Reference:
Yusupov B.Z..
Development of the security and fire system training stand for student training
// Software systems and computational methods. – 2023. – № 2.
– P. 40-48.
Read the article
Abstract: The article is devoted to the organization of the educational process using a specialized laboratory stand of security and fire systems. The main purpose of the paper is to form professional competencies of students in the field of security and safety systems. The paper describes in detail the structure and components of the laboratory stand, emphasizing the importance of its key elements - the control panel "Astra-812 Pro" and a variety of detectors. This allows students to practically apply theoretical knowledge, studying the functioning and interaction of various components of the security and fire system. The article also presents schemes of connection of detectors to the expander, allowing students to more deeply understand the technical side of the process. The steps of the bench training are disclosed to support step-by-step, sequential learning. The study emphasizes the effectiveness of the proposed learning system, which involves direct student interaction with hands-on equipment. The findings confirm the significance of using such training stands in modern higher professional education, emphasizing their contribution to the formation of the necessary professional competencies in future specialists in the field of safety and security. Scientific novelty of the work consists in the development and application of a specialized training stand for teaching students to work with security and fire systems. This allows students to get direct experience of interaction with the equipment, deepen their understanding of the technical aspects of the systems operation and improve their practical skills. The work also contributes to research on educational approaches in the field of safety and security by proposing an effective teaching methodology through the use of a laboratory bench. This provides a platform for further research and development in this area that can broaden and deepen the educational opportunities in the field.
Keywords: student training, educational approaches, wiring diagrams, professional competencies, security system, detectors, monitoring device, fire protection system, training stand, practical skills
References:
Alekseenko O. I., Danilenko T. V., & Kiriy E. V. (2018). Problems of training and education of students in modern higher education institution. Modern Pedagogical Education, 3, 3-5.
Fortova L. K., & Yudina A. M. (2022). Problems and prospects of development of digitalization of higher professional education. Bulletin of Vladimir State University named after Alexander Grigorievich and Nikolai Grigorievich Stoletov. Series: Pedagogical and Psychological Sciences, 51(70), 85-89.
Ivanova O. V., & Moroz I. N. (2022). Opportunities and problems of digitalization of higher education. Higher Education Today, 5, 30-35.
Yusupov B. Z., & Martynov A. M. (2023). Development of laboratory stand of security and fire alarm system in the discipline of technical means of protection. Actual problems of science and education in the context of modern challenges: Proceedings of the XIX International Scientific and Practical Conference, 80-91.
Yusupov B. Z. (2021).
Reference:
Nikitin P.V., Osipov A.V., Pleshakova E.S., Korchagin S.A., Gorokhova R.I., Gataullin S.T..
Emotion Recognition by Audio Signals as one of the Ways to Combat Phone Fraud
// Software systems and computational methods. – 2022. – № 3.
– P. 1-13.
Read the article
Abstract: The relevance of the study is dictated by the current state in the field of telephone fraud. According to research conducted by Kaspersky Lab, the share of users who encountered various unwanted spam calls in the spring of 2022 was at the level of 71%. The subject of the research is machine learning and deep learning technologies for determining emotions by the timbre of the voice. The authors consider in detail such aspects as: the creation of a marked-up dataset; the conversion of WAV audio format into a numerical form convenient for fast processing; machine learning methods for solving the problem of multiclass classification; the construction and optimization of neural network architecture to determine emotions in real time. A special contribution to the study of the topic is that the authors implemented a fast method of conversion sound formats into numerical coefficients, which significantly increased the speed of data processing, practically without sacrificing their informativeness. As a result, the models were trained by machine learning algorithms quickly and efficiently. It should be particularly noted that the architecture of a convolutional neural network was modeled, which allowed to obtain the quality of model training up to 98%. The model turned out to be lightweight and was taken as the basis for training the model to determine emotions in real time. The results of the real-time operation of the model were comparable with the results of the trained model. The developed algorithms can be implemented in the work of mobile operators or banks in the fight against telephone fraud.
The article was prepared as part of the state assignment of the Government of the Russian Federation to the Financial University for 2022 on the topic "Models and methods of text recognition in anti-telephone fraud systems" (VTK-GZ-PI-30-2022).
