Systems and Means of Informatics scientific journal
Volume 23, Issue 1, 2013
COVERT CHANNELS GENERATED BY TAGS.
Abstract: A possibility of creation of covert channels by means of the tags determined by admissible changes of the form of electrical signals is researched. Existence of identified admissible changes of the formof electrical signals is shown. The algorithm of creation of the covert channel with the check group reducing probability of the wrong decoding of hidden transmission is considered. It is shown that the number of the transferred hidden messages is commensurable with number of messages in legal transmission.
Keywords: covert channels; data transfer standards by means of electrical signals; bandwidth of covert channels
NEW PRINCIPLES OF MODELING OF AUTONOMOUS SELF-PROPAGATING MALWARE.
Abstract: The research of malware has revealed that modern computer worms are self-contained self-propagating multiagent system. Principles and generalization of the autonomous self-propagation of such systems are of special interest.
Keywords: worm; malware; model of autonomous distribution; computer network
LINUX-BASED OPERATING SYSTEMS VULNERABILITIES SEARCHING METHODS.
Abstract: A method of Linux-based operating systems vulnerabilities searching, which considers major characteristics of analyzed systems is described.
Keywords: vulnerabilities search; code verification; information security; open- source projects
ATTACKS ON THE CENTRALIZED SYSTEMS OF INTRUSION DETECTION.
Abstract: Creation of the powerful centralized centers of attacks detection, servicing a large number of clients, possesses obvious positive properties. However, such systems generate a new class of the attacks connected with a need to service a flow of incidents, arriving from different clients. Such flow can generate a queue preventing effective detection of attacks. These problems are described by queue models. Some results of attacks simulation by means of queuing systems are presented.
Keywords: information security; queuing systems; intrusion detection
ON A METHOD OF RELIABLE DELIVERY AND DATA SOURCE VERIFICATION WITHIN A CLIENT–SERVER INTERACTION OVER AN OPEN COMMUNICATION CHANNEL.
Abstract: Two models of client - server interaction are considered: a model to describe reliable data delivery over an open channel and a model to describe data source verification. The models are formulated based on a set of rules to resolve the conflicts when several clients are connecting to one server. A computer-appliance is suggested for testing the functionality of the models either allowing several connections to the server from multiple clients or blocking connections from multiple clients.
Keywords: client - server interaction; two-factor authentication; information source verification; reliable data delivery; open channel
ON OPTIMAL AUTHENTICATION CODE.
Abstract: Constructions of optimal authentication code have been studied.
Keywords: cipher; authentication code; message imitation; hash function
ON THE PROBLEM OF SUBSEQUENCES INCLUSION INTO THE DATA PACKAGES HEADERS.
Abstract: The possibility to apply models and techniques of the Software Defined Networks (SDN-technologies) to optimize traffic control in computer networks is discussed. An algebraic formalization for the problem of subwords inclusion into the words over the given alphabet is suggested. There are analyzed problem-oriented conditions and algorithms that implement and optimize checking for limited length subwords (subsequences) inclusion into the lines of big switching tables. Some additional SDN- based abilities to speed up data processing in computer networks are demonstrated.
Keywords: software defined networks; header space analysis; mathematical models of data processing
CHARACTERISTICS OF HARDWARE-BASED FIELD-PROGRAMMABLE GATE ARRAY IMPLEMENTATION OF NETWORK TRAFFIC ANALYZER FOR MALICIOUS CODE DETECTION.
Abstract: The paper is dedicated to improvement of perfomance charachteristics of existing malicious network traffic analyzing algorithms on high-speed network interfaces. The Racewalk algorithm is considered as a base for research. The authors focus on offloading certain processing actions into specific dedicated hardware device. As seen from experimental results, such implementation can work on higher network interface speeds (i. e., 10 Gbit/s).
Keywords: FPGA; Racewalk; traffic filtering; shellcodes; network traffic
NONLINEAR CORRELATIONAL MODELING AND AFTERSALE PRODUCT SERVICE SYSTEMS RELIABILITY ANALYSIS.
Abstract: The article is devoted to the development of nonlinear correlational analytical modeling methods for aftersale product service systems. Special attention is paid to nonlinear correlational methods based on canonical expansions of random functions. Typical problems of reliability analysis (impulse processes modeling, summing processes control for fixed and variable level) are considered.
Keywords: aftersale product service system; analytical modeling; canonical expansion of random function; current; hybrid stochastic system; impulse (shock) process; nonlinear correlational analysis; reliability analysis; stochastic process; summing process
SOME APPROACHES TO DEVELOPING THIN CLIENT TECHNOLOGIES FOR SECURE INFORMATION SYSTEMS.
Abstract: The problems of thin client technologies development for Russian secure information systems based on world experience in virtual desktop infrastructure and hardware zero client are discussed.
Keywords: information system security; thin client technology; virtual desktop infrastructure; PC-over-IP
ABOUT SOME PARTICULARITIES OF SPARE PARTS SETS CALCULATION FOR SECURED INFORMATION SYSTEMS.
Abstract: Main particularities of spare parts, tools, accessories and materials provision for secured information systems are considered. Basic concepts are shown. Analytical dependences allowing to calculate necessary spare parts sets including initial set are presented. Particularities of spare parts set formation considering requirements on information security are formulated. Examples of calculations are shown.
Keywords: automated secured information systems; technical tools set; spare parts, tools, accessories and materials (spare parts); sufficiency indicator of spare parts set; replenishment strategy of spare parts stock; spare parts set supply calculation
SOME TESTS FOR SOFTWARE RELIABILITY.
Abstract: Some rules for the termination of testing software reliability are described. These rules optimize the probability of erroneous decision and the posterior probability of erroneous decision.
Keywords: software reliability; reliability growth model; testing statistical hypotheses; geometric distribution; probability of the error of first kind; probability of the error of second kind; the Neyman - Pearson lemma; posterior error probability
AUTOMATIC GENERATION OF VIZUAL REPRESENTATION OF THE DOCUMENT’S SEMANTIC CONTENT.
Abstract: A method for generation of the formalized semantic content of a document and its visual representation, a semantic map of the document, is described. The formalization of the document content is based on the application of the semantic and conceptual analysis methods ensuring definition of the conceptual content of the text and the assignment to concepts of characteristics consistent with their semantic role and significance in the text. The resulting semantic structure of the text is converted to its visual representation showing the relationships between objects, events, and themes.
Keywords: formalized semantic description of the document; document semantic map; semantic analysis; conceptual analysis; analysis of conceptual content of the document; knowledge extraction from texts
|Phone: +7 (499) 135-62-60E-mail: firstname.lastname@example.org