИИ SIEM-СИСТЕМ С ПРИМЕНЕНИЕМ МЕХАНИЗМОВ ИММУНОКОМПЬЮТИНГА)


УДК 004.056
doi: 10.26102/2310-6018/2019.24.1.011

В.И. Васильев, Р.Р. Шамсутдинов


Статья посвящена проблеме интеллектуального анализа инцидентов информационной безопасности с применением методологии, используемой в системах управления информационной безопасностью и событиями безопасности. Проанализирована сущность таких систем, состав основных модулей и порядок их взаимодействия, возможность интеграции с методами искусственного интеллекта. Описана разработанная распределенная система анализа инцидентов информационной безопасности, синтезирующая механизмы искусственной иммунной системы и корреляционного анализа данных для выявления известных и неизвестных аномалий, анализа их критичности и определения приоритетов в реагировании. Представлена схема взаимодействия модулей разработанной системы, математическая составляющая применяемого метода корреляционного анализа данных. Подробно описана серия проведенных вычислительных экспериментов, показавших высокий уровень эффективности системы в обнаружении аномалий и возможности дополнительного обучения друг друга клиентскими модулями, а также успешное выполнение серверной компонентой агрегации и корреляционного анализа данных, поступающих от клиентов, в заданном интервале времени, выделении наиболее существенных инцидентов за последний проанализированный интервал, а также за все время, как в комплексе, так и для каждой группы инцидентов. Графическое отображение сервером статистических данных позволяет наглядно оценить критичность тех или иных инцидентов и определить приоритеты в реагировании на них.

Ключевые слова: SIEM-система, иммунокомпьютинг, корреляционный анализ, информационная безопасность, безопасность сети.

Полный текст статьи:
VasilyevShamsutdinov_1_19_2.pdf

INTELLIGENT NETWORK INTRUSION DETECTION SYSTEM BASED ON ARTIFICIAL IMMUNE SYSTEM MECHANISMS

UDC 004.056
doi: 10.26102/2310-6018/2019.24.1.010

V.V.Vasilyev, R.R.Shamsutdinov

The article is devoted to the problem of detecting network attacks, both known and previously unknown. The application of various methods of artificial intelligence in the scientific literature to solve this problem was analyzed. The advantages of the artificial immune system were revealed. Its main mechanisms including artificial lymphocytes generation, negative selection, clonal selection, data analysis, and periodic renewal of lymphocytes were analyzed. The article describes the developed intrusion detection system based on artificial immune system. Developed system includes a sniffing subsystem, so that allows it to analyze real data of host network connections. The article also describes network connections dataset KDD99, which used to efficiency evaluation of developed system. The methods of compressing the initial dataset proposed in the scientific literature were analyzed, and the drawbacks of these methods were identified. This article describes the experimental determination of the network connections significant parameters contained in the dataset. The authors identified 13 significant parameters from 41, and also they described the process of preliminary processing and preparation of the analyzed data, a series of experiments. The results of the experiments showed the high efficiency of the developed system in detecting unknown network attacks, detecting and classifying known attacks.

Keywords: : intrusion detection system, artificial immune system, KDD99, information security, network security, network attack.

Full text:
VasilyevShamsutdinov_1_19_1.pdf

MODELING OF COUNTERACTION TO DESTRUCTIVE INFLUENCE IN SOCIAL NETWORKS

UDC 004.94
doi: 10.26102/2310-6018/2019.24.1.004

V. A. Minaev, M. P. Sychev, L.S. Kulikov, E.V. Vaitz


In the last decade, the activity of both foreign centers and various groups of influences within the country on the organization of destructive impacts on Russian society and its social groups, especially youth, in order to destabilize the domestic political, socio-economic and criminal situation has significantly increased in social networks. That is why in the Doctrine of information security of the Russian Federation information and psychological effects (IPE) are called important negative factors affecting the state of information security (IS). In this regard, the creation of models to counter destructive information impacts (DII) of manipulative nature in social networks, assessment and forecasting of their impact on social groups are at the present stage actual management tasks. The system-dynamic model of information counteraction of DII in social networks is considered. Its application for the purposes of counteraction to information terrorism, extremism and other destructive influences on modern society by means of information networks is proved. The description of the model in the form of flowcharts in the designations of system dynamics is given. Systems of differential equations are shown. Simulation experiments with models using the promising Anylogic platform were carried out. The model make it possible to forecast DII taking into account the factor of counteraction in social networks, to play different scenarios of the dynamics of these interrelated processes.

Keywords: : simulation modeling, destructive information impact, counteraction, management, social network.

Full text:
MinaevSoavtori_1_19_2.pdf