Keywords: emotions, information security, mel-kepstral coefficients, convolutional neural networks, classification, neural network training, machine learning, artificial intelligence, phone fraud, fraud
References:
Meshkova N.V., Kudryavtsev V.T., Enikolopov S.N. On the psychological portrait of victims of telephone fraud // Bulletin of the Moscow University. Series 14. Psychology. 2022. No. 1. pp. 138-157. doi: 10.11621/vsp.2022.01.06.
Klachkova O. A. Psychological features of victim personality // Izvestiya RSPU named after A. I. Herzen. 2008. No.58. URL: https://cyberleninka.ru/article/n/psihologicheskie-osobennosti-viktimnoy-lichnosti (date of address: 02.08.2022).
Moiseeva I.G. Psychological aspects of countering telephone fraud // Kaluga Economic Bulletin. 2022. No. 1. pp. 70-74.
Romanov A.A., Mashlyakevich V.A. About modern methods of fraud committed using mobile communication means // Eurasian Legal Journal. 2021. No. 10 (161). pp. 254-255.
Barasheva E. V., Stepanenko D. A. Historical and legal aspects of cybercrime in the banking sector // Humanities, socio-economic and social sciences. 2022. No. 6 pp. 75-77. – DOI 10.23672/y5463-0677-0213-l.
Ivanova A. A. Mishchenko V. V. Actual problems of
Reference:
Simavoryan S.Z., Simonyan A.R., Popov G.A., Ulitina E.I..
General concept for detecting intrusions of unknown type based on neural networks
// Software systems and computational methods. – 2021. – № 4.
– P. 23-45.
Read the article
Abstract: This article is dedicated to the problem of detecting intrusions of unknown type based on neural networks that bypass the system of information security in automated data processing systems and are not recognized as spiteful. Development of the means, methods and measures for detecting or preventing such hidden attacks is of particular relevance. Methodological research on the development of procedure for detecting intrusions are based on the achievements of systemic analysis, systemic-conceptual approach towards protection of information in automated data processing systems and achievements of the theory of neural systems in the area of ensuring information security. The object of this research is the intrusions of unknown type in automated data processing systems. The subject is the neural networks, namely neural networks of direct action. The main result lies in the development of neural network of direct action in form of the diagram of neural network links for detecting intrusions. For solving this task, the author developed:
1) The system of input indicators of the neural system;
2) Scales for the assessment of values of the formed indicators;
3) General procedure for detecting intrusions based on neural networks, the essence of which consists in implementation of the following sequence of actions: a) formation of the list of all the main parties to the process of detection of intrusion; b) formation of the set of parameters that characterize each of them; c) formation of the set of numerical characteristics for each parameter using the assessment scales of the formed indicators; d) analysis of the parameters of the configuration of neural network
The developed procedure may serve as the basic in further practical developments of the concept of detecting intrusions of unknown types based on neural networks.
Keywords: intelligent systems, intrusion detection system, systemic approach, intrusion, neural network, information protection, information security system, artificial immune systems, neural network diagram, neural network parameters
References:
Simavoryan S.Zh., Simonyan A.R., Ulitina E.I., Popov G.A. O kontseptsii sozdaniya intellektual'nykh sistem zashchity informatsii na osnove neyrosetevykh sistem obnaruzheniya vtorzheniy v ASOD // Programmnye sistemy i vychislitel'nye metody.-2019.-№ 3.-S. 30-36.
Klenin D.V., Maksimova E.A. Model' vtorzheniy v informatsionnuyu sistemu // NBI tekhnologii.-2018.-T. 12.-№ 3.-S. 19-23.
Boychenko O.V, Gavrikov I.V. Sistemy obnaruzheniya vtorzheniy v komplekse informatsionnoy bezopasnosti bankov // Informatsiya i kosmos.-2019.-№ 1.-S. 72-76.
Ezhgurov V.N., Yumasheva E.S., Bach M.A. Problemy vnedreniya sistemy obnaruzheniya vtorzheniya i ustraneniya komp'yuternykh atak // V sbornike: Materialy konferentsiy GNII "Natsrazvitie". Yanvar' 2018.-2018.-S. 19-27.
Popov G.A., Simavoryan S.Zh., Simonyan A.R., Ulitina E.I. Modelirovanie protsessa monitoringa sistem informatsionnoy bezopasnosti na osnove sistem massovogo obsluzhivaniya // Informatika i ee primeneniya.-2020.-T. 14.-№ 1.-S. 71-79.
