PREDICTION OF THE CONSEQUENCES OF THE PROPAGATION OF THE VIRUS IN A COMPUTER NETWORK USING A BASIC REPRODUCTION NUMBER
Today, Internet is considered to be one of the most useful tools for people to communicate, find information and to buy goods and services. Most computers are connected to each other in some way. The Internet is the primary medium used by attackers to commit computer crimes. They share the same operating system software and communicate with all other computers using the standard set of protocols. This has spawned a new generation of criminals. The similarity between the spread of a biological virus and worm propagation encourages researchers to adopt an epidemic model to the network environment. This approach is most effective for describing the computer viruses propagation on the network. The article uses the results of the theory of mathematical epidemiology to analyze the SIRS model. The dynamics of the virus propagation to the computer network is described using a system of differential equations. The stability of the network to the spread of malware is investigated. An equilibrium position is found. The basic reproduction number is determined. The dependence of the virus attack evolution on the basic reproduction number is analyzed. Numerical simulations are provided to support our theoretical conclusions.
Keywords: mathematical model, computer virus, virus dynamics, basic reproduction number, nonlinear system of differential equations, stability of the system.
GENERALIZED COMPUTATIONAL METHOD TO COMPARE THE ACCURACY OF QUANTITATIVE ESTIMATES OF SECURITY OF WIRELESS SECURITY SYSTEMS
In this paper, the author for the purposes of comparative analysis of the accuracy of quantitative methods for assessing the security of wireless security systems, developed a generalized computational method for comparing the accuracy of quantitative assessments of the security of wireless security systems on the example of fire alarm systems. For this purpose, the known security assessments of wireless security systems are described. The numerical indicators of security assessments of the known technologies of protection of the radio channel of fire alarm systems from unauthorized by two security assessments are presented. The known approaches of the comparative analysis of the accuracy of quantitative estimates of protection are shown, their shortcomings are specified. As a perspective approach of the comparative analysis of the accuracy of quantitative estimates of security, free from the shortcomings of known approaches, the apparatus of mathematical statistics is indicated. The application of mathematical statistics to the comparative analysis of the accuracy of quantitative estimates of security of wireless security systems is shown. The developed generalized computational method of comparison of the accuracy of quantitative estimates of security of wireless security systems is described. Its advantages over known methods, as well as its limitations are indicated. Recommendations on its application to the comparative analysis of the accuracy of quantitative security assessments are given. It is also indicated that the developed computational method is generalized – its potential can be used for comparative evaluation of the same type of quantitative security assessments of a wide class of wireless security systems for the purposes of determining which of the security assessments has greater accuracy of security.
Keywords: security assessment, radio channel, security systems, computational method, mathematical statistics.
MODELING AND ESTIMATION OF EFFICIENCY OF THE
UNINTERRUPTIBLE POWER SUPPLY SYSTEMS
OF OBJECTS OF THE INTERNAL AFFAIRS
A. A. Rogozhin, M. A. Ledovskaya, D. L. Kuropyatnik
Currently, the problem of power outages in the power supply systems of objects of the internal Affairs bodies remains relevant. The article analyzes the statistics of emergency shutdowns of electrical equipment caused by accidents or unplanned shutdowns of power grid facilities. The classification of categories of consumers whose interruption of power supply may entail a danger to people’s lives, a threat to the security of the state, significant material damage, disruption of complex technological process, disruption of the functioning of particularly important elements of public utilities, communication and television facilities. For ensuring appropriate level of reliability of power supply of the most important consumers, the block diagram of uninterrupted power supply of technical means of objects of law-enforcement bodies, on the basis of the combined use of sources of uninterrupted power supply and the device of multistage automatic input of a reserve, allowing to provide the constant mode of power supply of the most responsible receivers of electric energy is developed. Modeling and calculation of the integrated indicator of the effectiveness of the system of uninterrupted power supply of technical means of the objects of the police Department. Assess the effectiveness of the systems of uninterruptible power supply ATS a structural-parametric model that allows to quantify the efficiency of the uninterrupted power supply of objects of the internal Affairs bodies. The General logic-probabilistic method and the technology of automated structural-logical modeling are used for the computational experiment.
