«Systems and Means of Informatics»
Volume 23, Issue 1, 2013
Content | About Authors
Abstract and Keywords.
COVERT CHANNELS GENERATED BY TAGS.
- N. A. Grusho IPI RAN, firstname.lastname@example.org
Abstract: A possibility of creation of covert channels by means of the tags determined
by admissible changes of the form of electrical signals is researched. Existence of
identified admissible changes of the formof electrical signals is shown. The algorithm
of creation of the covert channel with the check group reducing probability of the
wrong decoding of hidden transmission is considered. It is shown that the number of
the transferred hidden messages is commensurable with number of messages in legal
Keywords: covert channels; data transfer standards by means of electrical signals;
bandwidth of covert channels
NEW PRINCIPLES OF MODELING OF AUTONOMOUS SELF-PROPAGATING MALWARE.
- M. V. Levykin IPI RAN, email@example.com
Abstract: The research of malware has revealed that modern computer worms are self-contained
self-propagating multiagent system. Principles and generalization of the autonomous
self-propagation of such systems are of special interest.
Keywords: worm; malware; model of autonomous distribution; computer network
LINUX-BASED OPERATING SYSTEMS VULNERABILITIES
- A. I. Mishchenko IPI RAN, firstname.lastname@example.org
Abstract: A method of Linux-based operating systems vulnerabilities searching, which considers major characteristics of analyzed systems is described.
Keywords: vulnerabilities search; code verification; information security; open-
ATTACKS ON THE CENTRALIZED SYSTEMS OF INTRUSION DETECTION.
- A. A. Timonina Faculty of Computational Mathematics and Cybernetics, M.V. Lomonosov
Moscow State University, email@example.com
- E. E. Timonina IPI RAN, firstname.lastname@example.org
Abstract: Creation of the powerful centralized centers of attacks detection, servicing a large
number of clients, possesses obvious positive properties. However, such systems
generate a new class of the attacks connected with a need to service a flow of
incidents, arriving from different clients. Such flow can generate a queue preventing
effective detection of attacks. These problems are described by queue models. Some
results of attacks simulation by means of queuing systems are presented.
Keywords: information security; queuing systems; intrusion detection
ON A METHOD OF RELIABLE DELIVERY AND DATA SOURCE
VERIFICATION WITHIN A CLIENT–SERVER INTERACTION
OVER AN OPEN COMMUNICATION CHANNEL.
- E. V. Piskovskiy Moscow Institute of Physics and Technology (State University),
Abstract: Two models of client - server interaction are considered: a model to describe reliable
data delivery over an open channel and a model to describe data source verification.
The models are formulated based on a set of rules to resolve the conflicts when
several clients are connecting to one server. A computer-appliance is suggested for
testing the functionality of the models either allowing several connections to the
server from multiple clients or blocking connections from multiple clients.
Keywords: client - server interaction; two-factor authentication; information source
verification; reliable data delivery; open channel
ON OPTIMAL AUTHENTICATION CODE.
- S.M. Ratseev Faculty of Mathematics and Information Technologies, Ulyanovsk State University,
Abstract: Constructions of optimal authentication code have been studied.
Keywords: cipher; authentication code; message imitation; hash function
ON THE PROBLEM OF SUBSEQUENCES INCLUSION
INTO THE DATA PACKAGES HEADERS.
- M. I. Zabezhailo Applied Research Center for Computer Networks, Moscow, Skolkovo,
Abstract: The possibility to apply models and techniques of the Software Defined Networks
(SDN-technologies) to optimize traffic control in computer networks is discussed.
An algebraic formalization for the problem of subwords inclusion into the words over
the given alphabet is suggested. There are analyzed problem-oriented conditions
and algorithms that implement and optimize checking for limited length subwords
(subsequences) inclusion into the lines of big switching tables. Some additional SDN-
based abilities to speed up data processing in computer networks are demonstrated.
Keywords: software defined networks; header space analysis; mathematical models
of data processing
CHARACTERISTICS OF HARDWARE-BASED FIELD-PROGRAMMABLE
GATE ARRAY IMPLEMENTATION OF NETWORK TRAFFIC ANALYZER
FOR MALICIOUS CODE DETECTION.
