Development of the security and fire system training stand for student training
// Software systems and computational methods. – 2023. – № 2.
– P. 40-48.
Read the article
Abstract: The article is devoted to the organization of the educational process using a specialized laboratory stand of security and fire systems. The main purpose of the paper is to form professional competencies of students in the field of security and safety systems. The paper describes in detail the structure and components of the laboratory stand, emphasizing the importance of its key elements - the control panel "Astra-812 Pro" and a variety of detectors. This allows students to practically apply theoretical knowledge, studying the functioning and interaction of various components of the security and fire system. The article also presents schemes of connection of detectors to the expander, allowing students to more deeply understand the technical side of the process. The steps of the bench training are disclosed to support step-by-step, sequential learning. The study emphasizes the effectiveness of the proposed learning system, which involves direct student interaction with hands-on equipment. The findings confirm the significance of using such training stands in modern higher professional education, emphasizing their contribution to the formation of the necessary professional competencies in future specialists in the field of safety and security. Scientific novelty of the work consists in the development and application of a specialized training stand for teaching students to work with security and fire systems. This allows students to get direct experience of interaction with the equipment, deepen their understanding of the technical aspects of the systems operation and improve their practical skills. The work also contributes to research on educational approaches in the field of safety and security by proposing an effective teaching methodology through the use of a laboratory bench. This provides a platform for further research and development in this area that can broaden and deepen the educational opportunities in the field.
Keywords: student training, educational approaches, wiring diagrams, professional competencies, security system, detectors, monitoring device, fire protection system, training stand, practical skills
Alekseenko O. I., Danilenko T. V., & Kiriy E. V. (2018). Problems of training and education of students in modern higher education institution. Modern Pedagogical Education, 3, 3-5.
Fortova L. K., & Yudina A. M. (2022). Problems and prospects of development of digitalization of higher professional education. Bulletin of Vladimir State University named after Alexander Grigorievich and Nikolai Grigorievich Stoletov. Series: Pedagogical and Psychological Sciences, 51(70), 85-89.
Ivanova O. V., & Moroz I. N. (2022). Opportunities and problems of digitalization of higher education. Higher Education Today, 5, 30-35.
Yusupov B. Z., & Martynov A. M. (2023). Development of laboratory stand of security and fire alarm system in the discipline of technical means of protection. Actual problems of science and education in the context of modern challenges: Proceedings of the XIX International Scientific and Practical Conference, 80-91.
Yusupov B. Z. (2021).
Nikitin P.V., Osipov A.V., Pleshakova E.S., Korchagin S.A., Gorokhova R.I., Gataullin S.T..
Emotion Recognition by Audio Signals as one of the Ways to Combat Phone Fraud
// Software systems and computational methods. – 2022. – № 3.
– P. 1-13.
Read the article
Abstract: The relevance of the study is dictated by the current state in the field of telephone fraud. According to research conducted by Kaspersky Lab, the share of users who encountered various unwanted spam calls in the spring of 2022 was at the level of 71%. The subject of the research is machine learning and deep learning technologies for determining emotions by the timbre of the voice. The authors consider in detail such aspects as: the creation of a marked-up dataset; the conversion of WAV audio format into a numerical form convenient for fast processing; machine learning methods for solving the problem of multiclass classification; the construction and optimization of neural network architecture to determine emotions in real time. A special contribution to the study of the topic is that the authors implemented a fast method of conversion sound formats into numerical coefficients, which significantly increased the speed of data processing, practically without sacrificing their informativeness. As a result, the models were trained by machine learning algorithms quickly and efficiently. It should be particularly noted that the architecture of a convolutional neural network was modeled, which allowed to obtain the quality of model training up to 98%. The model turned out to be lightweight and was taken as the basis for training the model to determine emotions in real time. The results of the real-time operation of the model were comparable with the results of the trained model. The developed algorithms can be implemented in the work of mobile operators or banks in the fight against telephone fraud.
The article was prepared as part of the state assignment of the Government of the Russian Federation to the Financial University for 2022 on the topic "Models and methods of text recognition in anti-telephone fraud systems" (VTK-GZ-PI-30-2022).
Keywords: emotions, information security, mel-kepstral coefficients, convolutional neural networks, classification, neural network training, machine learning, artificial intelligence, phone fraud, fraud
Meshkova N.V., Kudryavtsev V.T., Enikolopov S.N. On the psychological portrait of victims of telephone fraud // Bulletin of the Moscow University. Series 14. Psychology. 2022. No. 1. pp. 138-157. doi: 10.11621/vsp.2022.01.06.
Klachkova O. A. Psychological features of victim personality // Izvestiya RSPU named after A. I. Herzen. 2008. No.58. URL: https://cyberleninka.ru/article/n/psihologicheskie-osobennosti-viktimnoy-lichnosti (date of address: 02.08.2022).
Moiseeva I.G. Psychological aspects of countering telephone fraud // Kaluga Economic Bulletin. 2022. No. 1. pp. 70-74.
Romanov A.A., Mashlyakevich V.A. About modern methods of fraud committed using mobile communication means // Eurasian Legal Journal. 2021. No. 10 (161). pp. 254-255.
