+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

Authors

Salakhutdinova K.

Degree
Рostgraduate, SPIIRAS
E-mail
kainagr@mail.ru
Location
Saint Petersburg
Articles

The approach to the analysis of the information security wireless network status

The article сonside the issues of information security specific wireless network architecture. An assessment of the state of information security systems based on indicators of the events intensity that occur in the process of malicious impact in terms of queuing theory. The analysis of the potential opportunities for the offender «soft» attacks on a wireless network. The analytic dependence by which to measure the state of information security elements of a wireless network architecture. Model of destructive information impact offender information security. The results showing the accuracy of the assumptions about the exponential distribution law for the duration of service requests network nodes.
Read more...

Identification of abnormal functioning during the operation devices of cyber-physical systems

The article explores the task of determining information security state of autonomous objects using the information obtained through a side acoustic channel. The basic prerequisites for using of external independent monitoring systems for monitoring condition of objects at the risk of the influence of threats to information security are considered. An experiment aimed at studying the functioning parameters of unmanned vehicles in various functioning situations was performed. The appearance and statistical characteristics of the signals, with the help of which it becomes possible to identify abnormal deviations during the operation of unmanned vehicles, are shown. An algorithm of two- and three-class classification of the states of the studied objects is presented. Analysis based on the obtained sample is very sensitive to any changes in the software and hardware configuration. At the same time, with a minimum time of accumulation of statistical information using the proposed approach based on a given threshold, it becomes possible to determine the point at which the attack was began. The proposed approach model implies the possibility of using various mathematical apparatus, statistical methods, and machine learning to achieve specified indicators for assessing the state of information security of an object.
Read more...