+7 (495) 957-77-43

Article-6_2-2019

Извините, этот техт доступен только в “Американский Английский”. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language.

SECURITY MANAGEMENT OF FUNCTIONING OF A SUBSYSTEM OF PROVIDING MANAGEMENT SYSTEM WITH UNIFORM TIME OF ELEMENTS WITH A DIFFICULT ORGANIZATIONAL AND TECHNICAL OBJECT

Andrey N. Burenin, «Research Institute «Rubin», St. Petersburg, Russia, konferencia_asu_vka@mail.ru
Konstantin E. Legkov, Military Space Academy, St-Petersburg, Russia, constl@mail.ru
Georgy V. Tereshchenko, Military Space Academy, St. Petersburg, Russia, konferencia_asu_vka@mail.ru

Abstract
One of the most important tasks of management of a subsystem of providing with uniform time in the conditions of the massive attacks of violators is the problem of security management of its functioning as from the point of view of violators, a special purpose difficult organizational and technical object first of all it is reasonable to carry out purposeful impact on management system on the most critical objects, one of which is the providing subsystem. The main problems and ways of their solution at the organization of security management which arise during creation of a subsystem of management of providing the management system with uniform astronomical and uniform operational time of elements with a special purpose difficult organizational and technical object protected by a subsystem are considered. Basic approaches to modeling of management processes at the organization of complexes of technical means of security management of functioning of a subsystem of providing with uniform time are offered, both exact (astronomical), and functional or operational, all important elements (including officials of management and complexes of automation) management systems by a special purpose difficult organizational and technical object. It is shown that for a solution of problems and a complex of problems of security management of a subsystem of providing with uniform time it is necessary to use a number of models of management: risk management, incidents, audit, politicians, recovery after the successful attacks of violators. The analysis of nature of the possible attacks of violators and objects of a subsystem of providing against which they can be directed allow to assume that in terms of recovery of components of a subsystem the main role is played by processes of recovery of the special software of servers of uniform time and user applications of consumers of services of a subsystem. For this purpose in a subsystem of security management there have to be actions provided by the management plan and the officials organizing implementation of procedures of recovery of the software and data on processes of providing uniform time and also data on time, the accepted metrics of uniform time, on forms of dependences of operational time on astronomical are selected. At the same time maintenance of operating systems can be carried out by means of archive copies of the main system files or copies of hard drives.

Keywords: subsystem of providing uniform time, operational system, security managements, management system, information services.

