Assessment of the Effectiveness of an Information Security System
This article discusses a methodological approach to building models for assessing the effectiveness of a program (project) for creating or modernizing an information security system in the interests of ensuring the sustainability and ...
Resistance of a Two-Component Steganographic System to Unauthorized Information Extraction
In the classical sense, steganography does not pursue the goal of protecting information from extraction, but the use of a two-component steganographic system ensures not only information masking but also cryptographic strength. The article ...
Method for Detecting Manipulation Attacks on Recommender Systems with Collaborative Filtering
The security of recommendation systems with collaborative filtering from manipulation attacks is considered. The most common types of attacks are analyzed and identified. A modified method for detecting manipulation attacks on recommendation ...
Current Trends in Methods of the Efficient Automation of Data Processing
This article considers the problem of automating the determination of daily water discharge rates based on continuously measured levels and individual water discharge measurements using discharge curves (DCs), which are the most basic ...
Methodological Approach to Construct Models for Predicting Indicators of Properties of Information Security Systems
A methodological approach to construct models for predicting indicators of properties of information security systems at evolutionary stages of development is proposed. The approach is based on the idea of the development of information security ...
Approach for Protecting Mobile Device User’s Data Based on Multifactor Authentication, Visual Cryptography, and Steganography
An approach is proposed to protect user’s personal data stored on mobile devices running the Android OS, which combines multifactor authentication, secret sharing, visual cryptography, and steganography; and it also uses the built-in security ...
Assessing the Security of a Cyber-Physical System Based on an Analysis of Malware Signatures
The structure and basic properties of a generalized cyber-physical system are studied. Information security problems and basic approaches to ensuring the cyber security of these systems are analyzed. A method based on the analysis of the ...
Investigation of the Structure of the Isogeny Graph for Postquantum Cryptography Protocols
The isogeny graphs of supersingular curves are one of the promising mathematical structures in postquantum cryptography algorithms. However, the recently reported attack on the SIDH protocol [1] demonstrates that the isogeny graphs require a more ...
Analysis of Cryptographic Protection of the Bitcoin Core Cryptographic Wallet
This article discusses the security of implementing encryption for the Bitcoin Core cryptocurrency wallet. Particular attention is paid to aspects of the practical use of cryptographic algorithms when encrypting the wallet.dat file with a ...
Finding Enumerators for Generalized (L, G)-Code
The algorithm for finding the enumerators of degree 2 and higher for the generalized (L, G)‑code is presented. This algorithm makes it possible to enhance the rate of finding enumerators as distinct from the exhaustive search algorithm. It can be ...
Decimation of M Sequences As a Way of Obtaining Primitive Polynomials
One approach to obtain a cryptographically strong encryption gamma is to use linear-feedback shift registers defined by primitive polynomials. The ability to quickly select the appropriate polynomial can provide the required degree of security of ...
Empirical Study of the Stability of a Linear Filter Based on the Neyman–Pearson Criterion to Changes in the Average Values
The statement about the stability of a linear filter built based on the Neyman–Pearson criterion is verified by performing falsifying experiments. No relationship is found between the number of small eigenvalues of the noise covariance matrix and ...
Risk Assessment of Using Open Source Projects: Analysis of the Existing Approaches
This article analyzes the existing approaches to assess and account for the components used in software, including open source software. The existing frameworks for assessing software development processes, including information security, are ...
Searching for Software Vulnerabilities Using an Ensemble of Algorithms for the Analysis of a Graph Representation of the Code
This article analyzes the existing methods for searching for software vulnerabilities. For methods using deep learning models on a graph representation of the code, the problem of imaginary relationships between procedures is formulated, which ...
Analysis of Decompiled Program Code Using Abstract Syntax Trees
This article proposes a method for preprocessing fragments of binary program codes for subsequent detection of their similarity using machine learning methods. The method is based on the analysis of pseudocode obtained as a result of decompiling ...
