the 2014 Seventh IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)
This article presents the results of neural network technologies that are used and can be used in the information systems security. It focuses on two paradigms of neural networks: multilayer neural network and the Cerebellar Model Articulation Controller (the CMAC neural network).
Information security risks analysis methods are considered in accordance with GOST R ISO / IEC 27005-10. A comparative analysis of Ra2 software, Vsrisk software and MSAT software are carried out based on the selected criteria.
This volume contains the proceedings of the second edition of the International Conference on Advanced Wireless Information, Data, and Communication Technologies (AWICT 2017). The AWICT 2017 conference represents an excellent opportunity for the students and the researchers, from both industrial and academic domains, having as main objective to present their latest ideas and research results in any one of the AWICT 2017 topics. AWICT 2017 is organized by the Laboratoire des Signaux et Systèmes (L2S UMR CNRS 8506), CentraleSupélec, Université Paris-Saclay, in collaboration with a number of national and international partners. The proceedings of AWICT 2017 are published by the Association for Computing Machinery (ACM) --- International Conference Proceedings Series (ICPS), and all accepted papers are available in the ACM Digital Library with the ISBN: 978-1-4503-5310-6. Through its technical program, the AWICT 2017 conference is established as a forum for the development, analysis, and future guidance on the burgeoning number of Advanced Wireless Information, Data, and Communication Technologies projects and applications.
In this paper, non-orthogonal multiple access (NOMA) with successive interference cancellation (SIC) technique for downlink channel of next generation wireless network and its security issues are discussed. In NOMA, signals for all user equipment (UEs) are superimposed before transmission and then decoded at each UE implementing SIC. SIC relies on decoding and subtracting the signals in sequence until it reaches its desired signal. The decoding order at each UE, however, must match with the user index in the cancellation sequence. In case of mismatch, UEs will not obtain their signals and re-request their messages from the BS which will further increase the processing time that is already high for a regular SIC receiver. Numerical results show the performance of SIC at the UE side. The time spent for decoding the received signal at the UE with and without user mismatch is discussed. The unusual longer decoding times are further discussed as potential external network threat. © 2017 IEEE.
The IEEE Russia North West Section, Saint Petersburg Electrotechnical University “LETI”, and the European Centre for Quality (Moscow) are pleased to present the Proceedings of the 2018 IEEE International Conference "Quality Management, Transport and Information Security, Information Technologies" (IT&QM&IS). The Conference was held in St. Petersburg, Russia on September 24–29, 2018, and it was proudly hosted by Saint Petersburg Electrotechnical University “LETI”. The Organizing Committee believes and trusts that we have been true to the spirit of collegiality that members of IEEE value whilst also maintaining a high standard as we reviewed papers, provided feedback and now present a strong body of published work in this collection of proceedings. The themes for this year's conference were chosen as a means of bringing together academics and industrialists, engineering and management research, manufacturing and teaching, and providing a basis for discussion of issues arising across the engineering and business community in relation to Quality Management, Information Technologies, Transport and Information Security aimed at developing engineers and managers for the future. The goal of these proceedings has been to present high quality work in an accessible medium, for use in a wide community of academics, engineers, managers, and industrialists, the community united by the key words Science, Education, Quality, Innovations in engineering. To achieve this aim, all abstracts were blind reviewed, and full papers submitted for publication in this journal of proceedings were subjected to a rigorous reviewing process.
Legal support of information security is a relatively independent area of information law, formed by a set of legal regimes, principles and norms enshrined in the legislation of the Russian Federation and sources of international law. Within the framework of this area of information law, public relations are regulated with regard to security, primarily information and information infrastructure used by a person, society and the state to meet legitimate interests, exercise rights and perform legal duties.
Abstract – The paper presents methods of executable file signature creation based on frequency distributions of their informative features to be applied for program identification. Identification here should be understood as a process of file recognition by establishing its coincidence with a particular program. A new approach to creation of the archive of program signatures, both in terms of byte-frequency distribution of a program’s binary code, and in terms of frequency distribution of assembler commands in their disassembler codes, is presented. The new method of executable file identification is offered and the results of experiments on their identification using a statistical criterion of φ*-Fisher and analysis of the slope are provided. The proposed method can be used to audit data-storage medium.
The task of determining information security state of objects using the information of signals of electromagnetic emissions of individual elements of devices of cyber-physical systems was investigated. We consider the main side channels of information with which it is possible to monitor the state of the system and analyze the software and hardware environment. Such «independent» methods of monitoring allow analyzing the state of the system based on external behavioral characteristics within the framework of conceptual models of autonomous agents. The statistical characteristics of signals allowing to identify changes in the state of local devices of systems are considered. Was described an experiment aimed at obtaining statistical information on the operation of individual elements of cyber-physical systems. The efficiency of the neural networks approach for solving the described classification problem, in particular, two-layer feed-forward neural networks with sigmoid hidden neurons was investigated. The results of the experiments showed that the proposed approach is superior to the quality of detection of anomalous states by classification based on internal indicators of the functioning of the system. With minimal time of accumulation of statistical information using the proposed approach based on neural networks, it becomes possible to identify the required state of the system with a probability close to 0.85. The proposed approach of the analysis of the statistical data based on neural networks can be used for definition of states of information safety of independent devices of cyber-physical systems.
A wireless network being affected by a broadcast storm attack has been considered to determine the availability of autonomous nodes and its ability to perform functional tasks under information influence. The conditions for the hacker attacks from a potential intruder have been determined. A wireless device availability analysis has been carried out. A model for determining the technical characteristics of the wireless self-organizing network device has been proposed.