References

1. Sistema edinogo vremeni «Inteltek Plyus» [Common timing system of Inteltek Plus]. URL: http://www.inteltec.ru/.
2. Burenin A.N., Legkov K.E., Pervov M.S. (2018). The organization of procedures for identification and localization of violations of security policies at security management of functioning of a subsystem of providing with uniform time of the automated control system for a complex organizational and technical system. H&ES Research. Vol. 10. No. 6. Pð. 28-36. (In Russian)
3. Burenin A.N., Legkov K.E. (2015). Sovremennye infokommunikatsionnye sistemy i seti spetsial nogo naznacheniya. Osnovy postroeniya I upravleniya: Monografiya. [Modern infocommunication systems and special purpose networks. Basics of creation and control]. Moscow: Media Publisher. 348 p. (In Russian)
4. Burenin A.N., Kurnosov V.I. (2011). Teoreticheskie osnovy upravleniya sovremennymi telekommunikacionnymi setyami [Theoretical bases of management of modern telecommunications networks]. Moscow: Nauka. 464 p. (In Russian)
5. Venttsel E.S., Ovcharov L.A. (1991). Teoriya sluchajnyh processov i ee inzhenernye prilozheniya [Theory of accidental processes and its engineering applications]. Moscow: Nauka, 1991. 384 p. (In Russian)
6. Feller W. (1968). An Introduction to Probability Theory and its Applications. 3rd ed. Vol. 1. 528 p.
7. Shneps-Shneppe M.A. (1979). Distribution System information. Calculation methods. Moscow: Svyas’. 342 p. (In Russian)
8. Emel’yanov A.V., Legkov K.E., Orkin V.V. (2017). Analiz problem informatsionnoy bezopasnosti informatsionnykh sistem spetsial’nogo naznacheniya pri upravlenii imi [Proceedings of the II Interuniversity scientific and practical conference «Problems of technical support of troops in modern conditions»]. Trudy II Mezhvuzovskoy nauchno-prakticheskoy konferentsii «Problemy tekhnicheskogo obespecheniya voysk v sovremennykh usloviyakh» [Proceedings of the II Interuniversity scientific and practical conference «Problems of technical support of troops in modern conditions»]. St. Petesburg: Voennaya akademiya svyazi. Pp. 122-126. (In Russian)
9. Shan’gin V.F. (2012). Zashchita informatsii v komp’yuternykh sistemakh i setyakh [Information Protection in computer systems and networks]. Moscow: DMK Press, 592 p. (In Russian)
10. Erokhin S.D., Artamonov Y.S., Legkov K.E. (2013). To the question about the methods of identification of information security threats in the border space. I-methods. Vol. 5. No. 2. Pp. 19-22. (In Russian)
11. Baboshin V.A., Sirotenko F.F. (2013). The model of the process of monitoring the transportation network for special purposes based on fuzzy logic. I-methods. Vol. 5. No. 1. Pp. 20-25. (In Russian)
12. Erokhin S.D., Legkov K.E. (2014). Information threats are automated systems of control of technological processes. I-methods. Vol. 6. No. 1. Pp. 24-26. (In Russian)
13. Korsun A.S., Maslennikova T.N., Erychov V.G. (2015). Model system analysis of information security in automated systems. I-methods. Vol. 7. No. 4. Pp. 30-34. (In Russian)
14. Mitra D., Ramakrishman K.G. (2001). Technics for traffic engeniring of multiservice in priority networks. BLTJ. Vol. 1. Pp. 123-130.
15. Zima V.M., Moldovyan A.A., Moldovyan N.A. (1999). Bezopasnost’ global’nyh setevyh tehnologij [The global security network technologies]. St. Petesburg: SPbU. 234 p. (In Russian)
16. Kotenko I.V., Stepashkin M.V., Bogdanov V.S. (2006). Vulnerability Analysis of Computer Networks on Design Stages and Maintenance. Izvestiya vysshikh uchebnykh zavedeniy. Priborostroenie [Journal of Instrument Engineering]. Vol. 49. No. 5. Pp. 3-8. (In Russian)
17. Gorodetsky V., Kotenko I., Karsayev O. (2003). The Multiagent Technologies for Computer Network Security: Attack Simulation, Intrusion Detection and Intrusion Detection Learning. The International Journal of Computer Systems Science &Engineering. Vol. 18. No. 4. Pp. 191-200.
18. Harmer P., Williams P., Gunsch G., Lamont G.B. (2002). An artificial immune system architecture for computer security applications. IEEE Transactions on Evolutionary Computation. Vol. 6. No. 3. Pp. 252-280.
19. Al-Kasassbeh M., Adda M. (2009). Network fault detection with Wiener filter-based agent. Journal of Network and Computer Applications. Vol. 32. No. 4. Pp. 824-833.
20. Burenin A.N., Legkov K.E., Pervov M.S. (2018). Probable time response characteristics of functioning of protected aggregate automated control system for difficult organizational and technical system in the conditions of intensive cyber attacks. H&ES Research. Vol. 10. No. 5. Pð. 56-63. (In Russian)
21. Burenin A.N., Legkov k.E., Pervov M.S. (2018). The organization of procedures for identification and localization of violations of security policies at security management of functioning of a subsystem of providing with uniform time of the automated control system for a complex organizational and technical system. H&ES Research. Vol. 10. No. 6. Pð. 28-36. (in Russian)

Information about authors:
Andrey N. Burenin, PhD, Full Professor, Chief specialist of «Research Institute «Rubin», St. Petersburg, Russia
Konstantin E. Legkov, PhD, Head of the Department of automated systems of control of the Military Space Academy, St. Petersburg, Russia
Georgy V. Tereshchenko, PhD, Department of automated systems of control of the Military Space Academy, St. Petersburg, Russia