Simavoryan S.Zh., Simonyan A.R., Popov G.A., Ulitina E.I. Protsedura vyya
Reference:
Simavoryan S.Z., Simonyan A.R., Popov G.A., Ulitina E.I..
Functionality of the system of information security in automated data processing systems in the conditions of external intrusions by analogy with the human immune system
// Software systems and computational methods. – 2021. – № 3.
– P. 11-24.
Read the article
Abstract: This article is dedicated to construction of the system of information security in automated data processing systems that function by analogy with the human immune system. The subject of this research is the development of the procedure for countering external intrusions of viruses, spam, and other destructive software programs in automated data processing systems. The object of this research is the systems of ensuring information security in automated data processing systems and human immune system. Methodological research on elaboration of the procedure for identification of intrusion is conducted via methods of artificial intelligence, systemic analysis, theory of neural and immune systems in the sphere of ensuring information security based on the achievements of systemic analysis and a systemic-conceptual approach towards information security in automated data processing systems. The main result lies in the developed general procedure for the functionality of the system of ensuring information security in countering external intrusions in the form of block-diagram and its description. The procedure is based on the idea of similarity in functionality of the mechanisms and procedures for protection against external intrusions in both, human immune system and automated data processing system, as well as drawing parallel between them. The main peculiarity of the developed procedure lies in its applicability to the accepted classification of the initial external environment of intrusion onto physical, information, field, and infrastructure environments. Such approach guarantees the novelty of the development from the perspective of constant updating of human immune system countering mechanisms to the external intrusions and its application for each environment in applicable to automated data processing systems.
Keywords: neural systems, intelligent systems, intrusions detection system, information protection, information security systems, human immune system, artificial immune systems, cellular immunity, humoral immunity, systems approach
References:
Mongush A.K., Karmanov I.N. Avtomatizatsiya proektirovaniya kompleksnykh sistem zashchity informatsii // Interekspo Geo-Sibir'. 2020. T.6. № 2.S. 31-35.
Popov G.A., Simavoryan S.Zh., Simonyan A.R., Ulitina E.I. Modelirovanie protsessa monitoringa sistem informatsionnoy bezopasnosti na osnove sistem massovogo obsluzhivaniya//Informatika i ee primeneniya. 2020. T. 14. Vyp. 1.S. 71-79.
Belyavskiy D.M., Darbinyan S.S., Zasurskiy I.I., Kazar'yan K.R., Levova I.Yu., Kharitonov V.V. Tsifrovaya identifikatsiya ob'ektov: tekhnologiya i ne tol'ko. // M.: Nauchnoe obozrenie.-2016.-252 s.-ISBN 978-5-9906425-4-6.
Simavoryan S.Zh., Simonyan A.R., Popov G.A., Ulitina E.I.-Analiz vozmozhnostey adaptatsii obshchey skhemy immunnoy sistemy v sistemakh protivodeystviya vtorzheniyam // Voprosy bezopasnosti. 2020. № 4. S.36-46. DOI: 10.25136/2409-7543.2020.4.33736 URL: https://e-notabene.ru/nb/article_33736.html.
Gibadullina E.A., Nuriev N.K. Razrabotka metodiki opredeleniya aktual'nykh ugroz // V sbornike: Sovremennye tekhnologii: problemy innovatsionnogo razviti
Reference:
Simavoryan S.Z., Simonyan A.R., Popov G.A., Ulitina E.I..
The procedure of intrusions detection in information security systems based on the use of neural networks
// Software systems and computational methods. – 2020. – № 3.
– P. 1-9.
