• A
  • A
  • A
  • ABC
  • ABC
  • ABC
  • А
  • А
  • А
  • А
  • А
Regular version of the site
Of all publications in the section: 11
Sort:
by name
by year
Article
Лещёв Д. А., Сучков Д. В., Хайкова С. П. и др. Вопросы кибербезопасности. 2019. Т. 32. № 4. С. 61-71.

The purpose of the study: development of methods for analyzing the graph of interacting objects based on the detection of implicit communities in order to solve the problems of searching for the proximity of profiles and the exchange, distribution of information between objects.

Method: importing data from social networks with the subsequent construction of a weighted graph based on the selected attributes and the weight function corresponding to the original task; detection of communities on the constructed weighted graph and comparison of the obtained partitions with the results of classical algorithms.

Results: algorithms to construct graphs and to import attributes were developed and implemented, weight functions created, data structures were constructed, Louvain algorithm for weighted graphs was investigated and implemented with the according to data structures, additional hyper parameters that improve the quality of the standard graph partition by implicit user communities were added. On the example of the social network VKontakte, special algorithms for database crawling are built, the software and hardware complex is applied on real data, and the results of work are compared with the classical algorithms for allocating communities.

Added: Aug 2, 2019
Article
Чеповский А. М., Лаврентьев А. М., Смирнов И. В. и др. Вопросы кибербезопасности. 2019. № 4(32). С. 54-60.
Added: Aug 10, 2019
Article
Астраханцев Р. Г., Лось А. Б., Мухамадиева Р. Ш. Вопросы кибербезопасности. 2019. № 5(33). С. 57-62.

The purpose of the article: to study the direction of development of the structure and operation of blockchain networks, identify interaction algorithms within the network, accelerating the process of forming new blocks without losing security and resistant to scaling the number of users, studying the development trends of cryptocurrencies, predicting their future development, and also as well as a study of the world practice of legal status of cryptocurrency. Method: analysis of literature and open resources on the subject matter, identification of problems of methods for transferring and storing information in blockchain networks, their modeling and creating solutions, identifying relevant networks for speed, studying legislation on the world practice of cryptocurrency status, identifying the main problems of digital currencies from the point view of state institutions. The result: the directions of development of the blockchain technology, the problems of introducing modern cryptocurrencies, and possible ways to solve them are investigated. New algorithms and protocols that accelerate the blockchain and increase its throughput are analyzed. A new variant of the algorithm is proposed, which prevents double waste in several parallel blocks that have an interaction protocol with each other, as well as an algorithm that allows to coordinate the creation of new blocks without voting or partial centralization of the blockchain. The analysis of the current legal status of cryptocurrency has been carried out and suggestions have been made about possible options for development.  

Added: Nov 5, 2019
Article
Мигалин С. С., Скуратов А. К., Лось А. Б. Вопросы кибербезопасности. 2019. № 5(33). С. 34-41.

The purpose of the article is to develop a universal tool for tunneling TCP traffic via DNS Protocol, which provides information exchange between the local network of the enterprise and the global network when TCP connections are banned by the firewall. Method: development of application architecture and the protocol, taking into account the shortcomings of existing solutions and runtime requirements in the framework of penetration testing, programming in Python, Bash and Powershell application modules in accordance with the developed architecture and Protocol. The result: in this paper, a comparative analysis of existing solutions and describes the development of a program that corrects their shortcomings. The developed application has several key features: support for the socks5 Protocol, fully interpreted clients without the need for administrator privileges, stable operation on Windows.

Added: Nov 5, 2019
Article
Градосельская Г. В., Щеглова Т. Е., Карпов И. А. Вопросы кибербезопасности. 2019. Т. 4. № 32. С. 94-104.

Social networks are a unique infrastructure mediating the socio-political activity of youth. Mapping of communications of actors and groups allows us to make social processes evident, and observe them in dynamics allows recording the corresponding trends. Authors of the article offered the unique method of a grain clustering allowing to reflect most fully with the minimum technical expenses the current picture of political activity in social networks. From 2013 for 2018 authors conducted more than 20 researches on the mapping of political activity of different levels – federal and regional. This researches described in detail the results of mapping 2018, but also provide a comparison in dynamics with the previous researches. Three main political clusters on Facebook are considered: pro-Putin, nationalist and oppositional. The volume of total selection is 1535 politically active groups of the federal level.

Added: Oct 23, 2019
Article
Бабаш А. В., Баранова Е. К., Лютина А. и др. Вопросы кибербезопасности. 2020. № 1(35). С. 74-86.

Purpose: to introduce mathematical model of a distorted meaningful text and a measure of its distortion, to define a numerical classification of the distortion of meaningful texts, present applications of the model in cryptography.

Research methods: a more complex Vigenere cipher decryption that uses an almost periodic key (noisy) is performed as decryption of noisy plaintext on a periodical key (by well-known Vigenere decryption methods), but with a different probability distribution of plaintext characters, with further lead of the task to the acceptable noise level in plaintext determining for understanding this text content.

Results: gamming cipher decryption ways with weak keys are presented. A new complexity was obtained and the reliability of the method was improved due to the fact that there k-noisy weak (almost periodic) keys are more than periodic ones. The formula for calculating the probability of occurrence of characters after the k-th noise was obtained. Artificial languages for ease of calculation were introduced and practical examples of text noise (the necessary  calculations were made using a written program in the python programming language) were considered. The quality of the distorted plaintext content was assessed by highlighting of two borders of understanding.

Added: Apr 1, 2020
Article
Соколова Т. В., Чеповский А. М. Вопросы кибербезопасности. 2019. № 4(32). С. 88-93.
Added: Aug 10, 2019
Article
Бабаш А. В., Гузовс Р., Касаткин С. В. и др. Вопросы кибербезопасности. 2019. № 5(33). С. 42-50.
Added: Feb 22, 2020
Article
Аветисян А. И., Белеванцев А. А., Чукляев И. И. Вопросы кибербезопасности. 2014. № 3. С. 20-28.

Results of the analysis of the existing approaches to protection and identification of defects (vulnerabilities and errors) in the source and binary code of software, provided on the different stages of development and maintenance. The most common defects (vulnerabilities and errors) and objects of destructive programming attacks are generalized, functional and ergonomic requirements to the modern analysis software are presented.

Added: Mar 22, 2017
Article
Зыков С. В. Вопросы кибербезопасности. 2015. № 4(12). С. 48-52.

The paper presents major concepts of the new technology for large-scale data integration. The current enterprise data size is large, and it grows exponentially. The data management issue is even more challenging due to the heterogeneous character of the data. The technology developed encompasses a set of new object-based models, methods and software tools for representing and manipulating heterogeneous data.

Added: Feb 12, 2016
Article
Левашов М. В., Овчинников П. В. Вопросы кибербезопасности. 2019. № 5. С. 63-69.
Added: Aug 2, 2019