Barasheva E. V., Stepanenko D. A. Historical and legal aspects of cybercrime in the banking sector // Humanities, socio-economic and social sciences. 2022. No. 6 pp. 75-77. – DOI 10.23672/y5463-0677-0213-l.
Ivanova A. A. Mishchenko V. V. Actual problems of
Simavoryan S.Z., Simonyan A.R., Popov G.A., Ulitina E.I..
General concept for detecting intrusions of unknown type based on neural networks
// Software systems and computational methods. – 2021. – № 4.
– P. 23-45.
Read the article
Abstract: This article is dedicated to the problem of detecting intrusions of unknown type based on neural networks that bypass the system of information security in automated data processing systems and are not recognized as spiteful. Development of the means, methods and measures for detecting or preventing such hidden attacks is of particular relevance. Methodological research on the development of procedure for detecting intrusions are based on the achievements of systemic analysis, systemic-conceptual approach towards protection of information in automated data processing systems and achievements of the theory of neural systems in the area of ensuring information security. The object of this research is the intrusions of unknown type in automated data processing systems. The subject is the neural networks, namely neural networks of direct action. The main result lies in the development of neural network of direct action in form of the diagram of neural network links for detecting intrusions. For solving this task, the author developed:
1) The system of input indicators of the neural system;
2) Scales for the assessment of values of the formed indicators;
3) General procedure for detecting intrusions based on neural networks, the essence of which consists in implementation of the following sequence of actions: a) formation of the list of all the main parties to the process of detection of intrusion; b) formation of the set of parameters that characterize each of them; c) formation of the set of numerical characteristics for each parameter using the assessment scales of the formed indicators; d) analysis of the parameters of the configuration of neural network
The developed procedure may serve as the basic in further practical developments of the concept of detecting intrusions of unknown types based on neural networks.
Keywords: intelligent systems, intrusion detection system, systemic approach, intrusion, neural network, information protection, information security system, artificial immune systems, neural network diagram, neural network parameters
Simavoryan S.Zh., Simonyan A.R., Ulitina E.I., Popov G.A. O kontseptsii sozdaniya intellektual'nykh sistem zashchity informatsii na osnove neyrosetevykh sistem obnaruzheniya vtorzheniy v ASOD // Programmnye sistemy i vychislitel'nye metody.-2019.-№ 3.-S. 30-36.
Klenin D.V., Maksimova E.A. Model' vtorzheniy v informatsionnuyu sistemu // NBI tekhnologii.-2018.-T. 12.-№ 3.-S. 19-23.
Boychenko O.V, Gavrikov I.V. Sistemy obnaruzheniya vtorzheniy v komplekse informatsionnoy bezopasnosti bankov // Informatsiya i kosmos.-2019.-№ 1.-S. 72-76.
Ezhgurov V.N., Yumasheva E.S., Bach M.A. Problemy vnedreniya sistemy obnaruzheniya vtorzheniya i ustraneniya komp'yuternykh atak // V sbornike: Materialy konferentsiy GNII "Natsrazvitie". Yanvar' 2018.-2018.-S. 19-27.
Popov G.A., Simavoryan S.Zh., Simonyan A.R., Ulitina E.I. Modelirovanie protsessa monitoringa sistem informatsionnoy bezopasnosti na osnove sistem massovogo obsluzhivaniya // Informatika i ee primeneniya.-2020.-T. 14.-№ 1.-S. 71-79.
Simavoryan S.Zh., Simonyan A.R., Popov G.A., Ulitina E.I. Protsedura vyya
Simavoryan S.Z., Simonyan A.R., Popov G.A., Ulitina E.I..
Functionality of the system of information security in automated data processing systems in the conditions of external intrusions by analogy with the human immune system
// Software systems and computational methods. – 2021. – № 3.
– P. 11-24.
Read the article
Abstract: This article is dedicated to construction of the system of information security in automated data processing systems that function by analogy with the human immune system. The subject of this research is the development of the procedure for countering external intrusions of viruses, spam, and other destructive software programs in automated data processing systems. The object of this research is the systems of ensuring information security in automated data processing systems and human immune system. Methodological research on elaboration of the procedure for identification of intrusion is conducted via methods of artificial intelligence, systemic analysis, theory of neural and immune systems in the sphere of ensuring information security based on the achievements of systemic analysis and a systemic-conceptual approach towards information security in automated data processing systems. The main result lies in the developed general procedure for the functionality of the system of ensuring information security in countering external intrusions in the form of block-diagram and its description. The procedure is based on the idea of similarity in functionality of the mechanisms and procedures for protection against external intrusions in both, human immune system and automated data processing system, as well as drawing parallel between them. The main peculiarity of the developed procedure lies in its applicability to the accepted classification of the initial external environment of intrusion onto physical, information, field, and infrastructure environments. Such approach guarantees the novelty of the development from the perspective of constant updating of human immune system countering mechanisms to the external intrusions and its application for each environment in applicable to automated data processing systems.
Keywords: neural systems, intelligent systems, intrusions detection system, information protection, information security systems, human immune system, artificial immune systems, cellular immunity, humoral immunity, systems approach
Mongush A.K., Karmanov I.N. Avtomatizatsiya proektirovaniya kompleksnykh sistem zashchity informatsii // Interekspo Geo-Sibir'. 2020. T.6. № 2.S. 31-35.
