+7 (495) 957-77-43

Article 8_1_2019

Извините, этот техт доступен только в “Американский Английский”. For the sake of viewer convenience, the content is shown below in the alternative language. You may click the link to switch the active language.

MAIN PROBLEMS OF SAFETY OF XUBSYSTEMS OF PROVIDING MANAGEMENT SYSTEMS WITH UUNIFORM TIME OF ELEMENTS WITH DIFFICULT ORGANIZATIONAL AND TECHNICAL OBJECTS

Anrey N. Burenin, St. Petersburg, Russia, konferencia_asu_vka@mail.ru
Konstantin E. Legkov, St-Petersburg, Russia, constl@mail.ru

Abstract
The analysis of the main problems of safety (the organizations of a complex and management of it) which arise during creation of the protected subsystem of providing management system with uniform astronomical and uniform operational time of the elements with a difficult organizational and technical object participating in management processes is carried out. Basic approaches to modeling of processes of the attacks are offered, to the organization of complexes of technical means of safety, management of a subsystem of providing of it by uniform time, both exact (astronomical), and functional or operational, required elements (officials of governing bodies and complexes of automation) of management system of a special purpose difficult organizational and technical object. It is shown that for a solution of problems and a complex of problems of safety of a subsystem of providing management system with uniform astronomical and uniform operational time of elements a difficult organizational and technical object it is necessary to use a number of models of safety: models of a subsystem of providing with uniform time, models of the attacks, models of the violator, model of the graph of the attacks, models of assessment of level of security, threading model of influences. It is proved that high complexity of a subsystem of providing management system with uniform astronomical and uniform operational time of elements with a difficult organizational and technical object and the mechanisms of information protection and means of a subsystem of providing with uniform time realized in them, increase in number of the vulnerabilities connected using standard, widely used protocols of uniform time (NTP, PTP), existence of potential errors or «tabs» in the software of the used server means and means of telecommunications, result in need of development of the automated complexes of providing and security management which part powerful adaptive sensors and the analysis of these attacks are.

Keywords: common timing system; management safety; sensors of the attacks; protocols of uniform time; complex of technical means.

References

1. Sistema edinogo vremeni «Inteltek Plyus» [Common timing system of Inteltek Plus]. URL: http://www.inteltec.ru.
2. Burenin A.N., Legkov K.E., Pervov M.S. (2018). The organization of procedures for identifi cation and localization of violations of security policies at security management of functioning of a subsystem of providing with uniform time of the automated control system for a complex organizational and technical system. H&ES Research. Vol. 10. No. 6. Pð. 28-36. (In Russian)
3. Burenin A.N., Legkov K.E. (2015). Sovremennye infokommunikatsionnye sistemy i seti spetsial nogo naznacheniya. Osnovy postroeniya I upravleniya: Monografiya. [Modern infocommunication systems and special purpose networks. Basics of creation and control]. Moscow: Media Publisher. 348 p. (In Russian)
4. Burenin A.N., Kurnosov V.I. (2011). Teoreticheskie osnovy upravleniya sovremennymi telekommunikacionnymi setyami [Theoretical bases of management of modern telecommunications networks]. Moscow: Nauka. 464 p. (In Russian)
5. Ushakov I.A. (1991). Veroyatnostnye modeli nadezhnosti informatsionno-vychislitel’nykh system [Probabilistic models of reliability of information-computing systems]. Moscow: Radio i svyaz’. 132 p. (In Russian)
6. Feller W. (1968). An Introduction to Probability Theory and its Applications. 3rd ed. Vol. 1. 528 p.
7. Shneps-Shneppe M.A. (1979). Distribution System information. Calculation methods. Moscow: Svyas’. 342 p. (In Russian)
8. Emel’yanov A.V., Legkov K.E., Orkin V.V. (2017). Analiz problem informatsionnoy bezopasnosti informatsionnykh sistem spetsial’nogo naznacheniya pri upravlenii imi [Proceedings of the II Interuniversity scientific and practical conference «Problems of technical support of troops in modern conditions»]. Trudy II Mezhvuzovskoy nauchno-prakticheskoy konferentsii «Problemy tekhnicheskogo obespecheniya voysk v sovremennykh usloviyakh» [Proceedings of the II Interuniversity scientific and practical conference «Problems of technical support of troops in modern conditions»]. St. Petesburg: Voennaya akademiya svyazi, pp. 122-126. (In Russian)
9. Shan’gin V.F. (2012). Zashchita informatsii v komp’yuternykh sistemakh i setyakh [Information Protection in computer systems and networks]. Moscow: DMK Press. 592 p. (In Russian)
10. Erokhin S.D., Artamonov Y.S., Legkov K.E. (2013). To the question about the methods of identification of information security threats in the border space. I-methods. Vol. 5. No. 2, pp. 19-22. (In Russian)
11. Baboshin V.A., Sirotenko F.F. (2013). The model of the process of monitoring the transportation network for special purposes based on fuzzy logic. I-methods. Vol. 5. No. 1, pp. 20-25. (In Russian)
12. Erokhin S.D., Legkov K.E. (2014). Information threats are automated systems of control of technological processes. I-methods. Vol. 6. No. 1,
pp. 24-26. (In Russian)
13. Korsun A.S., Maslennikova T.N., Erychov V.G. (2015). Model system analysis of information security in automated systems. I-methods. Vol. 7. No. 4, pp. 30-34. (In Russian)
14. Mitra D., Ramakrishman K.G. (2001). Technics for traffic engeniring of multiservice in priority networks. BLTJ. Vol. 1, pp. 123-130.
15. Zima V.M., Moldovyan A.A., Moldovyan N.A. (1999). Bezopasnost’ global’nyh setevyh tehnologij [The global security network technologies]. St. Petesburg: SPbU. 234 p. (In Russian)
16. Kotenko I.V., Stepashkin M.V., Bogdanov V.S. (2006). Vulnerability Analysis of Computer Networks on Design Stages and Maintenance. Izvestiya vysshikh uchebnykh zavedeniy. Priborostroenie [Journal of Instrument Engineering]. Vol. 49. No. 5, pp. 3-8. (In Russian)
17. Gorodetsky V., Kotenko I., Karsayev O. (2003). The Multiagent Technologies for Computer Network Security: Attack Simulation, Intrusion Detection and Intrusion Detection Learning. The International Journal of Computer Systems Science & Engineering. Vol. 18. No. 4, pp. 191-200.
18. Harmer P., Williams P., Gunsch G., Lamont G.B. (2002). An artificial immune system architecture for computer security applications. IEEE Transactions on Evolutionary Computation. Vol. 6. No. 3, pp. 252-280.
19. Al-Kasassbeh M., Adda M. (2009). Network fault detection with Wiener filter-based agent. Journal of Network and Computer Applications. Vol. 32. No. 4, pp. 824-833.
20. Burenin A.N., Legkov K.E., Pervov M.S. (2018). Probable time response characteristics of functioning of protected aggregate automated control system for difficult organizational and technical system in the conditions of intensive cyber attacks. H&ES Research. Vol. 10. No. 5, pð. 56-63. (In Russian)

Information about authors:
Andrey N. Burenin, PhD, Full Professor, Chief specialist of «Research Institute «Rubin», St. Petersburg, Russia
Konstanin E. Legkov, PhD, Head of the Department of automated systems of control of the Military Space Academy, St. Petersburg, Russia