Informatika i Ee Primeneniya [Informatics and its Applications]
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Inform. Primen.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Informatika i Ee Primeneniya [Informatics and its Applications], 2018, Volume 12, Issue 4, Pages 39–43
DOI: https://doi.org/10.14357/19922264180406
(Mi ia561)
 

This article is cited in 3 scientific papers (total in 3 papers)

Methods of identification of host capture in a distributed information system which is protected on the basis of meta data

A. A. Grusho, N. A. Grusho, M. V. Levykin, E. E. Timonina

Institute of Informatics Problems, Federal Research Center “Computer Sciences and Control” of the Russian Academy of Sciences, 44-2 Vavilov Str., Moscow 119133, Russian Federation
Full-text PDF (132 kB) Citations (3)
References:
Abstract: The model of a distributed information system in which permissions on network connections are based on meta data is considered. Meta data are simplification of business process models. It is proved that the adversary of information security who captured a host and accurately attacked a system by means of changes of output data of tasks solved on this host cannot be detected at the level of meta data. The problem is connected with the fact that a business process model and, therefore, meta data operate with variables for which changes of specific values are not reflected in their description. Exceptions are output cases on forbidden values, for example, out of limits of definition ranges and a set of values of functions of which information technologies are constructed. Additional variants of information security measures which consider “invisibility” of similar violations of information security at the level of meta data are suggested.
Keywords: information security, information technologies, distributed information system, meta data, ban, threat of host capture.
Funding agency Grant number
Russian Foundation for Basic Research 18-07-00274_а
The paper was supported by the Russian Foundation for Basic Research (project 18-07-00274).
Received: 24.09.2018
Bibliographic databases:
Document Type: Article
Language: Russian
Citation: A. A. Grusho, N. A. Grusho, M. V. Levykin, E. E. Timonina, “Methods of identification of host capture in a distributed information system which is protected on the basis of meta data”, Inform. Primen., 12:4 (2018), 39–43
Citation in format AMSBIB
\Bibitem{GruGruLev18}
\by A.~A.~Grusho, N.~A.~Grusho, M.~V.~Levykin, E.~E.~Timonina
\paper Methods of identification of host capture in a distributed information system which is protected on the basis of meta data
\jour Inform. Primen.
\yr 2018
\vol 12
\issue 4
\pages 39--43
\mathnet{http://mi.mathnet.ru/ia561}
\crossref{https://doi.org/10.14357/19922264180406}
\elib{https://elibrary.ru/item.asp?id=36574074}
Linking options:
  • https://www.mathnet.ru/eng/ia561
  • https://www.mathnet.ru/eng/ia/v12/i4/p39
  • This publication is cited in the following 3 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Информатика и её применения
    Statistics & downloads:
    Abstract page:222
    Full-text PDF :72
    References:21
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024