Popov G.A., Simavoryan S.Zh., Simonyan A.R., Ulitina E.I. Modelirovanie protsessa monitoringa sistem informatsionnoy bezopasnosti na osnove sistem massovogo obsluzhivaniya//Informatika i ee primeneniya. 2020. T. 14. Vyp. 1.S. 71-79.
Belyavskiy D.M., Darbinyan S.S., Zasurskiy I.I., Kazar'yan K.R., Levova I.Yu., Kharitonov V.V. Tsifrovaya identifikatsiya ob'ektov: tekhnologiya i ne tol'ko. // M.: Nauchnoe obozrenie.-2016.-252 s.-ISBN 978-5-9906425-4-6.
Simavoryan S.Zh., Simonyan A.R., Popov G.A., Ulitina E.I.-Analiz vozmozhnostey adaptatsii obshchey skhemy immunnoy sistemy v sistemakh protivodeystviya vtorzheniyam // Voprosy bezopasnosti. 2020. № 4. S.36-46. DOI: 10.25136/2409-7543.2020.4.33736 URL: https://e-notabene.ru/nb/article_33736.html.
Gibadullina E.A., Nuriev N.K. Razrabotka metodiki opredeleniya aktual'nykh ugroz // V sbornike: Sovremennye tekhnologii: problemy innovatsionnogo razviti
Simavoryan S.Z., Simonyan A.R., Popov G.A., Ulitina E.I..
The procedure of intrusions detection in information security systems based on the use of neural networks
// Software systems and computational methods. – 2020. – № 3.
– P. 1-9.
Read the article
Abstract: The subject of the research is the problem of identifying and countering intrusions (attacks) in information security systems (ISS) based on the system-conceptual approach, developed within the framework of the RFBR funded project No. 19-01-00383. The object of the research is neural networks and information security systems (ISS) of automated data processing systems (ADPS). The authors proceed from the basic conceptual requirements for intrusion detection systems - adaptability, learnability and manageability. The developed intrusion detection procedure considers both internal and external threats. It consists of two subsystems: a subsystem for detecting possible intrusions, which includes subsystems for predicting, controlling and managing access, analyzing and detecting the recurrence of intrusions, as well as a subsystem for countering intrusions, which includes subsystems for blocking / destroying protected resources, assessing losses associated with intrusions, and eliminating the consequences of the invasion. Methodological studies on the development of intrusion detection procedures are carried out using artificial intelligence methods, system analysis, and the theory of neural systems in the field of information security. Research in this work is carried out on the basis of the achievements of the system-conceptual approach to information security in ADPS.The main result obtained in this work is a block diagram (algorithm) of an adaptive intrusion detection procedure, which contains protection means and mechanisms, built by analogy with neural systems used in security systems.The developed general structure of the intrusion detection and counteraction system allows systematically interconnecting the subsystems for detecting possible intrusions and counteracting intrusions at the conceptual level.
Keywords: automated data processing, information protection strategies, intrusion detection systems, information security support, information protection, intelligent systems, neural networks, adaptable systems, attack detection system, software information protection
https://fstec.ru/tekhnicheskaya-zashchita-informatsii/dokumenty-po-sertifikatsii/120-normativnye-dokumenty/406-metodicheskie-dokumenty-utverzhdeny-fstek-rossii-3-fevralya-2012-g-Rezhim dostupa 15.04.2020.
https://fstec.ru/tekhnicheskaya-zashchita-info Rezhim dostupa 15.04.2020.rmatsii/dokumenty-po-sertifikatsii/120-normativnye-dokumenty/407-metodicheskie-dokumenty-utverzhdeny-fstek-rossii-6-marta-2012-g-Rezhim dostupa 15.04.2020.
G. A. Popov, S. Zh. Simavoryan, A. R. Simonyan, E. I. Ulitina Modelirovanie protsessa monitoringa sistem informatsionnoy bezopasnosti na osnove sistem massovogo obsluzhivaniya // Informatika i ee primeneniya, 2020. T. 14. Vyp. 1. S. 71-79.
Kovalev D.O. Vyyavlenie narusheniy informatsionnoy bezopasnosti po dannym monitoringa informatsionno-telekommunikatsionnykh setey. / Avtoreferat dissert. na soisk. kand. tekhn. nauk. Moskva. 2011. https://www.dissercat.com/content/vyyavlenie-narushenii-informatsionnoi-bezopasnosti-po-dannym-monitoringa-informatsionno-tele/read-Rezhim dostupa 15.04.2020.
Simavoryan S.Z., Simonyan A.R., Ulitina E.I., Popov G.A..
On the concept of creating intelligent information security systems based on neural network intrusion detection systems in automated data processing systems
// Software systems and computational methods. – 2019. – № 3.
– P. 30-36.