Read the article
Abstract: The subject of the research is the problem of identifying and countering intrusions (attacks) in information security systems (ISS) based on the system-conceptual approach, developed within the framework of the RFBR funded project No. 19-01-00383. The object of the research is neural networks and information security systems (ISS) of automated data processing systems (ADPS). The authors proceed from the basic conceptual requirements for intrusion detection systems - adaptability, learnability and manageability. The developed intrusion detection procedure considers both internal and external threats. It consists of two subsystems: a subsystem for detecting possible intrusions, which includes subsystems for predicting, controlling and managing access, analyzing and detecting the recurrence of intrusions, as well as a subsystem for countering intrusions, which includes subsystems for blocking / destroying protected resources, assessing losses associated with intrusions, and eliminating the consequences of the invasion. Methodological studies on the development of intrusion detection procedures are carried out using artificial intelligence methods, system analysis, and the theory of neural systems in the field of information security. Research in this work is carried out on the basis of the achievements of the system-conceptual approach to information security in ADPS.The main result obtained in this work is a block diagram (algorithm) of an adaptive intrusion detection procedure, which contains protection means and mechanisms, built by analogy with neural systems used in security systems.The developed general structure of the intrusion detection and counteraction system allows systematically interconnecting the subsystems for detecting possible intrusions and counteracting intrusions at the conceptual level.
Keywords: automated data processing, information protection strategies, intrusion detection systems, information security support, information protection, intelligent systems, neural networks, adaptable systems, attack detection system, software information protection
References:
https://fstec.ru/tekhnicheskaya-zashchita-informatsii/dokumenty-po-sertifikatsii/120-normativnye-dokumenty/406-metodicheskie-dokumenty-utverzhdeny-fstek-rossii-3-fevralya-2012-g-Rezhim dostupa 15.04.2020.
https://fstec.ru/tekhnicheskaya-zashchita-info Rezhim dostupa 15.04.2020.rmatsii/dokumenty-po-sertifikatsii/120-normativnye-dokumenty/407-metodicheskie-dokumenty-utverzhdeny-fstek-rossii-6-marta-2012-g-Rezhim dostupa 15.04.2020.
G. A. Popov, S. Zh. Simavoryan, A. R. Simonyan, E. I. Ulitina Modelirovanie protsessa monitoringa sistem informatsionnoy bezopasnosti na osnove sistem massovogo obsluzhivaniya // Informatika i ee primeneniya, 2020. T. 14. Vyp. 1. S. 71-79.
Kovalev D.O. Vyyavlenie narusheniy informatsionnoy bezopasnosti po dannym monitoringa informatsionno-telekommunikatsionnykh setey. / Avtoreferat dissert. na soisk. kand. tekhn. nauk. Moskva. 2011. https://www.dissercat.com/content/vyyavlenie-narushenii-informatsionnoi-bezopasnosti-po-dannym-monitoringa-informatsionno-tele/read-Rezhim dostupa 15.04.2020.
Ch
Reference:
Simavoryan S.Z., Simonyan A.R., Ulitina E.I., Popov G.A..
On the concept of creating intelligent information security systems based on neural network intrusion detection systems in automated data processing systems
// Software systems and computational methods. – 2019. – № 3.
– P. 30-36.
Read the article
Abstract: The subject of the research is the concept of creating intelligent information protection systems based on neural network intrusion detection systems in automated data processing systems, developed as part of the funded project of the RFBR No. 19-01-00383. The object of the study is the intelligent information protection systems in automated data processing systems, built on the basis of neural intrusion detection systems, and later on the mechanisms of artificial immune systems. The authors consider adaptability, learning ability and controllability as the main conceptual requirements for the intrusion detection systems. Particular attention is focused on the construction of a flexible intelligent information protection system containing intrusion detection systems in both the nodes of the structural components of automated data processing systems, and in data transmission networks between structural components. Methodological studies of the chosen research direction are carried out using the methods of artificial intelligence, system analysis, the theory of intelligent information systems in the field of artificial intelligence. The work uses the achievements of a system-conceptual approach to information protection in automated data processing systems. The main result of the study is the conclusion that successful protection of information in automated data processing systems can only be carried out in a network in the form of interconnected local intrusion detection systems using neural network technologies combined into a single head center based on a system-conceptual approach. To combat unauthorized intrusions, it is necessary to adopt a unified systematic approach based on uniform legal, organizational and technical measures to protect information. The application of a system-conceptual approach to the creation of intrusion detection systems based on neural network technologies will contribute to the development of new tools, methods and activities for the intelligent management of information security in automated data processing systems.
Keywords: attack detection system, adaptable systems, automated data processing, information security strategies, intrusion detection systems, neural systems, protection of information, intelligent systems, software information protection, hardware information protection
References:
Baboshin V.A., Vasil'ev V.A., Golubev V.E. Obzor zarubezhnykh i otechestvennykh sistem obnaruzheniya komp'yuternykh atak // Informatsiya i kosmos. 2015. № 2. S. 36-41
Sushchestvuyushchie na rynke sistemy obnaruzheniya vtorzheniy // http://prog.bobrodobro.ru/106354. – Rezhim dostupa 10.04.2019.
