Институт проблем информатики Российской Академии наук
Институт проблем информатики Российской Академии наук
Российская Академия наук

Институт проблем информатики Российской Академии наук



«Systems and Means of Informatics»
Scientific journal
Volume 23, Issue 1, 2013

Content | About  Authors

Abstract and Keywords.

COVERT CHANNELS GENERATED BY TAGS.

  • N. A. Grusho   IPI RAN, info@itake.ru

Abstract:  A possibility of creation of covert channels by means of the tags determined by admissible changes of the form of electrical signals is researched. Existence of identified admissible changes of the formof electrical signals is shown. The algorithm of creation of the covert channel with the check group reducing probability of the wrong decoding of hidden transmission is considered. It is shown that the number of the transferred hidden messages is commensurable with number of messages in legal transmission.

Keywords:  covert channels; data transfer standards by means of electrical signals; bandwidth of covert channels

NEW PRINCIPLES OF MODELING OF AUTONOMOUS SELF-PROPAGATING MALWARE.

  • M. V. Levykin   IPI RAN, de_shiko@yahoo.com

Abstract:  The research of malware has revealed that modern computer worms are self-contained self-propagating multiagent system. Principles and generalization of the autonomous self-propagation of such systems are of special interest.

Keywords:  worm; malware; model of autonomous distribution; computer network

LINUX-BASED OPERATING SYSTEMS VULNERABILITIES SEARCHING METHODS.

  • A. I. Mishchenko   IPI RAN, alximi@gmail.com

Abstract:  A method of Linux-based operating systems vulnerabilities searching, which considers major characteristics of analyzed systems is described.

Keywords:  vulnerabilities search; code verification; information security; open- source projects

ATTACKS ON THE CENTRALIZED SYSTEMS OF INTRUSION DETECTION.

  • A. A. Timonina   Faculty of Computational Mathematics and Cybernetics, M.V. Lomonosov Moscow State University, toniat@yandex.ru
  • E. E. Timonina   IPI RAN, eltimon@yandex.ru

Abstract:  Creation of the powerful centralized centers of attacks detection, servicing a large number of clients, possesses obvious positive properties. However, such systems generate a new class of the attacks connected with a need to service a flow of incidents, arriving from different clients. Such flow can generate a queue preventing effective detection of attacks. These problems are described by queue models. Some results of attacks simulation by means of queuing systems are presented.

Keywords:  information security; queuing systems; intrusion detection

ON A METHOD OF RELIABLE DELIVERY AND DATA SOURCE VERIFICATION WITHIN A CLIENT–SERVER INTERACTION OVER AN OPEN COMMUNICATION CHANNEL.

  • E. V. Piskovskiy   Moscow Institute of Physics and Technology (State University), evgeny.piskovsky@gmail.com

Abstract:  Two models of client - server interaction are considered: a model to describe reliable data delivery over an open channel and a model to describe data source verification. The models are formulated based on a set of rules to resolve the conflicts when several clients are connecting to one server. A computer-appliance is suggested for testing the functionality of the models either allowing several connections to the server from multiple clients or blocking connections from multiple clients.

Keywords:  client - server interaction; two-factor authentication; information source verification; reliable data delivery; open channel

ON OPTIMAL AUTHENTICATION CODE.

  • S.M. Ratseev   Faculty of Mathematics and Information Technologies, Ulyanovsk State University, RatseevSM@mail.ru

Abstract:  Constructions of optimal authentication code have been studied.

Keywords:  cipher; authentication code; message imitation; hash function

ON THE PROBLEM OF SUBSEQUENCES INCLUSION INTO THE DATA PACKAGES HEADERS.

  • M. I. Zabezhailo   Applied Research Center for Computer Networks, Moscow, Skolkovo, MZabezhailo@ arccn.ru

Abstract:  The possibility to apply models and techniques of the Software Defined Networks (SDN-technologies) to optimize traffic control in computer networks is discussed. An algebraic formalization for the problem of subwords inclusion into the words over the given alphabet is suggested. There are analyzed problem-oriented conditions and algorithms that implement and optimize checking for limited length subwords (subsequences) inclusion into the lines of big switching tables. Some additional SDN- based abilities to speed up data processing in computer networks are demonstrated.

Keywords:  software defined networks; header space analysis; mathematical models of data processing

CHARACTERISTICS OF HARDWARE-BASED FIELD-PROGRAMMABLE GATE ARRAY IMPLEMENTATION OF NETWORK TRAFFIC ANALYZER FOR MALICIOUS CODE DETECTION.

