+7 (495) 987 43 74 ext. 3304
Join us -              
Рус   |   Eng

articles

№ 5(119) 24 october 2025 year
Rubric: Researching of processes and systems
The author: Lavrenkov Y.

Купить статью

Download the first page

This article shows how the modified U-Net, a neural network, can be used to find differences in visible and radio frequency spectrum images. The neural network was modified, with its convolutional layers replaced by the convolution blocks with neuromorphic microbiological cells, which partially destroy the cellular skeletal structure and change their conductivity through controlled biocorrosion. The author developed a method of training a modified neural network based on stimulation of the bacterial layer for the corrosion of conductive components. Functional analysis demonstrated the high efficiency of neural network element configuration and showed that the elements can form interconnected active structures. The author found out that, thanks to the neural network cell’s feature, neutral units can autogenerate signals. This is how information passing through the network can be processed both in passive mode and through interaction with local electrical activity. The author also researched generated activities, which revealed the integral effect of adding signals from neuromorphic cells, resulting in a complex response that includes the spectral components of all neighbouring cells. The modified network has an advantage over similar neural network structures: training can be managed by changing the total activity of neurons, rather than by evaluating the network’s response to test data. When it comes to a trained and formed neural network in which conductive structures are configured, spontaneous activity occurs much less frequently than in the initial configuration where the cells were not subjected to biocorrosion and therefore had maximum conductivity. The experiments demonstrated that the modified U-Net can be used to find differences in visible and radio frequency spectrum images. To successfully find differences hidden by the geometric features of the terrain, the author used a comprehensive strategy for image comparison using visible and radio spectra. The practical research is novel in that it offers a newly developed modification of neuromorphic cells. They achieve high speed of task solution due to the massively parallel organisation of detecting changes in images. Continue...
№ 5(119) 24 october 2025 year
Rubric: Data protection
Authors: Kotenko I., Mityakov E. S., Saenko I.

Купить статью

Download the first page

Currently, the problem of ensuring information security of critical information infrastructure is steadily increasing and acquiring strategic importance, which is caused by the explosive growth of complex targeted attacks on infrastructure facilities. The solution to this problem requires the development of new approaches for assessing information security threats that combine the relevance of data provided by threat intelligence technology with a deep understanding of the specifics of the protected systems. An analysis of the state of the problem shows that existing approaches for assessing information security threats to critical information infrastructure facilities have such shortcomings as a gap between threat intelligence data and the context of a specific system, subjectivity of qualitative assessments, and the complexity of ranking threats given many conflicting criteria. To overcome these shortcomings, the article proposes a method for multi-criteria assessment of information security threats to critical information infrastructure facilities that integrates threat intelligence and digital twin technologies, where the digital twin technology is designed to provide the necessary understanding of object specifics. A system of indicators has been developed, structured according to five projections of threat assessment: severity of consequences, intruder capabilities, vulnerability of the facility, complexity of the attack, and effectiveness of protection. A conceptual model of an information security threat assessment system based on the technologies of digital twins and threat intelligence has been developed. A multi-criteria threat assessment methodology is presented, in which the integral threat index and Pareto-optimal threat ranks are calculated based on a set of criteria. Experimental testing on synthetic data confirmed the consistency of the results of these calculations. Practical application of the proposed method allows for threat analysis both as a whole and within individual projections of the indicator system. Continue...
№ 5(119) 24 october 2025 year
Rubric: Data protection
The author: Balyabin A.

Купить статью

Download the first page

The research is devoted to solving the problem of developing a method for protecting cloud platforms of critical information infrastructure based on cyber immunity. The analysis of existing approaches to protecting various digital systems has been conducted. It has been established that current approaches do not fully account for the specific characteristics of critical information infrastructure cloud platforms, namely: complex multi-layered architectures; the potential presence of undetected vulnerabilities leading to previously unknown threats of violation of computational semantics; elevated requirements for resilience; and the necessity for restoration of normal operation. The research sets out the objective of developing a new method for protecting cloud platforms of critical information infrastructure based on cyber immunity. A hypothesis has been formulated, stating that ensuring the required level of resilience for cloud platforms under cyberattacks is possible by adjusting the countermeasure parameters within a range of necessary and sufficient values, defined with consideration of the aforementioned requirements. The idea has been substantiated and the method for protecting cloud platforms of critical information infrastructure with cyber immunity has been developed. The method ensures the resilience of cloud platforms under computer attacks by varying the cyber immunity coverage ratio, taking into account the probability of achieving operational goals and the full execution time of program cycles. The scientific novelty of the proposed method lies in the fact that a modified bisection method has been applied to find the required value of the cyber immunity coverage coefficient. Furthermore, a criterion for verifying the existence of a necessary and sufficient value of this coefficient has been substantiated and implemented for the first time. Theoretical and experimental studies of the developed method have been conducted, confirming the proposed hypothesis. Continue...