Lyapustin A., Kolesnikova S., Mel'nik D. —
The model of protection of multilevel communications
// Cybernetics and programming. – 2018. – ¹ 3.
– P. 87 - 98.
DOI: 10.25136/2644-5522.2018.3.26566
URL: https://en.e-notabene.ru/kp/article_26566.html
Read the article
Abstract: The work is devoted to the urgent problem of ensuring the security of heterogeneous information platforms, using the system of electronic support of on-line communications processes in a medical institution - e-health online communications. The authors pay special attention to such important aspects of the topic as: the security of heterogeneous information platforms, the model for the protection of heterogeneous information platforms, the classification of communications and the protection mechanisms of MMK. The tendencies for the development of new distributed safety models are considered. This article presents a model of multi-level communications. A classification of communications and protection mechanisms for each level with different security levels using cryptography protocols is proposed. Security flexibility can be provided to health organizations using a variety of key size combinations to protect data and channels. At each level, different levels of security can be provided depending on the sensitivity of the data. Thus, we came to the MMK model as a solution to the problem of communication in e-health and other large organizations with a distributed network of computer communications.
Lyapustin A. —
Security of the Multi-Agent Platform
// Software systems and computational methods. – 2017. – ¹ 3.
– P. 16 - 24.
DOI: 10.7256/2454-0714.2017.3.23311
URL: https://en.e-notabene.ru/itmag/article_23311.html
Read the article
Abstract: The research is devoted to the topical issue of ensuring security of heterogeneous information platforms applying the multi-agent threat detection systems. The object of the research is the multi-agent platform. The author pays special attention to such aspects of the topic as security of multi-agent platforms, managing threat detection agents, interaction between different threat detection agents, and vulnerability of multi-agent platforms. The author also analyses tendencies for developing new distributed security structures. In his research Lyapustin offers a mutl-agent structure that can be used by security service as well as a general scenario for deploying security policy in threat detection multi-agent systems. In terms of theory, the results of the research demonstrate the need to extend the scope of the multi-agent approach and integrate it with the intelligent analysis of information systems development and operation. The result of the research is the concept of a secure multi-agent platform that can be used in the treat detection multi-agent system.
Lyapustin A. —
Development and examination of the models and methods of comprehensive protection of heterogeneous information platforms
// National Security. – 2015. – ¹ 4.
– P. 508 - 514.
DOI: 10.7256/2454-0668.2015.4.15662
Read the article
Abstract: This work presents the analysis of the modern approaches towards development of comprehensive systems for protecting heterogeneous information platforms. Despite the advantages of the reviewed approaches, majority of them are aimed at solving a particular task, rather than a complex solution to the problem of protection of information in the environment of sophisticated heterogeneous systems. This article demonstrates the architecture of a heterogeneous information system acting as an object of protection. The result of the conducted research lies in the formation of a concept of creation of an Information Security System, the architecture of which is built upon a multi-agent approach and is oriented towards heterogeneous information systems. The author proposes a model for a comprehensive protection of the heterogeneous information platforms and examines the methodology for intelligent threat detection. The results of this research suggest increasing the area of use of the multi-agent approach and its integration into the intelligent analysis of development and functionality of the information systems.