Razrabotchiki i proizvoditeli antivirusnykh programm // http://www.antivirus-navigator.com/designers_av.htm-Rezhim dostupa 10.05.2019.
Simavoryan S.Zh., Simonyan A.R., Ivanovna U.E., Simonyan R.A. Sistemnyy podkhod k proektirovaniyu intellektual'nykh sistem zashchity informatsii // Izvestiya Sochinskogo gosudarstvennogo universiteta. 2013. № 4-2 (28). S. 128-132.
Simavoryan S.Zh., Simonyan A.R., Ulitina E.I., Simonyan R.A. About one approach to a question of classification of intellectual systems of information security // Modeling of Artificial Intelligence. 2014. № 1 (1). S. 29-44.
Simavoryan S.Zh., Simonyan A.R., Ulitina E.I., Simonyan R.A. Projecting intelligent systems to protect information in automated data processing systems (function
Reference:
Kornienko A.A., Polyanichko M.A..
A method for insiders detection in the organization
// Software systems and computational methods. – 2019. – № 1.
– P. 30-41.
Read the article
Abstract: Detecting insider threats is a task that analysts and information security administrators address in the commercial sector and in government organizations. Up to 75% of incidents involving insider actions are still detected manually. Detection of insider threats in an organization can be carried out using a set of organizational and technical measures. To identify them, the authors propose the use of behavioral and technical indicators. The aim of the article is to increase the effectiveness of countering random and malicious insider information security threats by developing a method for detecting insider activity in an organization. To achieve this goal authors used set-theoretic modeling, a hierarchy analysis method, a fuzzy logic apparatus and a fuzzy inference system. As a result of the study authors developed a method that allows detecting insider activity in an organization based on evaluating an employee's predisposition to insider activity and identifying an insider as a result of recording an information security incident. The developed method can be used to create an automated system for identifying insiders in an organization.
Keywords: threats, counteraction, insider detection, insider, information security, internal threats, security, organization, automated systems, modeling
References:
Khovanov N.V. Matematicheskie osnovy teorii shkal izmereniya kachestva. — L.: LGU, 1982.
Saati T. Prinyatie resheniy. Metod analiza ierarkhiy / T. Saati. – M.: Radio i svyaz', 1993. – 278 s.
Anikin I.V. Information Security Risks Assessment Method Based on AHP and Fuzzy Sets // 2nd Intl’ Conference on Advances in Engineering Sciences and Applied Mathematics (ICAESAM’2014) May 4-5, 2014.
Dong M. Approaches to group decision making with incomplete information based on power geometric operators and triangular fuzzy AHP / M. Dong, S. Li, H. Zhang // Expert Systems and Applicatinons.-2015.-Vol. 42, Issue 21.-pp. 7846-7857.
Fu S., Zhou H. The information security risk assessment based on AHP and fuzzy comprehensive evaluation, 2011 IEEE 3rd International Conference on Communication Software and Networks, Xi’an, 2011, pp. 124-128.
Insider Threat Report: 2018-CA Technologies // CA Technologies URL: https://www.ca.com/content/dam/ca/us/files/ebook/insider-threat-report.pdf (data obrashcheniya: 18.07.2018).
Keeney
Reference:
Drobotun E.B..
Method for estimating the cost of the life cycle of systems for protecting against computer attacks
// Software systems and computational methods. – 2018. – № 2.
– P. 17-27.
Read the article
Abstract: The article deals with the economic aspects of building protection systems against computer attacks for information-computing and automated systems for various purposes. An objective assessment of the cost of the life cycle of systems to protect against computer attacks is one of the most important factors that determines the strategy for choosing a rational option for building defense systems. The subject of the study are the economic aspects of choosing options for building defense systems against computer attacks, as well as minimizing the financial costs of their creation and operation. The object - the system to protect against computer attacks. The methodology of this study is based on the use of an integrated approach to assessing the life cycle cost of protection systems as the costs included in the calculation year, including the share of the cost of the protection system, the costs of its implementation, operation during the use of the protection system, and the costs of its disposal at the end service life. Scientific novelty of the work is to create a real practical methodology that allows to evaluate all the components of one-time and current costs that are included in the cost of the life cycle of systems to protect against computer attacks. The offered technique allows to carry out an estimation of cost of a life cycle of several alternative variants of construction of system of protection against computer attacks and to make a choice of admissible on cost variants of construction of system of protection.
