Preview

The Herald of the Siberian State University of Telecommunications and Information Science

Advanced search
No 3 (2022)
View or download the full issue PDF (Russian)
3-13 3890
Abstract

The problems that arise when setting tasks for determining the vector of a network attack in a corporate information network are considered. The varieties of various techniques that simplify the construction of a network  attack vector used  in the analysis of the reliability of information systems are presented and characterized. The suitability for various procedures for determining vector parameters is considered. When constructing a network attack vector, the specificity of the manifestation of the time parameter was determined as a characteristic indicating a more effective way of spreading compromise. The formation of the vector is considered taking into account the specifics of the networks multilevel organization. The specifics of the simplified vector calculation model including procedures focused on various approaches are determined.

14-28 3762
Abstract

The paper substantiates the need of creation an information decision support system in the development of systems for protecting informatization objects. Analyzes of existing systems in various fields of activity, the requirements for the functionality of the system in relation to the field of information protection, methods for developing models of functioning of protected information systems in a destructive environment impact on the basis of Bayesian networks are considered. The paper gives a description of a typical module functioning of this model. The structures of probabilistic models of the relationship of vulnerabilities, information security threats, methods and scenarios for their implementation, the formation of measures to protect informatization objects, the formation and assessment of the risks of incidents and their damage are considered. Clusters of typical information security events, methodological apparatus for calculating the joint distribution of the probabilities of protective and destructive events are determined. Finally, typical chains of interconnections of such events are identified.  Mathematical apparatus for calculating their probabilities, a verbal description of the patterns of their mutual influence, and a method for converting quantitative probabilistic values of informatization object security indicators into qualitative ones are presented, and the results of the study are summarized.

29-37 3742
Abstract

The modified technology of full-scale tests of autonomous uninhabited underwater vehicles for checking the accuracy of their navigation aids and various trajectories development of underwater movement is proposed.

38-47 3490
Abstract

Algorithms for MPI_Scatterv, MPI_Gatherv, MPI_Allgatherv collective operations using the shared memory of multiprocessor SMP/NUMA systems are proposed. The algorithms use an approach based on copying message fragments via queues in a shared memory segment (Copy-In-Copy-Out). The algorithms were implemented based on Open MPI and the execution time is reduced on average by 20-40% for the MPI_Scatterv, MPI_Gatherv, MPI_Allgatherv operations compared to the coll/tuned component of the Open MPI library.

48-55 5998
Abstract

The article is devoted to the problem of creating anti-debugging mechanisms of the program. One of the most robust methods of setting breakpoints for programs is considered which cannot be detected by currently known algorithms. As part of the study, a new approach for program development is proposed which leads to decreasing in the effectiveness of debugging based on breakpoints. It is proposed to store program functions as a set of bytes and copy their code into one shared buffer before executing them. Given that the breakpoints are bound to the address, as a result we will get a debugger stop at each function executed in the buffer, not at any specific one, that will significantly increase the debugging time.

56-61 3543
Abstract

To calculate the reliability of an optical fiber under degradation conditions, the Markov model taking into account the worsening of fiber characteristics during its operation is proposed. The methodology for calculating the unavailability factor at different operating times is given as well as an example of estimating the unavailability factor.

62-83 4071
Abstract

The analysis of the problem status of positioning user UE devices using the infrastructure of the eNB base stations of LTE mobile radio networks according to open foreign sources shows the high actuality and relevance of this research area. This paper provides an analysis of the problem status, as well as, formalization of models for receiving and processing LTE reference signals for the layout of a user device built using software-configurable radio technology.

84-100 3516
Abstract

An increase in civilization risks and threats, and the development of information technologies actualize the questions of information security. The need for information security specialists is sharply increasing. This requires the solution of a number of managerial, organizational, substantive issues related to the organization and implementation of educational programs on information security including staffing issues. In such conditions the issues of teaching staff potential development, formation of the necessary up-to-date knowledge and competences of teachers for qualitative training of future specialists become urgent and in-demand. Mass retraining of teachers becomes the most important task in providing information security specialists for the digital economy. The methodological basis of the study is the provisions of education sociology reflecting the problems of matching the human resources needs for the digital economy, import substitution and national security with the quantity and quality of specialist training in higher educational institutions of vocational education.

The aim of the research is to identify employers' demands for information security specialists' competences for formation of professional educational programs and demands of teachers engaged in information training for actual knowledge, abilities, skills, which availability will ensure innovativeness in training of young specialists. The main hypothesis was that there is a mismatch between the demands of the external environment of higher education, above all, employers and the capabilities of the educational system, there is an urgent need to increase the capacity of teachers involved in training professionals in the field of information security. The reasons for this mismatch are (1) the dynamic development of technology, the emergence and increase of cyber threats and cyber incidents, (2) the presence of objective problems in the development of educational institutions staff capacity - the low proportion of young personnel, inadequate interaction between educational institutions and industrial and research centers, inadequate scientific and educational mobility of teaching staff for skills development.

The needs of employers and teachers have been identified on the basis of empirical research (autumn, 2021) conducted by the authors. 103 teachers and 109 employees of enterprises which carry out functions on maintenance of information security of organizations and enterprises (mainly SFD) participated in sociological research.

Results: requirements of employers and teachers on information security actual knowledge, abilities, actual programs of professional development and professional retraining were revealed. The practical significance of the results is that the study can reveal the problems of design and development of educational programs on information security and formulate recommendations for the design.

101-111 865
Abstract

А method of trilateration based on measuring the received signal’s level RSSI and calculating the distance from the subscriber's device to the visible access points is the most common locating mechanism in the Wi-Fi network. The application of this mechanism requires a complete understanding of the premises configuration, the number and material of obstacles separating the transmitting and receiving antennas which is not possible to obtain from RSSI. In this paper, the capabilities of the taxonomic decision-making method for predicting the location of mobile objects in an indoor Wi-Fi network in order to fill in the missing data on the parameters of the premises and obstacles separating access points and mobile objects are considered.



Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 1998-6920 (Print)