Translate this page:
Please select your language to translate the article


You can just close the window to don't translate
Library
Your profile

Back to contents

National Security
Reference:

Los A.B., Kabanov A.S., Vodolazhenko A.A. The problems with establishing an effective system of detecting and countering cyber-attacks in the Russian Federation

Abstract: This article reviews the problems of creating a government system of detecting, warning, and liquidating the effects of cyber-attacks on the informational resources of the nation. It presents an analysis of a global legal practice with regards to defense against cyber threats, and the analysis of the solutions to this issue within Russia. The article lists the main stages of execution of attacks on the information systems, and the structure of the system that detects and neutralizes them. It validates the need to establish an effective system of countermeasures to cyber-attacks; underlines the difficulties in the process of its creation; gives an analysis of the current state and possibilities of further developments within Russia’s electronics industry. Based on this research, the article offers and substantiates solutions to this problem, and formulates the key conclusions and recommendations on how to solve it. To address the issues presented, the article offers a method of theoretical analysis of the initial data in various areas of the problem at hand, method of summarizing the gained results, and devising the necessary ways of solving it. The relevance of the problem in question has to do with the constantly escalating antagonism between world’s nations in the cyberspace, and the open entanglement of number of countries into cyber warfare. This article is written in response to the order of Russia’s president to create an effective system of defending the country against threats in the area of information. The scientific novelty of this work consists in the theoretical analysis of all sides of this problem, including analysis of the global cyber law, the state of Russia’s electronic components base, and development in the area of software solutions. Based on the results of this analysis, the authors offer the ways to create the government system of security against cyber threats.


Keywords:

Cyber warfare, cyberweapon, cyber-attacks, detecting cyber-attacks, convention, paradigm, vulnerability of information systems, threats to information systems, electronics industry, standard of cyber security.


This article can be downloaded freely in PDF format for reading. Download article


References
1. Gorokhov V.G., Syuntyurenko O.V.. Tekhnologicheskie riski: informatsionnye aspekty bezopasnosti obshchestva. // Programmnye sistemy i vychislitel'nye metody.-2013.-¹ 4.-C. 344-353. DOI: 10.7256/2305-6061.2013.4.9708
2. Shelemet'eva Ya.V.. Issledovanie tekhnologii udalennogo pryamogo dostupa k pamyati v arkhitekturakh vysokoproizvoditel'nykh sistem . // Programmnye sistemy i vychislitel'nye metody.-2013.-¹ 3.-C. 250-256. DOI: 10.7256/2305-6061.2013.3.1077
3. Pozitsiya RAEK po zakonoproektam FSB Rossii o bezopasnosti kriticheskoy informatsionnoy infrastruktury, Elektronnyy resurs: http://raec.ru/times/.
4. ISO/IEC 27001:2005, Information technology – Security techniques – Information security management systems – Requirements.
5. GOST R ISO/MEK 13335-2006. Informatsionnaya tekhnologiya. Metody i sredstva obespecheniya bezopasnosti. M., 2007.
6. Savinov A.N., Merkushev O.Yu.. Zashchita biometricheskikh podsistem upravleniya dostupom. // Programmnye sistemy i vychislitel'nye metody.-2013.-¹ 4.-C. 335-343. DOI: 10.7256/2305-6061.2013.4.11092
7. Lukatskiy A. Novyy zakonoproekt o bezopasnosti kriticheski vazhnykh ob'ektov, Elektronnyy resurs: http://regulation.gov.ru/project/ 5890.html?point= view_ project&stage= 2&stage_id=2938.
8. Brykin A. Nachalas' realizatsiya dolgosrochnoy gosprogrammy «Razvitie elektronnoy i radioelektronnoy promyshlennosti Rossii na 2013-2025 gody», Elektron-nyy resurs: http: //www.rg.ru/2013/03/05/elektron.html.
9. Tsentr reagirovaniya na komp'yuternye intsidenty Rossiyskoy Federatsii RU-CERT, Elektronnyy resurs: http://www.cert.ru.
10. FSB sozdast edinuyu sistemu zashchity ot komp'yuternykh atak, Elektronnyy resurs: http://www.rg.ru/2013/01/18/komp-ataki-site-dok.html.
11. Koordinatsionnyy Tsentr Nemedlennogo Reagirovaniya SShA CERT, Elektronnyy resurs: http://www.cert.org .
12. Elektronnaya promyshlennost', Elektronnyy resurs: http://biznestoday.ru/pr/102-elektronnaya promyshlennost.html.
13. Medvedev V. Rossiya vozderzhalas' ot podarka khakeram, Elektronnyy resurs: http://polit. ru/ author/vyacheslavmedvedev/.
14. Institut Komp'yuternoy bezopasnosti CSI, Elektronnyy resurs: http://www. gocsi.com
15. Kort S.S. Teoreticheskie osnovy zashchity informatsii, M: «Gelios ARV», 2004, 233 s.
16. Sabadash V. Deyatel'nost' tsentrov reagirovaniya na komp'yuternye intsidenty: opyt zarubezhnykh stran. Elektronnyy resurs: http://cybersafetyunit.com/deyatelnost-tsentrov-reagirovaniya-na-kompyuternyie-intsidentyi-kak-sredstvo-protivodeystviya-internet-oshennich-estva-opyit-zarubezhnyih-stran/?lang=en.
17. Shelukhin O.I., Sakalema D.Zh., Filinova A.S. Obnaruzhenie vtorzheniy v komp'yuternye seti, M., Goryachaya liniya, Telekom, 2013, 220 s.
18. Lukatskiy A. Obnaruzhenie atak, SPb: BKhV, 2001, 625 s.
19. O sozdanii gosudarstvennoy sistemy obnaruzheniya, preduprezhdeniya i likvidatsii posledstviy komp'yuternykh atak na informatsionnye resursy Rossiyskoy Federatsii: Ukaz Prezidenta RF ot 15.01.2013 ¹ 31s., Elektronnyy resurs: http://base. consultant.ru/ cons/cgi/online.
20. Konventsiya ob obespechenii mezhdunarodnoy informatsionnoy bezopasnosti (kontseptsiya), Elektronnyy resurs: http://www.scrf.gov.ru/documents/6/.
21. Proekt Konventsii Organizatsii Ob'edinennykh Natsiy (OON) «Ob obespechenii mezhdunarodnoy informatsionnoy bezopasnosti», Elektronnyy resurs: http://www.scrf. gov.ru / documents /6/.
22. Sidorkina I.G., Shumkov D.S.. Kusochno-lineynaya approksimatsiya pri reshenii zadach izvlecheniya dannykh. // Programmnye sistemy i vychislitel'nye metody.-2013.-¹ 2.-C. 171-175. DOI: 10.7256/2305-6061.2013.2.7943
23. A.N. Savinov. Analiz prichin vozniknoveniya oshibok pervogo i vtorogo roda v sistemakh avtorizatsii osnovannykh na raspoznavanii klaviaturnogo pocherka. // Programmnye sistemy i vychislitel'nye metody.-2012.-¹ 1.-C. 53-59.
24. A.G. Korobeynikov, I.G. Sidorkina, S.Yu. Blinov, A.V. Leyman. Algoritm klassifikatsii informatsii dlya resheniya zadachi fil'tratsii nezhelatel'nykh soobshcheniy. // Programmnye sistemy i vychislitel'nye metody.-2012.-¹ 1.-C. 89-95.