Read the article
Abstract: The subject of the research is the concept of creating intelligent information protection systems based on neural network intrusion detection systems in automated data processing systems, developed as part of the funded project of the RFBR No. 19-01-00383. The object of the study is the intelligent information protection systems in automated data processing systems, built on the basis of neural intrusion detection systems, and later on the mechanisms of artificial immune systems. The authors consider adaptability, learning ability and controllability as the main conceptual requirements for the intrusion detection systems. Particular attention is focused on the construction of a flexible intelligent information protection system containing intrusion detection systems in both the nodes of the structural components of automated data processing systems, and in data transmission networks between structural components. Methodological studies of the chosen research direction are carried out using the methods of artificial intelligence, system analysis, the theory of intelligent information systems in the field of artificial intelligence. The work uses the achievements of a system-conceptual approach to information protection in automated data processing systems. The main result of the study is the conclusion that successful protection of information in automated data processing systems can only be carried out in a network in the form of interconnected local intrusion detection systems using neural network technologies combined into a single head center based on a system-conceptual approach. To combat unauthorized intrusions, it is necessary to adopt a unified systematic approach based on uniform legal, organizational and technical measures to protect information. The application of a system-conceptual approach to the creation of intrusion detection systems based on neural network technologies will contribute to the development of new tools, methods and activities for the intelligent management of information security in automated data processing systems.
Keywords: attack detection system, adaptable systems, automated data processing, information security strategies, intrusion detection systems, neural systems, protection of information, intelligent systems, software information protection, hardware information protection
Baboshin V.A., Vasil'ev V.A., Golubev V.E. Obzor zarubezhnykh i otechestvennykh sistem obnaruzheniya komp'yuternykh atak // Informatsiya i kosmos. 2015. № 2. S. 36-41
Sushchestvuyushchie na rynke sistemy obnaruzheniya vtorzheniy // http://prog.bobrodobro.ru/106354. – Rezhim dostupa 10.04.2019.
Razrabotchiki i proizvoditeli antivirusnykh programm // http://www.antivirus-navigator.com/designers_av.htm-Rezhim dostupa 10.05.2019.
Simavoryan S.Zh., Simonyan A.R., Ivanovna U.E., Simonyan R.A. Sistemnyy podkhod k proektirovaniyu intellektual'nykh sistem zashchity informatsii // Izvestiya Sochinskogo gosudarstvennogo universiteta. 2013. № 4-2 (28). S. 128-132.
Simavoryan S.Zh., Simonyan A.R., Ulitina E.I., Simonyan R.A. About one approach to a question of classification of intellectual systems of information security // Modeling of Artificial Intelligence. 2014. № 1 (1). S. 29-44.
Simavoryan S.Zh., Simonyan A.R., Ulitina E.I., Simonyan R.A. Projecting intelligent systems to protect information in automated data processing systems (function
Kornienko A.A., Polyanichko M.A..
A method for insiders detection in the organization
// Software systems and computational methods. – 2019. – № 1.
– P. 30-41.
Read the article
Abstract: Detecting insider threats is a task that analysts and information security administrators address in the commercial sector and in government organizations. Up to 75% of incidents involving insider actions are still detected manually. Detection of insider threats in an organization can be carried out using a set of organizational and technical measures. To identify them, the authors propose the use of behavioral and technical indicators. The aim of the article is to increase the effectiveness of countering random and malicious insider information security threats by developing a method for detecting insider activity in an organization. To achieve this goal authors used set-theoretic modeling, a hierarchy analysis method, a fuzzy logic apparatus and a fuzzy inference system. As a result of the study authors developed a method that allows detecting insider activity in an organization based on evaluating an employee's predisposition to insider activity and identifying an insider as a result of recording an information security incident. The developed method can be used to create an automated system for identifying insiders in an organization.
Keywords: threats, counteraction, insider detection, insider, information security, internal threats, security, organization, automated systems, modeling
Khovanov N.V. Matematicheskie osnovy teorii shkal izmereniya kachestva. — L.: LGU, 1982.
Saati T. Prinyatie resheniy. Metod analiza ierarkhiy / T. Saati. – M.: Radio i svyaz', 1993. – 278 s.
Anikin I.V. Information Security Risks Assessment Method Based on AHP and Fuzzy Sets // 2nd Intl’ Conference on Advances in Engineering Sciences and Applied Mathematics (ICAESAM’2014) May 4-5, 2014.
Dong M. Approaches to group decision making with incomplete information based on power geometric operators and triangular fuzzy AHP / M. Dong, S. Li, H. Zhang // Expert Systems and Applicatinons.-2015.-Vol. 42, Issue 21.-pp. 7846-7857.
Fu S., Zhou H. The information security risk assessment based on AHP and fuzzy comprehensive evaluation, 2011 IEEE 3rd International Conference on Communication Software and Networks, Xi’an, 2011, pp. 124-128.
Insider Threat Report: 2018-CA Technologies // CA Technologies URL: https://www.ca.com/content/dam/ca/us/files/ebook/insider-threat-report.pdf (data obrashcheniya: 18.07.2018).
Method for estimating the cost of the life cycle of systems for protecting against computer attacks
// Software systems and computational methods. – 2018. – № 2.
– P. 17-27.