Keywords: uninterrupted power supply, electric receiver, the general logiko-probabilistic method, technology of the automated structural and logical modeling, the scheme of functional integrity, estimation of efficiency
METHOD OF AUDITING THE PROTECTION OF AUTOMATED SYSTEMS
V.L. Tokarev, A.A. Sychugov
The analysis of the currently existing regulatory framework and methods for analyzing the protection of information resources was carried out. It is noted that the basis of the methods is the use of technical methods of analysis, which involve the use of both active and passive testing of the information protection system. Another existing solution to this problem is the use of expert assessments. However, both approaches are laborious and often subjective. On the basis of the theory of fuzzy sets, a mathematical model is proposed for auditing the security of automated systems on the basis of which an appropriate method has been proposed. Fuzzy models are considered as a tool for auditing automated systems that process confidential information. As an example of the use of the proposed method, an assessment of one of the information security aspects is considered – the security of access to confidential information in an automated system. The proposed method will make it possible to effectively use the obtained estimates for solving the problem of ensuring the security of information in automated systems. The main advantage of the method is that it does not require complex testing procedures, calculating probabilities, attracting and selecting experts, etc., and can be used to evaluate most various aspects of information security.
Keywords: :information security, access security, evaluation.
ИНТЕЛЛЕКТУАЛЬНАЯ СИСТЕМА АНАЛИЗА ИНЦИДЕНТОВ ИНФОРМАЦИОННОЙ БЕЗОПАСНОСТИ (НА ОСНОВЕ МЕТОДОЛОГИИ SIEM-СИСТЕМ С ПРИМЕНЕНИЕМ МЕХАНИЗМОВ ИММУНОКОМПЬЮТИНГА)
В.И. Васильев, Р.Р. Шамсутдинов
Статья посвящена проблеме интеллектуального анализа инцидентов информационной безопасности с применением методологии, используемой в системах управления информационной безопасностью и событиями безопасности. Проанализирована сущность таких систем, состав основных модулей и порядок их взаимодействия, возможность интеграции с методами искусственного интеллекта. Описана разработанная распределенная система анализа инцидентов информационной безопасности, синтезирующая механизмы искусственной иммунной системы и корреляционного анализа данных для выявления известных и неизвестных аномалий, анализа их критичности и определения приоритетов в реагировании. Представлена схема взаимодействия модулей разработанной системы, математическая составляющая применяемого метода корреляционного анализа данных. Подробно описана серия проведенных вычислительных экспериментов, показавших высокий уровень эффективности системы в обнаружении аномалий и возможности дополнительного обучения друг друга клиентскими модулями, а также успешное выполнение серверной компонентой агрегации и корреляционного анализа данных, поступающих от клиентов, в заданном интервале времени, выделении наиболее существенных инцидентов за последний проанализированный интервал, а также за все время, как в комплексе, так и для каждой группы инцидентов. Графическое отображение сервером статистических данных позволяет наглядно оценить критичность тех или иных инцидентов и определить приоритеты в реагировании на них.
Ключевые слова: SIEM-система, иммунокомпьютинг, корреляционный анализ, информационная безопасность, безопасность сети.
Полный текст статьи:
INTELLIGENT NETWORK INTRUSION DETECTION SYSTEM BASED ON ARTIFICIAL IMMUNE SYSTEM MECHANISMS
The article is devoted to the problem of detecting network attacks, both known and previously unknown. The application of various methods of artificial intelligence in the scientific literature to solve this problem was analyzed. The advantages of the artificial immune system were revealed. Its main mechanisms including artificial lymphocytes generation, negative selection, clonal selection, data analysis, and periodic renewal of lymphocytes were analyzed. The article describes the developed intrusion detection system based on artificial immune system. Developed system includes a sniffing subsystem, so that allows it to analyze real data of host network connections. The article also describes network connections dataset KDD99, which used to efficiency evaluation of developed system. The methods of compressing the initial dataset proposed in the scientific literature were analyzed, and the drawbacks of these methods were identified. This article describes the experimental determination of the network connections significant parameters contained in the dataset. The authors identified 13 significant parameters from 41, and also they described the process of preliminary processing and preparation of the analyzed data, a series of experiments. The results of the experiments showed the high efficiency of the developed system in detecting unknown network attacks, detecting and classifying known attacks.
Keywords: : intrusion detection system, artificial immune system, KDD99, information security, network security, network attack.