- M. Samoylov Faculty of Computational Mathematics and Cybernetics, M.V. Lomonosov
Moscow State University, email@example.com
- D. Gamayunov Faculty of Computational Mathematics and Cybernetics, M.V. Lomonosov
Moscow State University, firstname.lastname@example.org
- S. Bezzubtsev Lebedev Institute of Precision Mechanics and Computer Engineering, Russian
Academy of Sciences, email@example.com
- M. Bulgakov Faculty of Computational Mathematics and Cybernetics, M.V. Lomonosov
Moscow State University, firstname.lastname@example.org
Abstract: The paper is dedicated to improvement of perfomance charachteristics of existing
malicious network traffic analyzing algorithms on high-speed network interfaces.
The Racewalk algorithm is considered as a base for research. The authors focus on
offloading certain processing actions into specific dedicated hardware device. As
seen from experimental results, such implementation can work on higher network
interface speeds (i. e., 10 Gbit/s).
Keywords: FPGA; Racewalk; traffic filtering; shellcodes; network traffic
NONLINEAR CORRELATIONAL MODELING AND AFTERSALE
PRODUCT SERVICE SYSTEMS RELIABILITY ANALYSIS.
- I. N. Sinitsyn IPI RAN, email@example.com
- A. S. Shalamov IPI RAN, firstname.lastname@example.org
- A. A. Kuleshov IPI RAN, email@example.com
Abstract: The article is devoted to the development of nonlinear correlational analytical
modeling methods for aftersale product service systems. Special attention is paid to
nonlinear correlational methods based on canonical expansions of random functions.
Typical problems of reliability analysis (impulse processes modeling, summing
processes control for fixed and variable level) are considered.
Keywords: aftersale product service system; analytical modeling; canonical expansion of random function; current; hybrid stochastic system; impulse (shock) process;
nonlinear correlational analysis; reliability analysis; stochastic process; summing
SOME APPROACHES TO DEVELOPING THIN CLIENT TECHNOLOGIES
FOR SECURE INFORMATION SYSTEMS.
- E. Korepanov IPI RAN, firstname.lastname@example.org
Abstract: The problems of thin client technologies development for Russian secure information
systems based on world experience in virtual desktop infrastructure and hardware
zero client are discussed.
Keywords: information system security; thin client technology; virtual desktop
ABOUT SOME PARTICULARITIES OF SPARE PARTS SETS
CALCULATION FOR SECURED INFORMATION SYSTEMS.
- A. A. Zatsarinny IPI RAN, email@example.com
- A. I. Garanin IPI RAN, firstname.lastname@example.org
- S. V. Kozlov IPI RAN, sv email@example.com
- V. A. Kondrashev IPI RAN, firstname.lastname@example.org
Abstract: Main particularities of spare parts, tools, accessories and materials provision for
secured information systems are considered. Basic concepts are shown.
Analytical dependences allowing to calculate necessary spare parts sets including initial set are
presented. Particularities of spare parts set formation considering requirements on
information security are formulated. Examples of calculations are shown.
Keywords: automated secured information systems; technical tools set; spare parts,
tools, accessories and materials (spare parts); sufficiency indicator of spare parts set;
replenishment strategy of spare parts stock; spare parts set supply calculation
SOME TESTS FOR SOFTWARE RELIABILITY.
- V. Yu. Korolev Faculty of Computational Mathematics and Cybernetics, M.V. Lomonosov
Moscow State University; IPI RAN, email@example.com
Abstract: Some rules for the termination of testing software reliability are described. These
rules optimize the probability of erroneous decision and the posterior probability of
Keywords: software reliability; reliability growth model; testing statistical hypotheses; geometric distribution; probability of the error of first kind; probability
of the error of second kind; the Neyman - Pearson lemma; posterior error probability
AUTOMATIC GENERATION OF VIZUAL REPRESENTATION
OF THE DOCUMENT’S SEMANTIC CONTENT.
- V.N. Zakharov IPI RAN, firstname.lastname@example.org
- A. A. Khoroshilov Center of Information Technologies and Systems for Executive Power Authorities,
Abstract: A method for generation of the formalized semantic content of a document and
its visual representation, a semantic map of the document, is described. The
formalization of the document content is based on the application of the semantic
and conceptual analysis methods ensuring definition of the conceptual content of the
text and the assignment to concepts of characteristics consistent with their semantic
role and significance in the text. The resulting semantic structure of the text is
converted to its visual representation showing the relationships between objects,
events, and themes.
Keywords: formalized semantic description of the document; document semantic
map; semantic analysis; conceptual analysis; analysis of conceptual content of the
document; knowledge extraction from texts