Nothing Special   »   [go: up one dir, main page]

skip to main content
Volume 57, Issue 8Dec 2023
Reflects downloads up to 18 Dec 2024Bibliometrics
research-article
Assessment of the Effectiveness of an Information Security System
Abstract

This article discusses a methodological approach to building models for assessing the effectiveness of a program (project) for creating or modernizing an information security system in the interests of ensuring the sustainability and ...

research-article
Resistance of a Two-Component Steganographic System to Unauthorized Information Extraction
Abstract

In the classical sense, steganography does not pursue the goal of protecting information from extraction, but the use of a two-component steganographic system ensures not only information masking but also cryptographic strength. The article ...

research-article
Method for Detecting Manipulation Attacks on Recommender Systems with Collaborative Filtering
Abstract—

The security of recommendation systems with collaborative filtering from manipulation attacks is considered. The most common types of attacks are analyzed and identified. A modified method for detecting manipulation attacks on recommendation ...

research-article
Current Trends in Methods of the Efficient Automation of Data Processing
Abstract—

This article considers the problem of automating the determination of daily water discharge rates based on continuously measured levels and individual water discharge measurements using discharge curves (DCs), which are the most basic ...

research-article
Methodological Approach to Construct Models for Predicting Indicators of Properties of Information Security Systems
Abstract

A methodological approach to construct models for predicting indicators of properties of information security systems at evolutionary stages of development is proposed. The approach is based on the idea of the development of information security ...

research-article
Approach for Protecting Mobile Device User’s Data Based on Multifactor Authentication, Visual Cryptography, and Steganography
Abstract

An approach is proposed to protect user’s personal data stored on mobile devices running the Android OS, which combines multifactor authentication, secret sharing, visual cryptography, and steganography; and it also uses the built-in security ...

research-article
Assessing the Security of a Cyber-Physical System Based on an Analysis of Malware Signatures
Abstract—

The structure and basic properties of a generalized cyber-physical system are studied. Information security problems and basic approaches to ensuring the cyber security of these systems are analyzed. A method based on the analysis of the ...

research-article
Investigation of the Structure of the Isogeny Graph for Postquantum Cryptography Protocols
Abstract

The isogeny graphs of supersingular curves are one of the promising mathematical structures in postquantum cryptography algorithms. However, the recently reported attack on the SIDH protocol [1] demonstrates that the isogeny graphs require a more ...

research-article
Analysis of Cryptographic Protection of the Bitcoin Core Cryptographic Wallet
Abstract—

This article discusses the security of implementing encryption for the Bitcoin Core cryptocurrency wallet. Particular attention is paid to aspects of the practical use of cryptographic algorithms when encrypting the wallet.dat file with a ...

research-article
Finding Enumerators for Generalized (L, G)-Code
Abstract

The algorithm for finding the enumerators of degree 2 and higher for the generalized (LG)‑code is presented. This algorithm makes it possible to enhance the rate of finding enumerators as distinct from the exhaustive search algorithm. It can be ...

research-article
Decimation of M Sequences As a Way of Obtaining Primitive Polynomials
Abstract—

One approach to obtain a cryptographically strong encryption gamma is to use linear-feedback shift registers defined by primitive polynomials. The ability to quickly select the appropriate polynomial can provide the required degree of security of ...

research-article
Empirical Study of the Stability of a Linear Filter Based on the Neyman–Pearson Criterion to Changes in the Average Values
Abstract—

The statement about the stability of a linear filter built based on the Neyman–Pearson criterion is verified by performing falsifying experiments. No relationship is found between the number of small eigenvalues of the noise covariance matrix and ...

research-article
Risk Assessment of Using Open Source Projects: Analysis of the Existing Approaches
Abstract

This article analyzes the existing approaches to assess and account for the components used in software, including open source software. The existing frameworks for assessing software development processes, including information security, are ...

research-article
Searching for Software Vulnerabilities Using an Ensemble of Algorithms for the Analysis of a Graph Representation of the Code
Abstract

This article analyzes the existing methods for searching for software vulnerabilities. For methods using deep learning models on a graph representation of the code, the problem of imaginary relationships between procedures is formulated, which ...

research-article
Analysis of Decompiled Program Code Using Abstract Syntax Trees
Abstract

This article proposes a method for preprocessing fragments of binary program codes for subsequent detection of their similarity using machine learning methods. The method is based on the analysis of pseudocode obtained as a result of decompiling ...