Features of Detecting Malicious Installation Files Using Machine Learning Algorithms
This paper presents a study of the possibility of using machine learning methods to detect malicious installation files related to the type of Trojan installers and downloaders. A comparative analysis of machine learning algorithms applicable for ...
Confidentiality of Machine Learning Models
This article is about ensuring the confidentiality of models using machine learning systems. The aim of this study is to ensure the confidentiality of models when using machine learning systems. This study analyzes attacks aimed at violating the ...
Hybrid Method for the Detection of Evasion Attacks Aimed at Machine Learning Systems
The existing methods for the detection of evasion attacks in machine learning systems are analyzed. An experimental comparison of the methods is carried out. The uncertainty method is universal; however, in this method, it is difficult to ...
Defense against Adversarial Attacks on Image Recognition Systems Using an Autoencoder
Adversarial attacks on artificial neural network systems for image recognition are considered. To improve the security of image recognition systems against adversarial attacks (evasion attacks), the use of autoencoders is proposed. Various attacks ...
Protection of Computational Machine Learning Models against Extraction Threat
The extraction threat to machine learning models is considered. Most contemporary methods of defense against the extraction of computational machine learning models are based on the use of a protective noise mechanism. The main disadvantage ...
Improving the Efficiency of Multiagent Information Security Systems by Post-Quantum Cryptography Methods
The information security problems for open multiagent systems using access control schemes based on RSA algorithm are analyzed. It is shown that when using such schemes, a significant part of the agents’ lifetime is spent on authentication ...
Application of a Neocortex Model to Identify Contextual Anomalies in the Industrial Internet of Things Network Traffic
This paper examines the problem of identifying network anomalies when processing data streams in industrial systems. A network anomaly refers to a malicious signature and the current context: network environment and topology, routing parameters, ...
A Decentralized Approach to Intrusion Detection in Dynamic Networks of the Internet of Things Based on Multiagent Reinforcement Learning with Interagent Interaction
The application of multiagent reinforcement learning technology to solve the problem of intrusion detection in the Internet of Things (IoT) systems is considered. Three models of a multiagent intrusion detection system are implemented: a ...
Stability Analysis of the Architecture of Messaging Systems with a Decentralized Node Structure
The results of an architecture stability analysis of messaging systems with a decentralized node structure Briar and Bridgefy are presented. Mathematical models of target systems are developed and protocols for generating keys, establishing ...
Cyberattack Detection in the Industrial Internet of Things Based on the Computation Model of Hierarchical Temporal Memory
This study considers the problem of detecting network anomalies caused by computer attacks in the networks of the industrial Internet of things. To detect anomalies, a new method is proposed, built using a hierarchical temporal memory (HTM) ...
Early Detection of Network Attacks Based on Weight-Insensitive Neural Networks
In this paper, we describe an approach for the early detection of network attacks using weight-insensitive neural networks (or weight agnostic neural networks (WANNs). The selection of the type of neural networks is determined by the specifics of ...
Graph-Based Self-Regulation for Different Types of Networks with Adaptive Topology
This article presents graph theory-based approaches to self-regulation of networks with adaptive network topology. These approaches are limited to networks with no node mobility—peer-to-peer and heterogeneous sensor networks, as well as ...
Framework for Modeling Security Policies of Big Data Processing Systems
This paper studies automatizing the analysis of access control in big data management systems by modeling security policies. It analyzes modern methods of ensuring access control in this class of systems, determines the respective requirements, ...
Improving the Quality of the Identification of the Information Security State Based on Sample Segmentation
Increasing the quality indicators for identifying the information security (IS) state of individual segments of cyber-physical systems is related to processing large information arrays. A method for improving quality indicators when solving ...
Method for the Adaptive Neutralization of Structural Breaches in Cyber-Physical Systems Based on Graph Artificial Neural Networks
This paper presents a model of threats in cyber-physical systems (CPSs) with examples of attacks and potential negative consequences for systems for various purposes. It is concluded that the critical consequences of attacks are associated with ...