Read the article
Abstract: The article deals with the economic aspects of building protection systems against computer attacks for information-computing and automated systems for various purposes. An objective assessment of the cost of the life cycle of systems to protect against computer attacks is one of the most important factors that determines the strategy for choosing a rational option for building defense systems. The subject of the study are the economic aspects of choosing options for building defense systems against computer attacks, as well as minimizing the financial costs of their creation and operation. The object - the system to protect against computer attacks. The methodology of this study is based on the use of an integrated approach to assessing the life cycle cost of protection systems as the costs included in the calculation year, including the share of the cost of the protection system, the costs of its implementation, operation during the use of the protection system, and the costs of its disposal at the end service life. Scientific novelty of the work is to create a real practical methodology that allows to evaluate all the components of one-time and current costs that are included in the cost of the life cycle of systems to protect against computer attacks. The offered technique allows to carry out an estimation of cost of a life cycle of several alternative variants of construction of system of protection against computer attacks and to make a choice of admissible on cost variants of construction of system of protection.
Keywords: operating costs, total cost of ownership, cost estimation, current expenses, non-recurrent costs, life cycle cost, information security, protection system, computer attacks, information-computing systems
Ermakova A. V. Stoimost' zhiznennogo tsikla i raskhody na ekspluatatsiyu // Sbornik dokladov III Vserossiyskoy prakticheskoy konferentsii-seminara «Korporativnye zakupki 2015: Praktika primeneniya Federal'nogo zakona № 223-FZ». Institut gosudarstvennykh i reglamentirovannykh zakupok, konkurentnoy politiki i antikorruptsionnykh tekhnologiy (Institut goszakupok). – 2015. – S. 30-39.
Petrenko S. A. Otsenka zatrat na kiberbezopasnost' // Trudy ISA RAN. – 2006. – t. 27. – S. 234-265.
Petlina E. M., Khatagova S. V. Ob otsenke stoimosti meropriyatiy po zashchite informatsii // Nauchnyy al'manakh. – 2016. – №8-1(22). – S. 242-245.
Drobotun, E. B. Sintez sistem zashchity avtomatizirovannykh sistem upravleniya ot razrushayushchikh programmnykh vozdeystviy // Programmnye produkty i sistemy. – 2016. – №3 (115). – S. 51 – 59.
Karpychev V. Yu. Ekonomicheskiy analiz normativno-tekhnicheskogo obespecheniya informatsionnoy bezopasnosti / V. Yu. Karpychev // Ekonomicheskiy analiz: teoriya i praktika. – 2011. – №35 (242). – S. 2 – 18.
Prikaz Federal'nogo agen
Security of the Multi-Agent Platform
// Software systems and computational methods. – 2017. – № 3.
– P. 16-24.
Read the article
Abstract: The research is devoted to the topical issue of ensuring security of heterogeneous information platforms applying the multi-agent threat detection systems. The object of the research is the multi-agent platform. The author pays special attention to such aspects of the topic as security of multi-agent platforms, managing threat detection agents, interaction between different threat detection agents, and vulnerability of multi-agent platforms. The author also analyses tendencies for developing new distributed security structures. In his research Lyapustin offers a mutl-agent structure that can be used by security service as well as a general scenario for deploying security policy in threat detection multi-agent systems. In terms of theory, the results of the research demonstrate the need to extend the scope of the multi-agent approach and integrate it with the intelligent analysis of information systems development and operation. The result of the research is the concept of a secure multi-agent platform that can be used in the treat detection multi-agent system.
Keywords: threat detection agent, heterogeneous information platforms, multi-agent platform, intelligent protection system, threat detection, information security, analysis systems, detection algorithms, agent platform, multi-agent system
Lyapustin A.E. Razrabotka i issledovanie modeley i metodik kompleksnoy zashchity geterogennykh informatsionnykh platform // Natsional'naya bezopasnost' / nota bene. — 2015.-№ 4.-S.508-514.
Karygiannis T., Jansen W. Mobile Agent Security.-NIST Special Publication – 800-19, October 1999.
Nguyen G., et al. Agent platform evaluation and comparison.-Pellucid 5FP IST-2001-34519.-2002.
Poslad S., et al. Specifying standard security mechanisms in multi-agent systems / In: Trust, Reputation, and Security: Theories and Practice, 2003.-P. 227-237.
Mana A., et al. Towards secure agent computing for ubiquitous computing and ambient intelligence // LNCS Ubiquitous Intelligence and Computing.-2007.-Vol. 4611.-P. 1201-1212.
Garrigues C., et al. Promoting the development of secure mobile agent applications // The Journal of Systems and Software.-2009. – P. 1-38.
AOS, Jack intelligent agents: Jack manual, release 4.1.-Technical report, Agent Oriented Software Pvt. Ltd, 2005.
d'Inverno M., et al. The dMARS Architech
Ivanov S.E., Khlopotov M.V., Ivanova L.N..
Building the office security system based on Z-Wave network
// Software systems and computational methods. – 2016. – № 4.
– P. 333-339.
Read the article
Keywords: controllers, mobile app, mobile device, sensors, Android, control, office equipment, Z-Wave radio protocol, security system, Z-Wave network
Kostennikov M.V., Kurakin A.V., Kuleshov G.N., Nesmelov P.V. Gosudarstvennaya sluzhba i informatsionnye tekhnologii // Administrativnoe i munitsipal'noe pravo. - 2012. - 12. - C. 27 - 34.
Vladimirova T.V. Novye sotsial'nye mobil'nosti kak praktiki obespecheniya informatsionnoy bezopasnosti // Politika i Obshchestvo. - 2014. - 8. - C. 902 - 909. DOI: 10.7256/1812-8696.2014.8.11110.
