Модель комплекса средств противодействия угрозам информационной безопасности в сетях связи специального назначения
Работая с нашим сайтом, вы даете свое согласие на использование файлов cookie. Это необходимо для нормального функционирования сайта, показа целевой рекламы и анализа трафика. Статистика использования сайта отправляется в «Яндекс» и «Google»
Научный журнал Моделирование, оптимизация и информационные технологииThe scientific journal Modeling, Optimization and Information Technology
Online media
issn 2310-6018

Model of complex flows address threats to information security in communication networks special purpose

Bokova O.I.   Zhayvoronok D.A.   Kanavin S.V.   Khokhlov N.S.  

UDC 004.056.53
DOI: 10.26102/2310-6018/2020.29.2.040

  • Abstract
  • List of references
  • About authors

Currently, special-purpose communications networks are widely used in government bodies, bodies that carry out the functions of the country's defense, state security and law enforcement. In connection with the features of the functioning of infocommunication systems and communication networks for special purposes, it must be borne in mind that they are deployed and provide management and interaction within the existing departmental and interdepartmental communication systems. The article proposes a model for the formation of a set of means to counter threats to information security in communication networks for special purposes. A description of such complexes is given, situations and grounds for their application are considered. Attention is drawn to the identification of common technological features of the formation of a set of means to counter threats to information security in communication networks for special purposes. To formulate requirements for complexes of means of counteracting threats to information security in communication networks for special purposes, a rule base has been compiled on the basis of which certain countermeasures will be selected. The authors modeled the functioning of a complex of countermeasures using the apparatus of linguistic variables and fuzzy expert systems. Based on the results obtained, requirements can be proposed for creating a set of means to counter threats to information security in special communication networks. The mathematical apparatus used in this article, based on the use of linguistic variables and fuzzy expert systems, can fully characterize the dependence of the effectiveness of countermeasures on the totality of implemented protective measures.

1. About the connection: fed. Law dated 07.07.2003 No. 126-FZ. Available at: http://www.consultant.ru/cons/cgi/online.cgi?req = doc & base = LAW & n = 284635 & fld = 134 & dst = 1000000001.0 & rnd = 0.051152897698079736 # 08312366978414549 (accessed 03.06.2020).

2. Burenin AN, Legkov K. E. Security issues of infocommunication systems and networks for special purposes: the main threats, methods and means of ensuring integrated network security. H&ES Research. 2015;7(3):46-61.

3. Legkov K.E., Burenin A.N. Models of processes for organizing the processing of operational information by modern computing systems in the context of counteractions. Questions of defense technology. 2018;3:87-95.

4. Makarenko S.I. A dynamic model of a communication system under the conditions of a multilevel informational conflict of observation and suppression. Management, communication and security systems. 2015;3:122-185.

5. Makarenko S. I. Descriptive Model of a Special Purpose Communication Network. Management, communication and security systems. 2017;2:113-164.

6. Bogovik A. V., Ignatov V.V. The effectiveness of military communications and methods for its evaluation. St. Petersburg: VAS. 2006: 183.

7. Khokhlov N.S. Modeling and optimization of counteraction to information destruction in control and communication systems of internal affairs agencies in the context of countering information security threats: a monograph. Voronezh: Voronezh Institute of the Ministry of Internal Affairs of Russia. 2005:181.

8. Novoseltsev V.I., Kochedykov S.S., Orlova D.E. Crohn's tensor analysis and its applications: monograph. Voronezh: Scientific book. 2017:260.

9. Malyuk A.A. The basics of security policy for critical systems of information infrastructure: a course of lectures. M .: Hot line - Telecom. 2019:314.

10. Kanavin S.V. Gilev I.V., Popov A.V. Methods for the formation of elements of a complex to combat information destruction in special-purpose communication systems under destructive broadband influences. Federal Service for Intellectual Property: Certificate No. 2020611635; registered in the Register of computer programs of February 05, 2020

11. Khokhlov N.S., Kanavin S.V., Gilev I.V. The use of a multi-sector MIMO antenna system as an element of a set of means of counteracting destructive electromagnetic influences. The bulletin of Voronezh Institute of the Ministry of Internal Affairs of Russia. 2019;4:126-136.