Keywords: operating costs, total cost of ownership, cost estimation, current expenses, non-recurrent costs, life cycle cost, information security, protection system, computer attacks, information-computing systems
References:
Ermakova A. V. Stoimost' zhiznennogo tsikla i raskhody na ekspluatatsiyu // Sbornik dokladov III Vserossiyskoy prakticheskoy konferentsii-seminara «Korporativnye zakupki 2015: Praktika primeneniya Federal'nogo zakona № 223-FZ». Institut gosudarstvennykh i reglamentirovannykh zakupok, konkurentnoy politiki i antikorruptsionnykh tekhnologiy (Institut goszakupok). – 2015. – S. 30-39.
Petrenko S. A. Otsenka zatrat na kiberbezopasnost' // Trudy ISA RAN. – 2006. – t. 27. – S. 234-265.
Petlina E. M., Khatagova S. V. Ob otsenke stoimosti meropriyatiy po zashchite informatsii // Nauchnyy al'manakh. – 2016. – №8-1(22). – S. 242-245.
Drobotun, E. B. Sintez sistem zashchity avtomatizirovannykh sistem upravleniya ot razrushayushchikh programmnykh vozdeystviy // Programmnye produkty i sistemy. – 2016. – №3 (115). – S. 51 – 59.
Karpychev V. Yu. Ekonomicheskiy analiz normativno-tekhnicheskogo obespecheniya informatsionnoy bezopasnosti / V. Yu. Karpychev // Ekonomicheskiy analiz: teoriya i praktika. – 2011. – №35 (242). – S. 2 – 18.
Prikaz Federal'nogo agen
Reference:
Lyapustin A..
Security of the Multi-Agent Platform
// Software systems and computational methods. – 2017. – № 3.
– P. 16-24.
Read the article
Abstract: The research is devoted to the topical issue of ensuring security of heterogeneous information platforms applying the multi-agent threat detection systems. The object of the research is the multi-agent platform. The author pays special attention to such aspects of the topic as security of multi-agent platforms, managing threat detection agents, interaction between different threat detection agents, and vulnerability of multi-agent platforms. The author also analyses tendencies for developing new distributed security structures. In his research Lyapustin offers a mutl-agent structure that can be used by security service as well as a general scenario for deploying security policy in threat detection multi-agent systems. In terms of theory, the results of the research demonstrate the need to extend the scope of the multi-agent approach and integrate it with the intelligent analysis of information systems development and operation. The result of the research is the concept of a secure multi-agent platform that can be used in the treat detection multi-agent system.
Keywords: threat detection agent, heterogeneous information platforms, multi-agent platform, intelligent protection system, threat detection, information security, analysis systems, detection algorithms, agent platform, multi-agent system
References:
Lyapustin A.E. Razrabotka i issledovanie modeley i metodik kompleksnoy zashchity geterogennykh informatsionnykh platform // Natsional'naya bezopasnost' / nota bene. — 2015.-№ 4.-S.508-514.
Karygiannis T., Jansen W. Mobile Agent Security.-NIST Special Publication – 800-19, October 1999.
Nguyen G., et al. Agent platform evaluation and comparison.-Pellucid 5FP IST-2001-34519.-2002.
Poslad S., et al. Specifying standard security mechanisms in multi-agent systems / In: Trust, Reputation, and Security: Theories and Practice, 2003.-P. 227-237.
Mana A., et al. Towards secure agent computing for ubiquitous computing and ambient intelligence // LNCS Ubiquitous Intelligence and Computing.-2007.-Vol. 4611.-P. 1201-1212.
Garrigues C., et al. Promoting the development of secure mobile agent applications // The Journal of Systems and Software.-2009. – P. 1-38.
AOS, Jack intelligent agents: Jack manual, release 4.1.-Technical report, Agent Oriented Software Pvt. Ltd, 2005.
d'Inverno M., et al. The dMARS Architech