  • M. Samoylov   Faculty of Computational Mathematics and Cybernetics, M.V. Lomonosov Moscow State University, samoylov@lvk.cs.msu.su
  • D. Gamayunov   Faculty of Computational Mathematics and Cybernetics, M.V. Lomonosov Moscow State University, gamajun@cs.msu.su
  • S. Bezzubtsev   Lebedev Institute of Precision Mechanics and Computer Engineering, Russian Academy of Sciences, stas.bezzubtsev@gmail.com
  • M. Bulgakov   Faculty of Computational Mathematics and Cybernetics, M.V. Lomonosov Moscow State University, bulgakov@cs.msu.su

Abstract:  The paper is dedicated to improvement of perfomance charachteristics of existing malicious network traffic analyzing algorithms on high-speed network interfaces. The Racewalk algorithm is considered as a base for research. The authors focus on offloading certain processing actions into specific dedicated hardware device. As seen from experimental results, such implementation can work on higher network interface speeds (i. e., 10 Gbit/s).

Keywords:  FPGA; Racewalk; traffic filtering; shellcodes; network traffic

NONLINEAR CORRELATIONAL MODELING AND AFTERSALE PRODUCT SERVICE SYSTEMS RELIABILITY ANALYSIS.

  • I. N. Sinitsyn   IPI RAN, sinitsin@dol.ru
  • A. S. Shalamov   IPI RAN, a-shal5@yandex.ru
  • A. A. Kuleshov   IPI RAN, nordixsi@gmail.com

Abstract:  The article is devoted to the development of nonlinear correlational analytical modeling methods for aftersale product service systems. Special attention is paid to nonlinear correlational methods based on canonical expansions of random functions. Typical problems of reliability analysis (impulse processes modeling, summing processes control for fixed and variable level) are considered.

Keywords:  aftersale product service system; analytical modeling; canonical expansion of random function; current; hybrid stochastic system; impulse (shock) process; nonlinear correlational analysis; reliability analysis; stochastic process; summing process

SOME APPROACHES TO DEVELOPING THIN CLIENT TECHNOLOGIES FOR SECURE INFORMATION SYSTEMS.

  • E. Korepanov   IPI RAN, ekorepanov@ipiran.ru

Abstract:  The problems of thin client technologies development for Russian secure information systems based on world experience in virtual desktop infrastructure and hardware zero client are discussed.

Keywords:  information system security; thin client technology; virtual desktop infrastructure; PC-over-IP

ABOUT SOME PARTICULARITIES OF SPARE PARTS SETS CALCULATION FOR SECURED INFORMATION SYSTEMS.

  • A. A. Zatsarinny   IPI RAN, azatsarinny@ipiran.ru
  • A. I. Garanin   IPI RAN, agaramin@ipiran.amsd.ru
  • S. V. Kozlov   IPI RAN, sv kozlov@mail.ru
  • V. A. Kondrashev   IPI RAN, vkondrashev@ipiran.ru

Abstract:  Main particularities of spare parts, tools, accessories and materials provision for secured information systems are considered. Basic concepts are shown. Analytical dependences allowing to calculate necessary spare parts sets including initial set are presented. Particularities of spare parts set formation considering requirements on information security are formulated. Examples of calculations are shown.

Keywords:  automated secured information systems; technical tools set; spare parts, tools, accessories and materials (spare parts); sufficiency indicator of spare parts set; replenishment strategy of spare parts stock; spare parts set supply calculation

SOME TESTS FOR SOFTWARE RELIABILITY.

  • V. Yu. Korolev   Faculty of Computational Mathematics and Cybernetics, M.V. Lomonosov Moscow State University; IPI RAN, victoryukorolev@yandex.ru

Abstract:  Some rules for the termination of testing software reliability are described. These rules optimize the probability of erroneous decision and the posterior probability of erroneous decision.

Keywords:  software reliability; reliability growth model; testing statistical hypotheses; geometric distribution; probability of the error of first kind; probability of the error of second kind; the Neyman - Pearson lemma; posterior error probability

AUTOMATIC GENERATION OF VIZUAL REPRESENTATION OF THE DOCUMENT’S SEMANTIC CONTENT.

  • V.N. Zakharov   IPI RAN, vzakharov@ipiran.ru
  • A. A. Khoroshilov   Center of Information Technologies and Systems for Executive Power Authorities, A.A.Khoroshilov@yandex.ru

Abstract:  A method for generation of the formalized semantic content of a document and its visual representation, a semantic map of the document, is described. The formalization of the document content is based on the application of the semantic and conceptual analysis methods ensuring definition of the conceptual content of the text and the assignment to concepts of characteristics consistent with their semantic role and significance in the text. The resulting semantic structure of the text is converted to its visual representation showing the relationships between objects, events, and themes.

Keywords:  formalized semantic description of the document; document semantic map; semantic analysis; conceptual analysis; analysis of conceptual content of the document; knowledge extraction from texts