Sistemy i Sredstva Informatiki [Systems and Means of Informatics]
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive
Impact factor

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Sistemy i Sredstva Inform.:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Sistemy i Sredstva Informatiki [Systems and Means of Informatics], 2019, Volume 29, Issue 3, Pages 194–201
DOI: https://doi.org/10.14357/08696527190317
(Mi ssi666)
 

This article is cited in 1 scientific paper (total in 1 paper)

Methods of identification of “weak” signs of violations of information security

N. A. Grusho

Institute of Informatics Problems, Federal Research Center "Computer Sciences and Control" of the Russian Academy of Sciences; 44-2 Vavilov Str., Moscow 119133, Russian Federation
Full-text PDF (159 kB) Citations (1)
References:
Abstract: To ensure information security of information technologies in distributed information computing systems, a metadata mechanism implementing a permit system for establishing connections in a network has previously been proposed. If a host is captured by an adversary, there is a strategy for organizing attacks that are not detected at the traditional metadata level. A number of errors in data that can be generated by an adversary during the implementation of information technology require the construction of cause-and-effect chains preceding the error in order to identify the cause of the error. At the same time, metadata implement a simplified model of cause-and-effect relations when solving problems during implementation of information technology. This model can be used to find the specified errors. The author constructs a synergistic relationship between the solution of the mentioned problem of information security and the work of an experienced system administrator to determine the causes of implicit errors. This relationship allows leveraging the expertise of system administrators to make it easier to find a captured host and some strategies of an adversary to incorporate errors into the implementation of information technology. It also minimizes network reconfiguration requirements to bypass the captured host.
Keywords: information security, metadata, cause-and-effect relationships, system administration, implicit failures and errors.
Funding agency Grant number
Russian Foundation for Basic Research 18-07-00274_а
The paper was partially supported by the Russian Foundation for Basic Research (project 18-07-00274-a).
Received: 15.08.2019
Document Type: Article
Language: Russian
Citation: N. A. Grusho, “Methods of identification of “weak” signs of violations of information security”, Sistemy i Sredstva Inform., 29:3 (2019), 194–201
Citation in format AMSBIB
\Bibitem{Gru19}
\by N.~A.~Grusho
\paper Methods of~identification of~``weak'' signs of~violations of~information security
\jour Sistemy i Sredstva Inform.
\yr 2019
\vol 29
\issue 3
\pages 194--201
\mathnet{http://mi.mathnet.ru/ssi666}
\crossref{https://doi.org/10.14357/08696527190317}
Linking options:
  • https://www.mathnet.ru/eng/ssi666
  • https://www.mathnet.ru/eng/ssi/v29/i3/p194
  • This publication is cited in the following 1 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Системы и средства информатики
    Statistics & downloads:
    Abstract page:154
    Full-text PDF :31
    References:26
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024