• A
  • A
  • A
  • ABC
  • ABC
  • ABC
  • А
  • А
  • А
  • А
  • А
Regular version of the site
Of all publications in the section: 13
Sort:
by name
by year
Article
Лещёв Д. А., Сучков Д. В., Хайкова С. П. и др. Вопросы кибербезопасности. 2019. Т. 32. № 4. С. 61-71.

The purpose of the study: development of methods for analyzing the graph of interacting objects based on the detection of implicit communities in order to solve the problems of searching for the proximity of profiles and the exchange, distribution of information between objects.

Method: importing data from social networks with the subsequent construction of a weighted graph based on the selected attributes and the weight function corresponding to the original task; detection of communities on the constructed weighted graph and comparison of the obtained partitions with the results of classical algorithms.

Results: algorithms to construct graphs and to import attributes were developed and implemented, weight functions created, data structures were constructed, Louvain algorithm for weighted graphs was investigated and implemented with the according to data structures, additional hyper parameters that improve the quality of the standard graph partition by implicit user communities were added. On the example of the social network VKontakte, special algorithms for database crawling are built, the software and hardware complex is applied on real data, and the results of work are compared with the classical algorithms for allocating communities.

Added: Aug 2, 2019
Article
Чеповский А. М., Лаврентьев А. М., Смирнов И. В. и др. Вопросы кибербезопасности. 2019. № 4(32). С. 54-60.
Added: Aug 10, 2019
Article
Астраханцев Р. Г., Лось А. Б., Мухамадиева Р. Ш. Вопросы кибербезопасности. 2019. № 5(33). С. 57-62.

The purpose of the article: to study the direction of development of the structure and operation of blockchain networks, identify interaction algorithms within the network, accelerating the process of forming new blocks without losing security and resistant to scaling the number of users, studying the development trends of cryptocurrencies, predicting their future development, and also as well as a study of the world practice of legal status of cryptocurrency. Method: analysis of literature and open resources on the subject matter, identification of problems of methods for transferring and storing information in blockchain networks, their modeling and creating solutions, identifying relevant networks for speed, studying legislation on the world practice of cryptocurrency status, identifying the main problems of digital currencies from the point view of state institutions. The result: the directions of development of the blockchain technology, the problems of introducing modern cryptocurrencies, and possible ways to solve them are investigated. New algorithms and protocols that accelerate the blockchain and increase its throughput are analyzed. A new variant of the algorithm is proposed, which prevents double waste in several parallel blocks that have an interaction protocol with each other, as well as an algorithm that allows to coordinate the creation of new blocks without voting or partial centralization of the blockchain. The analysis of the current legal status of cryptocurrency has been carried out and suggestions have been made about possible options for development.  

Added: Nov 5, 2019
Article
Чеповский А. А., Воронин А. Н., Ковалева Ю. В. Вопросы кибербезопасности. 2020. Т. 37. № 3. С. 40-57.

The purpose of the study: analysis of the graph of interacting objects of social networks based on the selection of implicit communities, assessment of the subjectivity of the selected communities and comparison of the network characteristics of communities and various indicators of their subjectivity.

Method: communities detection on the constructed weighted graph of a social network, psycholinguistic analysis of community content using a list of discourse markers of subjectivity, statistical methods for identifying the relationship between network characteristics and the frequency of discourse markers.

Results: algorithms to construct a graph and to import user attributes were developed, an algorithm for dividing a weighted graph into implicit user communities was implemented, the subjectivity of the content of the selected network communities in the social network Twitter has was assessed, the relationship and directional shift in the connectivity of the graph and various indicators of the subjectivity of the network community were identified.

Added: Aug 26, 2020
Article
Мигалин С. С., Скуратов А. К., Лось А. Б. Вопросы кибербезопасности. 2019. № 5(33). С. 34-41.

The purpose of the article is to develop a universal tool for tunneling TCP traffic via DNS Protocol, which provides information exchange between the local network of the enterprise and the global network when TCP connections are banned by the firewall. Method: development of application architecture and the protocol, taking into account the shortcomings of existing solutions and runtime requirements in the framework of penetration testing, programming in Python, Bash and Powershell application modules in accordance with the developed architecture and Protocol. The result: in this paper, a comparative analysis of existing solutions and describes the development of a program that corrects their shortcomings. The developed application has several key features: support for the socks5 Protocol, fully interpreted clients without the need for administrator privileges, stable operation on Windows.

Added: Nov 5, 2019
Article
Градосельская Г. В., Щеглова Т. Е., Карпов И. А. Вопросы кибербезопасности. 2019. Т. 4. № 32. С. 94-104.

