Degree
|
Рostgraduate, SPIIRAS |
---|---|
E-mail
|
kainagr@mail.ru |
Location
|
Saint Petersburg |
Articles
|
The approach to the analysis of the information security wireless network statusThe article сonside the issues of information security specific wireless network architecture. An assessment
of the state of information security systems based on indicators of the events intensity that
occur in the process of malicious impact in terms of queuing theory. The analysis of the potential opportunities
for the offender «soft» attacks on a wireless network. The analytic dependence by which
to measure the state of information security elements of a wireless network architecture. Model of destructive
information impact offender information security. The results showing the accuracy of the
assumptions about the exponential distribution law for the duration of service requests network nodes.
Read more...
Identification of abnormal functioning during the operation devices of cyber-physical systemsThe article explores the task of determining information security state of autonomous objects using
the information obtained through a side acoustic channel. The basic prerequisites for using of external
independent monitoring systems for monitoring condition of objects at the risk of the influence
of threats to information security are considered. An experiment aimed at studying the functioning
parameters of unmanned vehicles in various functioning situations was performed. The appearance
and statistical characteristics of the signals, with the help of which it becomes possible to identify abnormal
deviations during the operation of unmanned vehicles, are shown. An algorithm of two- and
three-class classification of the states of the studied objects is presented. Analysis based on the obtained
sample is very sensitive to any changes in the software and hardware configuration. At the same
time, with a minimum time of accumulation of statistical information using the proposed approach
based on a given threshold, it becomes possible to determine the point at which the attack was began.
The proposed approach model implies the possibility of using various mathematical apparatus, statistical
methods, and machine learning to achieve specified indicators for assessing the state of information
security of an object.
Read more...
|