+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

Authors

Kotenko Igor V.

Degree
Professor, Honored Scientist of the Russian Federation, Chief Researcher – Head of Laboratory of Computer Security Problems, Saint Petersburg Federal Research Center of the Russian Academy of Sciences (SPС RAS)
E-mail
ivkote@comsec.spb.ru
Location
Saint Petersburg, Russia
Articles

Multi-criteria assessment of information security threats based on the technologies of digital twins and threat intelligence

Currently, the problem of ensuring information security of critical information infrastructure is steadily increasing and acquiring strategic importance, which is caused by the explosive growth of complex targeted attacks on infrastructure facilities. The solution to this problem requires the development of new approaches for assessing information security threats that combine the relevance of data provided by threat intelligence technology with a deep understanding of the specifics of the protected systems. An analysis of the state of the problem shows that existing approaches for assessing information security threats to critical information infrastructure facilities have such shortcomings as a gap between threat intelligence data and the context of a specific system, subjectivity of qualitative assessments, and the complexity of ranking threats given many conflicting criteria. To overcome these shortcomings, the article proposes a method for multi-criteria assessment of information security threats to critical information infrastructure facilities that integrates threat intelligence and digital twin technologies, where the digital twin technology is designed to provide the necessary understanding of object specifics. A system of indicators has been developed, structured according to five projections of threat assessment: severity of consequences, intruder capabilities, vulnerability of the facility, complexity of the attack, and effectiveness of protection. A conceptual model of an information security threat assessment system based on the technologies of digital twins and threat intelligence has been developed. A multi-criteria threat assessment methodology is presented, in which the integral threat index and Pareto-optimal threat ranks are calculated based on a set of criteria. Experimental testing on synthetic data confirmed the consistency of the results of these calculations. Practical application of the proposed method allows for threat analysis both as a whole and within individual projections of the indicator system. Read more...

An approach to detection of modification attacks on digital 3D models in smart additive manufacturing

The paper presents a study of the issues of detecting attacks on modification of digital models of products (details) intended for 3D printing in modern intelligent additive manufacturing systems. In general, such systems are networks that include multiple 3D printers (i. e. 3D farms) operating in parallel, capable of printing series of products at user requests, for instance elements of physical structures of robots and vehicles, blades of unmanned aerial vehicles and other parts made of plastic, metal and other materials. Existing examples of such 3D installations are vulnerable to the actions of attackers who try to make a hidden unauthorized modification by influencing digital models. After such an attack, end products may have a design defect with visual characteristics that are almost indistinguishable from the original sample of such a product. For instance, by influencing a defective element of the UAV body, an attacker may reduce its controllability and even lead to its crash. The paper considers an experimental substantiation of the hypothesis on the possibility of detecting modification attacks on digital models of products based on processing and analysis of the program code of such models. The features of defects in 3D product models presented in the G-code language and selected from open 3D model databases are analyzed. A data set consisting of original and modified product models is compiled. An approach to modification detection using embedding to transform data into numerical vectors and train classifiers on them using supervised learning methods is proposed. Experiments on test data samples demonstrated the feasibility of the proposed approach to modification detection and the prospects for its further development and application in practice. Read more...