Malikov A.orcid-id
Adaptation of the Diagnostic Artificial Neural Network Structure When New Training Examples AppearЖурнала ТУЗС - Том 6, №4, 2020

  • Abstract:In this paper we can see that identified computer incidents are subject for diagnostics, during which the characteristics of information security violations are clarified (purpose, causes, consequences, etc.). To diagnose computer incidents, we can use methods of automation while collection and processing the events that occur as a result of the implementation of scenarios for information security violations. Artificial neural networks can be used to solve the classification problem of assigning diagnostic data set (information image of a computer incident) to one of the possible values of the violation characteristic. The purpose of this work is to adapt the structure of an artificial neural network that allows the accuracy diagnostics of computer incidents when new training examples appear.
  • Keywords: diagnostics, computer incident, multi-layer perceptron, autoencoder, security violation characteristic.


Makarenkov V. orcid-id
A Functioning Model of a Dual-Band Radar System That Classifies Targets under the Influence of Interference and NoiseЖурнала ТУЗС - Том 6, №4, 2020

  • Abstract:There is proposed a model of a signal received from a complex target formed by a set of rapidly fluctuating point reflectors. Signal reception is carried out against the background of narrow-broadband active noise interference and white Gaussian noise. A functioning model of a dual-band radar system is proposed, in which the problem of classifying rapidly fluctuating point reflectors as a part of complex target against the background of interference and noise is solved. The article examines the issue of assessing the quality of this model, as well as meeting the requirements for ensuring a given value of the probability of correct classification of goals.
  • Keywords: dual-band radar system, complex target, narrowband-wideband active noise interference, task of classification targets, assessment of the probability of a correct classification of targets.


Maximova E.orcid-id
Cognitive Modeling of Destructive Malicious Impacts on Critical Information Infrastructure ObjectsЖурнала ТУЗС - Том 6, №4, 2020

  • Abstract: The security of a subject of critical information infrastructure (CII) is one of the key issues of its life support. The current approach (legal and regulatory) regulates solutions of this issue without taking into account the influence of the violator, which can have a destructive effect on the SCII. This, in our opinion, leads to significant errors in the analysis of the information security of the CII, therefore, reduces the effectiveness of the information protection means declared information security tools for CII objects. The purpose of this work is to develop a model of an information security (IS) intruder, presented in a formalized form using the "violator’s potential" parameter in the space of their implementation of destructive effects on the objects of the CII. The proposed model for assessing the capabilities of the offender to implement destructive influences on the CII subject as a set of objects is implemented in the developed cognitive map "Assessment of the IB of the CII Subject" for dynamic changes in the parameters of the "Malicious actions on the CII object" vertex.
  • Keywords: violator, subject, critical information infrastructure, category, destructive effects, model, cognitive model.


Shestakov A.orcid-id, Biliatdinov K.
Creation and Implementation of Information Reserves in Big Technical Systems MaintenanceЖурнала ТУЗС - Том 6, №4, 2020

  • Abstract: The introduction and use of modern methods of proactive management of complex systems in decision support systems based on the collection and processing of heterogeneous data about the system and the generated precedents of events and corrective actions requires the search for new system-technical solutions for the data collection, storage and preliminary analysis, taking into account the control conditions and the characteristics of complex systems. A special feature of complex systems, such as large technical systems of industrial facilities, informatization and communication, transport, etc., is the combination of improvement stages (modernization of components) and development of systems (introduction of fundamentally new system engineering solutions) during their regular operation. In this regard, it is quite relevant to study the model for maintaining large technical systems and ways to create databases based on information reserves for decision support of proactive management. For the first time, system engineering solutions for the implementation of the original model and method based on a set of computer programs and the results of experimental tests are presented.
  • Keywords: large technical systems, information reserves, model, method of forming information reserves.


Korelov S., Petrov A., Rotkov L., Gorbunov A.
Preprocessing of the Emails in the Spam Detection Task.Журнала ТУЗС - Том 6, №4, 2020

  • Abstract: The functioning of almost any organization to one degree or another depends on how reliably its information resources are protected from various information security threats, one of which is spam. At the same time there have been many attempts to solve the problem of its detection once and for all. Research is ongoing in this subject area constantly. Based on its results, various approaches are proposed and implemented in practice. The authors previously proposed a model of e-mails that takes into account the content of e-mails, which often changes depending on the tasks performed by users and their changing information needs. This article discusses the issue of preprocessing e-mail texts in the problem of spam detection using a model of e-mails obtained on the basis of a genetic approach to the formation of mathematical models of texts, which has proven itself for solving various problems.
  • Keywords: information security, spam, detection, electronic letter model, genetic approach, genetic model, email, e mail messages, electronic letters, text preprocessing.