R. M. Aslanov, A. A. Morozov Sistemnyy analiz pravovogo obespecheniya informatsionnoy bezopasnosti v Rossiyskoy Federatsii // Natsional'naya bezopasnost' / nota bene. - 2012. - 2. - C. 56 - 59.
Kurakin A.V., Kuleshov G.N., Nesmelov P.V. Informatsionnaya bezopasnost' v sisteme gosudarstvennoy sluzhby // Administrativnoe i munitsipal'noe pravo. - 2013. - 2. - C. 172 - 176. DOI: 10.7256/1999-2807.2013.02.13.
I. S. Sadikova Pravovye aspekty zashchity personal'nykh dannykh // Pravo i politika. - 2012. - 4. - C. 758 - 761.
Kuznetsova E.I. Razrabotka instrumentariya obespecheniya ekonomicheskoy bezopasnosti predpriyat
Ponachugin A.V., Odintsov I.V..
Control system for Spotting Out Online Users’ Unauthorized Activity
// Software systems and computational methods. – 2016. – № 1.
– P. 23-31.
Read the article
Abstract: The article is devoted to the main types of users’ unauthorized activity and analysis of existing approaches to the data security on the Internet, their design and technical implementation features. The authors of the article examine the control system designated not only to monitor but also to prevent malicious activity in corporate computer network. The authors also demonstrate the construction of the security system as one of the main organization departments and the system maintenance after it has been implemented. The authors provide the list of the main information leakage channels. After that, the authors unfold the problem step by step from the methods used by intruders to get unauthorized access to the corporate computer network to the actions the data protection system must perform. The authors describe the full chain of actions to be completed by the security system. The results of the research allow to compare the existing methods and services protecting the computer network from unauthorized access both outside and inside the enterprise. The authors also develop the recurrence scheme for creating the security system, outline the scope of functions to be performed and analyze the security of the services used.
Keywords: neuronet, system vulnerability, intruder, security, computer networks, Cisco, Internet, computer system, unauthorized access, confidential information
Tashkov P. Zashchita komp'yutera na 100%: sboi, oshibki i virusy. Izd-vo Piter, 2010. 288 s.
Shan'gin V.F. Informatsionnaya bezopasnost' komp'yuternykh sistem i setey: uchebnoe posobie. M.: ID «FORUM»; INFRA-M, 2008. 416 s.
Yasnitskiy L.N. Vvedenie v iskusstvennyy intellekt: Uchebnoe posobie dlya stud. vyssh. ucheb. zavedeniy / L.N. Yasnitskiy. M.: Izdatel'skiy tsentr «Akademiya», 2010. 176 s.
Yashchenko V.V. Vvedenie v kriptografiyu / V.V. Yashchenko. M.: 2014. 705 c.
Stepanov V.G. Informatsionnaya bezopasnost': Uchebno-metodicheskie materialy. M.:MIEMP, 2005. 19 s.
Romanets Yu.V., Timofeev P.A. Zashchita informatsii v komp'yuternykh setyakh / Pod red. V.F. Shan'gina. 2-e izd., pererab. i do. M.: Radio i svyaz', 2001. 376 s.
Mendelevskiy I.D. Ataka cherez Internet / NPO «Mir i sem'ya-95», 1997. 202 s.
Migalova K.S., Ponachugin A.V. Problema bezopasnosti elektronnykh platezhey. V sbornike: Perspektivy razvitiya nauki Mezhdunarodnaya nauchno-prakticheskaya konferentsiya. Otv. red.:
Zavodtsev I.V., Gaynov A.E..
Developing a mechanisms of collecting initial information and converting its’ presentation format for security events monitoring systems
// Software systems and computational methods. – 2015. – № 1.
– P. 21-31.
Read the article
Abstract: Mechanisms to collect and convert the format of presentation of the initial information are essential in the functional structure of management systems for information security incidents. Therefore, the paper discusses the development of a module for events translation, which provides merging registration events into one point. And it is also important to have the ability to implement transfer of raw data from single sensors into the consolidated database system of correlation. This requires development of a mechanism of data aggregation with further normalization and prioritization which provides source data compression for subsequent decision making on the presence / absence of information security incident over the current period. The authors carried out the development of the mathematical apparatus for translation events module for perspective management systems for information security incidents, which provides merging registration events from many sources into one point. In this paper the authors propose a mechanism for gathering and converting the format of presentation of the initial information, including: a procedure for data converting before transporting by assigning alpha or numeric identifier to fields of registration logs line by line and splitting these identifiers into groups; procedures of categorization and prioritization; algorithm for aggregating data about events, based on the calculation of the sample coefficient of correlation between signs of elementary events.
Keywords: event of information security, information security, incident management, management systems for information security incide, data extraction, registration logs, data normalization, events categorization, eventss prioritization, data filtering
Prosmotr sobytiy Windows [Elektronnyy resurs] – Rezhim dostupa: http://windows.microsoft.com/ru-ru/windows/what-information-event-logs-event-viewer#1TC=windows-7
Zavodtsev, I. V. Metody i sposoby upravleniya intsidentami informatsionnoy bezopasnosti : Matematicheskie metody i informatsionno-tekhnicheskie sredstva / I.V. Zavodtsev, A.E. Gaynov // materialy IX Vseros. nauch.-prakt. konf., 21–22 iyunya 2013 g. – Krasnodar: Krasnodar. un-t MVD Rossii, 2013. – 366 s.