research-article
Features of Detecting Malicious Installation Files Using Machine Learning Algorithms
Abstract

This paper presents a study of the possibility of using machine learning methods to detect malicious installation files related to the type of Trojan installers and downloaders. A comparative analysis of machine learning algorithms applicable for ...

research-article
Confidentiality of Machine Learning Models
Abstract

This article is about ensuring the confidentiality of models using machine learning systems. The aim of this study is to ensure the confidentiality of models when using machine learning systems. This study analyzes attacks aimed at violating the ...

research-article
Hybrid Method for the Detection of Evasion Attacks Aimed at Machine Learning Systems
Abstract

The existing methods for the detection of evasion attacks in machine learning systems are analyzed. An experimental comparison of the methods is carried out. The uncertainty method is universal; however, in this method, it is difficult to ...

research-article
Defense against Adversarial Attacks on Image Recognition Systems Using an Autoencoder
Abstract

Adversarial attacks on artificial neural network systems for image recognition are considered. To improve the security of image recognition systems against adversarial attacks (evasion attacks), the use of autoencoders is proposed. Various attacks ...

research-article
Protection of Computational Machine Learning Models against Extraction Threat
Abstract

The extraction threat to machine learning models is considered. Most contemporary methods of defense against the extraction of computational machine learning models are based on the use of a protective noise mechanism. The main disadvantage ...

research-article
Improving the Efficiency of Multiagent Information Security Systems by Post-Quantum Cryptography Methods
Abstract

The information security problems for open multiagent systems using access control schemes based on RSA algorithm are analyzed. It is shown that when using such schemes, a significant part of the agents’ lifetime is spent on authentication ...

research-article
Application of a Neocortex Model to Identify Contextual Anomalies in the Industrial Internet of Things Network Traffic
Abstract

This paper examines the problem of identifying network anomalies when processing data streams in industrial systems. A network anomaly refers to a malicious signature and the current context: network environment and topology, routing parameters, ...

research-article
A Decentralized Approach to Intrusion Detection in Dynamic Networks of the Internet of Things Based on Multiagent Reinforcement Learning with Interagent Interaction
Abstract

The application of multiagent reinforcement learning technology to solve the problem of intrusion detection in the Internet of Things (IoT) systems is considered. Three models of a multiagent intrusion detection system are implemented: a ...

research-article
Stability Analysis of the Architecture of Messaging Systems with a Decentralized Node Structure
Abstract

The results of an architecture stability analysis of messaging systems with a decentralized node structure Briar and Bridgefy are presented. Mathematical models of target systems are developed and protocols for generating keys, establishing ...

research-article
Cyberattack Detection in the Industrial Internet of Things Based on the Computation Model of Hierarchical Temporal Memory
Abstract

This study considers the problem of detecting network anomalies caused by computer attacks in the networks of the industrial Internet of things. To detect anomalies, a new method is proposed, built using a hierarchical temporal memory (HTM) ...

research-article
Early Detection of Network Attacks Based on Weight-Insensitive Neural Networks
Abstract

In this paper, we describe an approach for the early detection of network attacks using weight-insensitive neural networks (or weight agnostic neural networks (WANNs). The selection of the type of neural networks is determined by the specifics of ...

research-article
Graph-Based Self-Regulation for Different Types of Networks with Adaptive Topology
Abstract—

This article presents graph theory-based approaches to self-regulation of networks with adaptive network topology. These approaches are limited to networks with no node mobility—peer-to-peer and heterogeneous sensor networks, as well as ...

research-article
Framework for Modeling Security Policies of Big Data Processing Systems
Abstract

This paper studies automatizing the analysis of access control in big data management systems by modeling security policies. It analyzes modern methods of ensuring access control in this class of systems, determines the respective requirements, ...

research-article
Improving the Quality of the Identification of the Information Security State Based on Sample Segmentation
Abstract

Increasing the quality indicators for identifying the information security (IS) state of individual segments of cyber-physical systems is related to processing large information arrays. A method for improving quality indicators when solving ...

research-article
Method for the Adaptive Neutralization of Structural Breaches in Cyber-Physical Systems Based on Graph Artificial Neural Networks
Abstract

This paper presents a model of threats in cyber-physical systems (CPSs) with examples of attacks and potential negative consequences for systems for various purposes. It is concluded that the critical consequences of attacks are associated with ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.