Social networks are a unique infrastructure mediating the socio-political activity of youth. Mapping of communications of actors and groups allows us to make social processes evident, and observe them in dynamics allows recording the corresponding trends. Authors of the article offered the unique method of a grain clustering allowing to reflect most fully with the minimum technical expenses the current picture of political activity in social networks. From 2013 for 2018 authors conducted more than 20 researches on the mapping of political activity of different levels – federal and regional. This researches described in detail the results of mapping 2018, but also provide a comparison in dynamics with the previous researches. Three main political clusters on Facebook are considered: pro-Putin, nationalist and oppositional. The volume of total selection is 1535 politically active groups of the federal level.

Added: Oct 23, 2019
Article
Бабаш А. В., Баранова Е. К., Лютина А. и др. Вопросы кибербезопасности. 2020. № 1(35). С. 74-86.

Purpose: to introduce mathematical model of a distorted meaningful text and a measure of its distortion, to define a numerical classification of the distortion of meaningful texts, present applications of the model in cryptography.

Research methods: a more complex Vigenere cipher decryption that uses an almost periodic key (noisy) is performed as decryption of noisy plaintext on a periodical key (by well-known Vigenere decryption methods), but with a different probability distribution of plaintext characters, with further lead of the task to the acceptable noise level in plaintext determining for understanding this text content.

Results: gamming cipher decryption ways with weak keys are presented. A new complexity was obtained and the reliability of the method was improved due to the fact that there k-noisy weak (almost periodic) keys are more than periodic ones. The formula for calculating the probability of occurrence of characters after the k-th noise was obtained. Artificial languages for ease of calculation were introduced and practical examples of text noise (the necessary  calculations were made using a written program in the python programming language) were considered. The quality of the distorted plaintext content was assessed by highlighting of two borders of understanding.

Added: Apr 1, 2020
Article
Соколова Т. В., Чеповский А. М. Вопросы кибербезопасности. 2019. № 4(32). С. 88-93.
Added: Aug 10, 2019
Article
Бабаш А. В., Гузовс Р., Касаткин С. В. и др. Вопросы кибербезопасности. 2019. № 5(33). С. 42-50.
Added: Feb 22, 2020
Article
Лаврентьев А. М., Рябова Д. М., Тихомирова Е. А. и др. Вопросы кибербезопасности. 2020. Т. 3. № 37. С. 58-65.

The purpose of the study: development of a technique for comparing special text corpora for subsequent use in the identification of extremist texts Method: frequency methods and a specificity indicator for text analysis of the corpus platform TXM were used. Results: a methodology for comparative analysis of special text corpora has been developed, which makes it possible to identify implicit links between corpora of heterogeneous texts; the relationships between the vocabulary of illegal and literary texts were revealed; the possibility of using the specificity index to compile a “profile” of a text subcorpus was shown; comparative analysis of the corpus of extremist texts and the corpus of Russian stories of the first third of the twentieth century was made; the relationships between the vocabulary of illegal and literary texts were revealed; the possibilities of using corpus linguistics to study the properties of extremist texts in order to detect illegal Internet resources and messages were shown; the possibilities of using both morphological characteristics of words and pseudo-bases of word occurrences in the analysis of specificity on corpus data have been examined; research results showed that the frequency analysis tools provided by the TXM platform are effective for applications when it is necessary to identify implicit lexical matches between different text corpora.

Added: Oct 31, 2020
Article
Аветисян А. И., Белеванцев А. А., Чукляев И. И. Вопросы кибербезопасности. 2014. № 3. С. 20-28.

Results of the analysis of the existing approaches to protection and identification of defects (vulnerabilities and errors) in the source and binary code of software, provided on the different stages of development and maintenance. The most common defects (vulnerabilities and errors) and objects of destructive programming attacks are generalized, functional and ergonomic requirements to the modern analysis software are presented.

Added: Mar 22, 2017
Article
Зыков С. В. Вопросы кибербезопасности. 2015. № 4(12). С. 48-52.

The paper presents major concepts of the new technology for large-scale data integration. The current enterprise data size is large, and it grows exponentially. The data management issue is even more challenging due to the heterogeneous character of the data. The technology developed encompasses a set of new object-based models, methods and software tools for representing and manipulating heterogeneous data.

Added: Feb 12, 2016
Article
Левашов М. В., Овчинников П. В. Вопросы кибербезопасности. 2019. № 5. С. 63-69.
Added: Aug 2, 2019