Kotenko, I. V. Primenenie tekhnologii upravleniya infor-matsiey i sobytiyami bezopasnosti dlya zashchity informatsii v kriticheski vazhnykh infrastrukturakh / I.V. Kotenko, I.B. Saenko, O.V. Polubelova, A.A. Chechulin // Trudy SPI-IRAN. SPb.: Nauka, 2012. Vyp. 1(20). S.27–56.
Analiticheskiy otchet «Obzor intsidentov informatsionnoy bezopasnosti ASU TP zarubezhnykh gosudarstv» (po materialam Internet-izdaniy za 2008-2010 gg.) M. : NTTs «Stankoinformza-shchita» [Elektronnyy resurs] Rezhim dostupa: http://itdefence.ru
Kotenko, I. V. Postr
Sosnin Yu.V., Kulikov G.V., Nepomnyashchikh A.V..
A complex of mathematical models of configuration optimization for means of information security from unauthorized access
// Software systems and computational methods. – 2015. – № 1.
– P. 32-44.
Read the article
Abstract: The subject of study is the problem of formalized description of conflicts arising in the protection of information from unauthorized access, for more information on possible action potential enemy and their consequences for the benefit of the selection and implementation of the defense strategy of information in automated systems. The initial data are the list of objects of the automated system and the value of the processed information to them; a list of information security and their cost; a list of possible methods of implementing the threat of unauthorized access to information, cost and efficiency. The result is the most effective means of protection configuration information for each object with the estimates of the effectiveness and cost of its implementation. Methods used: game theory, probability theory, reliability theory, system analysis, the theory of the collection and processing of expert information. The application of the developed models of information security processes for optimum configuration of information security for which each option protection system is characterized by unique quantification of having a clear physical meaning (security measure), so it is possible to choose a specific embodiment of the object of protection of the automated system by the criterion of maximum security (with cost constraints) or minimum value (for fixed requirements for security). Furthermore, the optimization of the composition and structure of information protection system design and in changing the original data is not time-consuming.
Keywords: evaluation of data protection, threats to information security, security risk management, modeling of information security, modeling of information threats, information security management, information protection, information security, unauthorized information exposure, criteria for data protection
Chirov D.S., Tereshonok M.V., Elsukov B.A. Metod i algoritmy optimizatsii tekhnicheskikh kharakteristik kompleksov radiomonitoringa // T-Comm: Telekommunikatsii i transport. 2014. T. 8. № 10. S. 88-92.
Chirov D.S. Metodicheskii podkhod k obosnovaniyu tekhnicheskikh kharakteristik kompleksov radiomonitoringa dlya resheniya zadach raspoznavaniya istochnikov radioizlucheniya // T-Comm: Telekommunikatsii i transport. 2011. T. 5. № 11. S. 85-87.
Khar'kov V.P., Merkulov V.I. Formirovanie zadannoi konfiguratsii slozhnoi raspredelennoi sistemy upravleniya // Radiotekhnika. 2011. № 6. S. 96-101.
Khar'kov V.P. Postroenie optimal'nykh algoritmov upravleniya nelineinymi dinamicheskimi sistemami // Innovatsii na osnove informatsionnykh i kommunikatsionnykh tekhnologii. 2013. T. 1. S. 278-281.
Fedorov M.V., Kalinin K.M., Bogomolov A.V., Stetsyuk A.N. Matematicheskaya model' avtomatizirovannogo kontrolya vypolneniya meropriyatii v organakh voennogo upravleniya // Informatsionno-izmeritel'nye i upravlyayushch
Korobeinikov A.G., Pirozhnikova O.I..
Model of mathematical calculations of the probability of unauthorized physical
penetration to information assets
// Software systems and computational methods. – 2014. – № 2.
– P. 160-165.
Read the article
Abstract: according to the current state standards, “security of information assets” combines
protection of four types: physical, technical, legal and cryptographic. This implies that it is a
complex concept. Furthermore, in accordance with regulatory documents, protective actions
for providing information security are subdivided into organizational and technical measures.
Technical protective actions directed at such functions as restricting threats, deterrence,
prevention, detection, notification of various events at the facility of informatization, monitoring
the state of information assets, error correction, asset recovery system etc. Analysis of the current
state of methods and means for the alarm system, which is the most important component
of complex system of information security, showed that such systems need to be constantly improved to meet the constantly raising requirements for protection of modern objects of
information. Hence it follows that development of mathematical models for calculating the
probabilities of unauthorized physical penetration to information assets, forming the integrated
system of information security, is an urgent task. To solve the presented problem the article uses
methods of information protection, theory of graphs and probability theory. The presented
results were obtained using the Maple system of computer algebra. Scientific novelty is in
the methods being based on the graph theory and mathematical model of calculating the
probability of unauthorized physical penetration to information assets. The model itself is built
in three stages on the base of on the specific source data from the estimation of the probability
of detecting an unauthorized physical penetration to information assets by alarm system.