MODELING OF COUNTERACTION TO DESTRUCTIVE INFLUENCE IN SOCIAL NETWORKS
V. A. Minaev, M. P. Sychev, L.S. Kulikov, E.V. Vaitz
In the last decade, the activity of both foreign centers and various groups of influences within the country on the organization of destructive impacts on Russian society and its social groups, especially youth, in order to destabilize the domestic political, socio-economic and criminal situation has significantly increased in social networks. That is why in the Doctrine of information security of the Russian Federation information and psychological effects (IPE) are called important negative factors affecting the state of information security (IS). In this regard, the creation of models to counter destructive information impacts (DII) of manipulative nature in social networks, assessment and forecasting of their impact on social groups are at the present stage actual management tasks. The system-dynamic model of information counteraction of DII in social networks is considered. Its application for the purposes of counteraction to information terrorism, extremism and other destructive influences on modern society by means of information networks is proved. The description of the model in the form of flowcharts in the designations of system dynamics is given. Systems of differential equations are shown. Simulation experiments with models using the promising Anylogic platform were carried out. The model make it possible to forecast DII taking into account the factor of counteraction in social networks, to play different scenarios of the dynamics of these interrelated processes.
Keywords: : simulation modeling, destructive information impact, counteraction, management, social network.
MODELING MANIPULATIVE INFLUENCES IN SOCIAL NETWORKS
V. A. Minaev, M. P. Sychev, L.S. Kulikov, E.V. Vaitz
In the Doctrine of information security of the Russian Federation the main negative factors affecting the state of information security (IS), called informational and technical influences (ITI) and information and psychological influences (IPI). Therefore, modeling, evaluation and forecasting of information influences (II) on social groups and organizing of the corresponding information counteraction (ICA) are urgent tasks of management. The system-dynamic models of information influences in social networks and groups are considered. Their application for purposes of counteraction to information terrorism and extremism is proved. The description in the form of flowcharts is given. Systems of differential equations are presented. Experiments with models using the advanced simulation platform Anylogic were carried out. In a sample of Russian settlements based on cluster analysis found homogeneous typological groups that differ in the average time of transmission of information in social networks. Based on Gibbs ‘ postulate, the system-dynamic model of information influences among students has been successfully tested. The high consistency of simulation results with empirical data (determination coefficients of at least 90%) is shown. Models allow you to forecast the II and ICA and to play different scenarios of the dynamics of these processes.
Keywords: : simulation modeling, information influences, management, social network, topology, typology, cluster analysis.
THE INVESTIGATION OF ERROR-CORRECTING CODING OF THE VARIOUS FILES
E. I. Vorobyev, Y. P. Preobrazhenskiy
Problems related to the protection of information from interference are relevant in a variety of practical applications. The information itself can be text, graphic, contain video clips. Interference can be unintentional as well as specially created by cyber criminals. To process and transmit information in practice, various noise-resistant codes are used. The paper discusses the characteristics of some similar stakes: Hamming code, code, reed-Muller, BCH code Bose-Chowdhury-Hoquinghem. The results of comparison of characteristics-correcting codes are shown. An illustration of the encoded text and those bits that have been distorted. A graphical dependency is given to illustrate the dependence of the number of corrected errors on the number of errors that were added to the original message for the three selected codes. The results of studies of the characteristics of redundancy of codes with different files are shown. The BCH and reed-Muller codes were chosen for testing. Txt, midi, wmv and mpeg-2 files were analyzed. A table on the results of research, which shows how the file size, as well as its appearance, have an impact on redundancy. It is established that Hamming and reed-Muller code fix single errors well, BCH code is suitable for correcting various errors.
Keywords: : coding, information, correcting ability, error.
ACCESS CONTROLS TO INFORMATION RESOURCES IN INFORMATION SYSTEMS
T.I. Lapina, E.M. Dimov, E.A. Petrik, D.V. Lapin
In article the campaign to the organization of multifactor authentication of users in automated information systems at remote access of many users to one information resource through network protocols is considered. It is shown that at a multiuser mode of data access of one of the main objectives of information security support of resources the problem of confirmation of the personality entering information exchange which can be solved by use of multiple-factor authentication is. For confirmation of the identity of the user dynamic biometric identification and authentications on a basis is used by dynes of hand-written handwriting. The complex of technical means of receiving biometric data, the procedure of their analysis and an algorithm of access to an information resource is offered. For forming of a biometric image, it is offered to use discrete transform of Fourier and the system of the orthogonal functions of Haar allowing to select essential features of the measured data of dynamics of hand-written handwriting of the user of information resources.
Keywords: : user authentication, multi-factor authentication, biometric data analysis.