Published:
2006-04-01
Articles
-
The paper reviews the state-of-the-art of perspective research directions in the field of computer networks security fulfilled on basis of the International Workshop «Mathematical models, methods and architectures for computer networks security» (MMM-ACNS-2005), which took place from September, 25th till September, 27th 2005 in Saint-Petersburg. The common information on the workshop is presented, the invited and sectional reports of leading scientists in the field of information security in such perspective research directions as models, architectures and protocols for information security, authentication, authorization and access control, informational flow analysis, covert channels, security policy and operating system security, vulnerability assessment, network forensics and intrusion detection are described.
-
Approach to computer network security analysis for using both at design and operation stages is suggested. This approach is based on generating common attack graph and using qualitative security metrics. The graph represents possible scenarios of distributed attacks taking into account network configuration, security policy, malefactor’s location, knowledge level and strategy. The general architecture of the security analysis system proposed, the main concepts of common attack graph, used security metrics taxonomies, metrics calculation rules and general security level evaluation procedure are considered. The suggested security metrics allow to evaluate computer network security level with different detailing level and taking into account different aspects. The implemented software prototype is described, and examples of using the prototype for express-analysis of computer network security level are considered.
-
The paper considers issues applied to design and implementation of the system of proactive monitoring of security policy. The approach suggested is based on simulation of user actions in computer network under investigation. The generalized architecture of proactive monitoring system and its functioning techniques are described, problems applied to work in real network and their possible solutions are considered. The paper contains the description of prototype of proactive monitoring system and the example of the prototype using to test network security policy.
-
We consider an application of the indices method to estimating information defense effectiveness when the complex of supervising requirements and activities has a hierarchical structure and the index of the defense complex performance is measured in a discrete scale. In the absence of statistical data, experts assign certain values to indexes, taking into account their for he degree of information defense.
-
In article the contents of the comprehensive approach to protection of the information is considered at automation of confidential office-work. Paths of neutralizing of the hidden threats and attacks, characteristic for the automated systems of confidential office-work are shown. Architectural features and technological engineering process of the special hardware-software complex of protection of the confidential documents, based on encoding of the information and application of electronic identifiers ruToken are described.
-
The method of rank distributions for detection of unapproved insertions in image belonging to video data stream is suggested. The compare of attributes of rank distributions for different local areas of image and of the frames (streams) as a whole shows the signs of unapproved changes availability.
-
We consider an approach for constructing the security policy verification system intended for detection and resolution of conflicts in computer network security policy specifications. The architecture of the security policy verification system suggested is considered. The models of two verification modules are proposed. The first one is based on proof theory, namely Event Calculus, and uses abductive reasoning. The second module uses model checking technique. The current implementation of the security policy verification system is described.
-
Technology of designing functional diagrams of protection system with IDEF and semiautomatic transformation them into UML diagrams of classes are mentioned. Conversion from model to a framework of code is shown.
-
Principles of design of automated decomposition tools for sequential software are considered on the basis of its parallels form, reached from information streams graph. Template (prototype) of automated decomposition system for software compiled in C is developed, source text being under restrictions of structure programming.
-
The comparative potential possibilities are regarded of various groups of algorithms for object classification. Particularly, the spectrum group of algorithms, that operate spectrum of distances between objects, is regarded. The group of difference algorithms, which operate with scales of differences between objects, and the group of coding invariant algorithms that are invariant to feature coding, are also regarded. It is shown, that for the sets of objects in the space of binary features the possibilities of spectrum group of algorithms are equal to the possibilities of the group of difference algorithms and more over, for the set of odd number of objects are also equal to the possibilities of the group of coding invariant algorithms.
-
Semi-automatic system transforming components of diagrams IDEF0 into class-diagrams in UML-notation is described. Enhancement of efficiency of design when functional design gives place to object-oriented one is discussed. The tuning of system according to concrete rules of transformation is provided for serviceability.
-
Formal modeling is very important part of program creation process in the all development steps. Functional testing, in one's turn, is integral part of quality assurance. Formal models translation mechanisms creating bring to necessity of validation control for functional transmission across models. This article describes methods for solving the problem by test scenarios modeling with formal models help.
-
We consider an application of CF grammar with regular expressions in right hand side of the rules for representation and processing in computer algebra and proof assistants. The program SynGT has been presented.
-
The problem of reversible data embedding is solved in framework of deterministic approach to video-information interpretation. The embedding data is initialized as arbitrary bit series of some message. The solution is succeeded owing to simulation of abstract multi-channel ternary memory attributed to image. It appears that ternary memory is capable to memorize the message and to store it independently of prescribed transmission signal transformation.
-
Different approaches to decomposition of measured upward radiation into the component reflected by the water object and the noise component, generated by the reflection from atmospheric layers are considered. Advantages and disadvantages of the considered approaches are analyzed from the point of view of their application for the retrieval of surface water quality from the remote sensing observations.
-
This paper proposes a novel approach to computation of hydroacoustic fields based on the immunocomputing. We demonstrate that the approach essentially improves the computational performance and accuracy. We also propose to develop a special immunochip for on-line simulation, visualization, and recognition of physical fields of mobile objects.