12. Novikov D.A. Theory of management of organizational systems. - 2nd ed. M.: Fismalit. 2007:584.

13. Gilev I.V. A model for counteracting the destruction of information under destructive electromagnetic influences in special-purpose radio communication systems based on fuzzy expert systems. The bulletin of Voronezh Institute of the Ministry of Internal Affairs of Russia. 2020;1:158-168.

14. Khokhlov N.S., Dunin V.S. A model of information security threats of the Safe City integrated automated intellectual system. The bulletin of Voronezh Institute of the Ministry of Internal Affairs of Russia. 2011;1:74-79.

15. Khokhlov N.S., Kanavin S.V., Gilev I.V., Popov A.V. The program of choosing methods of counteracting destructive electromagnetic influences based on neural networks. Federal Service for Intellectual Property: Certificate No. 2020615923; registered in the Computer Software Registry of May 12,2020

16. Bokova O.I., Bondar K.M., Dunin V.S., Kanavin S.V., Skripko P.B. Modeling processes of the secondary geodynamic factors for ensuring the law-enforcement segment of the hardware and software complex «Safe city». Modeling, optimization and information technology. 2018; 4 (23). Available at: https://moit.vivt.ru/wpcontent/uploads/2018/10/BokovaSoavtori_4_18_1.pdf. DOI: 10.26102 /2310- 6018/2018.23.4.038 (accessed: 02.06.2020).

17. Khokhlov N.S., Kanavin S.V., Serpilin A.S. Requirements for the information security of radio monitoring systems, collection and processing of information of internal affairs bodies. Scientific and technical portal of the Ministry of Internal Affairs of Russia. M .: FKU NPO STIS Ministry of Internal Affairs of Russia. 2019;1:14-22.

18. Kanavin S., Gilev I. Modeling the Destructive Effect of Interference on Mobile Networks, Using the 3G Standard as an Example, Using a Noise Generator // Bulletin of the Lipetsk State Technical University. 1st International Conference on Control Systems, Mathematical Modeling, Automation and Energy Efficiency (SUMMA) – Lipetsk. 2019;407-410. DOI: 10.1109 / SUMMA48161.2019.8947533.

19. Goremykina G.I., Mastyaeva I.N., Gerasimova E.K. Modeling a system for evaluating the effectiveness of quality management based on Fuzzy technology in the Matlab environment. Fundamental research. 2013;6(8):1434-1439.

Bokova Oksana Igorevna
Doctor of Technical Sciences, Professor
Email: o.i.bokova@gmail.com


ООО «Cascade»

Moscow, Russian Federation

Zhayvoronok Denis Aleksandrovich
Candidate of Technical Sciences, Associate Professor
Email: d.zh007@bk.ru

Russian State University of Justice

Voronezh, Russian Federation

Kanavin Sergey Vladimirovich
Candidate of Technical Sciences
Email: sergejj-kanavin@rambler.ru

Voronezh Institute of the Ministry of Internal Affairs of Russia

Voronezh, Russian Federation

Khokhlov Nikolay Stepanovich
Doctor of Technical Sciences, Professor
Email: nikolayhohlov@rambler.ru

Voronezh Institute of the Ministry of Internal Affairs of Russia

Voronezh, Russian Federation

Keywords: countering threats to information security, special-purpose communications networks, integrated approach, fuzzy expert systems, security management

For citation: Bokova O.I. Zhayvoronok D.A. Kanavin S.V. Khokhlov N.S. Model of complex flows address threats to information security in communication networks special purpose. Modeling, Optimization and Information Technology. 2020;8(2). Available from: https://moit.vivt.ru/wp-content/uploads/2020/05/BokovaSoavtors_2_20_1.pdf DOI: 10.26102/2310-6018/2020.29.2.040 (In Russ).

779

Full text in PDF