Keywords: neograf, acyclic graph, unauthorized physical penetration, technical protection measures, protection of the information assets, orgraph, adjacency matrix, weight matrix, Dijkstra algorithm, somposition of probabilities
Korobeynikov A.G., Grishentsev A.Yu. Razrabotka i issledovanie mnogomernykh matematicheskikh modeley s ispol'zovaniem sistem komp'yuternoy algebry // SPbNIU ITMO.-Sankt-Peterburg: SPbNIU ITMO, 2013.-100 s.
Bogatyrev V.A., Bogatyrev S.V., Bogatyrev A.V. Optimizatsiya drevovidnoy seti s rezervirovaniem kommutatsionnykh uzlov i svyazey. //Telekommunikatsii. 2013. № 2. – S. 42-48.
Grishentsev A.Yu., Korobeynikov A.G. Postanovka zadachi optimizatsii raspredelennykh vychislitel'nykh sistem // Programmnye sistemy i vychislitel'nye metody.-2013.-4.-C. 370-375. DOI: 10.7256/2305-6061.2013.4.10548
Korobeynikov A.G., Kuvshinov S.S., Blinov S.Yu., Leyman A.V., Kutuzov I.M..
Generation of digital watermarks in image files
// Software systems and computational methods. – 2013. – № 1.
– P. 35-44.
Read the article
Abstract: the article presents a problem of creating digital watermarks for image files. The authors
analyze the main characteristics and requirements to the digital watermarks, introduces a mathematical model of digital watermark generation for “hard” and “soft” stegodetectors. The
article analyses the algorithm of message implementation and it proposes the application of the
described stego algorithm for solving the problem of copyright check to a specific multimedia file.
Keywords: Software, digital watermarks, format methods, steganos algorithms of spatial area, steganos algorithms of the field of transformation, multimedia, media space, copyright, copyright protection, inter-format conversation
Cidorkina I.G., Korobeynikov A.G., Kudrin P.A. Algoritm raspoznavaniya trekh-mernykh izobrazheniy s vysokoy detalizatsiey // Vestnik Mariyskogo gosudarstven-nogo tekhnicheskogo universiteta. – 2010. – № 2 (9). – S. 91–99.
Osborne C., van Schyndel R., Tirkel A. A Digital Watermark // IEEE In-tern. Conf. on Image Processing, 1994. P. 86-90.
Ramkumar M. Data Hiding in Multimedia. PhD Thesis. New Jersey Institute of Technology, 1999. 72 p.
Simmons G. The prisoner‘s problem and the subliminal channel // Proc. Workshop on Communications Security (Crypto‘83), 1984. P. 51-67.
Barsukov V.S. Romantsov A.P. Komp'yuternaya steganografiya: vchera, segodnya, zavtra. Tekhnologii informatsionnoy bezopasnosti XXI veka. – materialy Internet-resursa «Spetsial'naya tekhnika» , № 4, 1998 g. (http://st.ess.ru). Poslednee obrashchenie – 10 ok-tyabrya 2012 g.
W. Bender, D. Gruhl, N. Morimoto, A. Lu, Tehniques for data Hiding/ IBM Systems Journal, 35 (3&4): pp. 313-336, 1996.
Sklyar B. Tsifrovaya svyaz'.
The architecture components of the spelling
verification system for Finno-Ugric
// Software systems and computational methods. – 2012. – № 1.
– P. 28-36.
Read the article
Abstract: The article reviews the architecture
of a developed system for spelling verification
of Finno-Ugric languages. The architecture
of this system is divided into functional
units, each of them is given a detailed
description. The article contains graphics
showing the relationship of functional blocks
of the system. The author also discusses the
main advantages of the proposed system in
comparison to existing solutions and gives a
diagram of the developed system.
Keywords: Software, spelling verification, spell check, computer linguistics, natural lan guage processing, system architecture, finno-ugric languages, spell-checker, functional blocks, linguistic components
K.N. Sanukov et al. (ed.) Congressus Decimus Internationalis Fenno-Ugristarum. Yoshkar-Ola 15.08.-21.08.2005. Pars IV. Linguistica. Yoshkar-Ola: Mariyskiy gosudarstvennyy universitet, 2008. Pp. 480-484.
Sistema proverki orfografii MarlaMuter ? http://marlamuter.org/checker/
Kileev, V.V. Analiz algoritmov stemminga dlya formalizatsii komponentov yazyka finno-ugorskoy gruppy. / V.V. Kileev, I.G. Sidorkina // «Trudy kongressa po intellektual'nym sistemam i informatsionnym tekhnologiyam «IS&IT’11». Nauchnoe izdanie v 4-kh tomakh»-M.:Fizmatlit, 2011.-T3 – S. 47-52
J.B. Lovins, 1968: "Development of a stemming algorithm," Mechanical Translation and Computational Linguistics 11, 22-31.
Willett, P. (2006) The Porter stemming algorithm: then and now. Program: electronic library and information systems, 40 (3). pp. 219-223.
Harman, D. “How Effective is Suffixing.” Journal of the American Society for Information Science 42 (1), 1991, 7-15.
Fred J. Damerau, A technique for computer detection and c