-
An approach to quality estimatiing of technological processes on the basis of approximate graph and functional models of technological operations is proposed. Approximation estimation error and its influence on probability quality index of technological process are analyzed.
-
Formal algorithm of recognition of the infinite rules for the context free grammars is presented and substantiated.
-
The basic problem we address during this study is to investigate by the Kellerman-Plutchick Life Style Index the characteristics of psychological defense in the youth, concentrating on determining the average activation level and searching for the ways of changing the intensity of different defense mechanisms. We analyze specific characteristic features of psychological defense mechanisms among the youth and their correlations with different psychological features (personal traits, temperament, accentuations, risk inclination, new sensation seeking) and create the psychological portraits of young persons, specific for each of the basic mechanisms of psychological defense. We place high emphasis on risk behavior analysis. Mathematical statistics techniques (primary statistics, Student’s ttest, Pearson’s r, factor analysis, linear regressions, multivariate regressions) which have been used for data processing are also described in the article.
-
We describe collecting and further analysis of expert’s estimates regarding the results of an incomplete sentences test (9480 sentences, 5 expert’s estimate for each) as well as the means used for automation of these processes. We also present the most important statistical conclusions.
-
We offer a task statement on estimating HIV-acquisition risk. Our method is based on using data concerning several last episodes of risky behavior. We describe a mathematical model of acquiring infectious diseases that allows to correctly set up a mathematical task of considering last episodes data. We offer several approaches to solving this task.
-
Neuron reactions produced by neurotransmitters and conformation transitions of receptors are analyzed. In plasmatic membrane, receptors and integrated channels form the separate mosaics of iono- and metabotropic receptive clusters (IRC and MRC). They realize transmembrane signaling that depends on conformation mobility and separate (sub- or perisynaptic) localization of IRC and MRC. Depending on membrane potential, MRC acts as bistable (W) or monostable (R) molecular trigger allowing to write down or to read the information respectively. The conformation changes were researched under electrical and chemical stimuli. It is shown that dual action of the stimuli transfers a receptive cluster in the third conformation, where adhesion immobilizes receptors in cluster. This decreases their conformation mobility in IRC, inactivates channel conductivity, and MRC becomes an engram element. Conformation properties of MRC elucidate mechanisms of short-term and long-term memory and clarify engram stratification on age. Together with synaptic environment, the set of MRCs forms an addressed memory media, where recording and reproducing of neural pulse texts are alternated due to variability of the ERP and slow potentials and resulted space mobility of R/W modes.
-
About Probability of Parkinson’s Disease Automated Diagnostics by Fractal Method for Analysis of Tremorograms
-
The complex two-componens model for calculations of bioclimatic structure of the wild reindeers habitat, including functional model energy expenditure for animals and information model of a climate of the habitat is submitted. The complex is intended for the decision of two primary goals — constructions of bioclimatic domains for the habitat and the analysis of influence of those or other combinations of weather-climatic conditions on reindeers. With help of models on the monthly average data bioclimatic calculations of the Taimyr reindeer population habitat are carried out. Imitation experiments are lead also according to influence of air temperature, wind velocity, solar radiation, cloud cover, snow cover condition, size of power inputs of animals and to revealing of critical values of weather-climatic factors. Practical application of results — bioclimatic indication of Arctic regions, the analysis and forecasting of spatial accommodation of animals and their migrations, probable changes of spatial structure of a population at climatic changes.
-
Actual problem of creation of effective economic mechanisms of biodiversity preservation is the weakness of the cost estimation of economic functions of diversity of the wildlife exploitable objects. In the article the complex of simulation algorithmic models are considered for the cost evaluation of an intraspecific biodiversity of chum salmon (Oncorhynchus keta).
-
The Organization Peculiarities of the Automated Information System "Tutorial System of the Sub-faculty"
-
We consider the application of variation approach for solution of complex problems of statistic estimation of non-linear dynamic systems meeting the criterion of maximum verisimilitude. We discuss questions of variation and direct estimations adequacy.
-
One considers the task of optimum control of active objects movement at it’s consecutive meeting with a system of mobile objects for special targets. The composite method of numeric solution and example is suggested.
-
We present here a method of comparative indicators that is a method for computation of the linear convolition in comparison to the selected unit. We describe and then consider a way to mutual expression of results, calculated for a comparison of two systems (groups of objects).
-
We describe the envelop method applied to dynamic systems singular control optimization.
-
This article proposes an approach for investigating the exponential stability of a nonlinear interval dynamical system with nonlinearity of a quadratic type on the base of the Lyapunov’s direct method. It also constructs an inner estimate of the attraction domain to the origin for the system under consideration.
-
The problems of creating and using of fault-tolerant computer systems is considered. The article presents different solutions of problem of structure dynamic control for the fault-tolerant computer systems functioning in high availability and load balancing modes.
-
For a wide class of non-linear models for autonomous flying vehicles dynamics criteria of their reversibility, controllability, decomposability and programme motion stabilizability have been received. Programme motions and programme controls in analytic kind and also algorithms for robust stabilization of programme motions have been synthesized. Non-linear canonical transformations for coordinates of integrated state and control space, reducing synthesis and analysis for motion stabilization laws of flying vehicles with reversible non-linear dynamics models, have been suggested.