<?xml version="1.0" encoding="utf-8"?>
<journal>
  <titleid>9004</titleid>
  <issn>2071-8217</issn>
  <journalInfo lang="ENG">
    <title>Problems of information security. Computer systems</title>
  </journalInfo>
  <issue>
    <number>4</number>
    <altNumber> </altNumber>
    <dateUni>2023</dateUni>
    <pages>1-191</pages>
    <articles>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>9-18</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <scopusid>13103571000</scopusid>
              <orcid>0000-0002-0232-7248</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zegzhda</surname>
              <initials>Dmitry</initials>
              <email>zegzhda_dp@spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-1736-7178</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Anisimov</surname>
              <initials>Vladimir</initials>
              <email>an‑33@yandex.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0001-9665-0128</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Suprun </surname>
              <initials>Alexander</initials>
              <email>afs54@inbox.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
          <author num="004">
            <authorCodes>
              <orcid>0000-0002-6527-2352</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peoples’ Friendship University of Russia named after Patrice Lumumba</orgName>
              <surname>Anisimov</surname>
              <initials>Evgeny</initials>
              <email>anis.an‑33@yandex.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Substantiation of the rational composition of the information security system</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper discusses a methodological approach to constructing models and algorithms for decision support when justifying the rational composition of a system for ensuring information security of a corporate computer network. In this case, the problem under consideration is represented in the form of a discrete mathematical programming model. A special feature of the model is the ability to take into account a wide variety of destructive impacts on a computer network and methods of protecting it. The generality of the model is also ensured by taking into account the possible nonlinear nature of the function reflecting the specific goals of creating an information security system. To solve the problem, a generalized algorithm has been developed that takes into account the features of the model. The general nature of the requirements for the parameters of the model and algorithm allows, on their basis, to form a fairly wide range of decision support techniques when justifying the rational composition of the information security system for specific variants of corporate computer networks and the conditions of their functioning.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/tmd5-nzne-p23v</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>corporate computer network</keyword>
            <keyword>information security system</keyword>
            <keyword>system composition formation model</keyword>
            <keyword>algorithm</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.14.1/</furl>
          <file>2023_4-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>19-30</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-1345-1874</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Pavlenko</surname>
              <initials>Evgeny</initials>
              <email>pavlenko_eyu@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-1511-9971</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Polosukhin</surname>
              <initials>Nikita</initials>
              <email>polosukhin.ibks@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Analysis of cyber threat intelligence information exchange systems</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Offers an analysis of modern protocols and approaches in cyber threat intelligence. The classification of CTI information was given, also the area of applicability for each class was estimated. The classification of CTI protocols and standards was presented with the mapping to CTI levels. An assessment of applicability to describe each CTI level was addressed to each class of protocols and standards. The main conclusion is that further study of the available standards in this area will determine the necessary set of requirements to the process of CTI information sharing, which will allow to face threats more effectively and reduce potential risks.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/rt14-m8a5-5zxd</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information security threats</keyword>
            <keyword>cyber threat intelligence</keyword>
            <keyword>CTI level</keyword>
            <keyword>exchange protocols</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.14.2/</furl>
          <file>2023_4-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>31-41</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-6972-1768</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Krasnodar Higher Military School named after General of the Army S. M. Shtemenko</orgName>
              <surname>Chechin</surname>
              <initials>Ivan</initials>
              <email>chechin@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0009-0004-9048-8042</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Krasnodar Higher Military School named after General of the Army S. M. Shtemenko</orgName>
              <surname>Marinin</surname>
              <initials>Alexey</initials>
              <email>alieksiei.marinin.2001@mail.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0001-9448-2386</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Krasnodar Higher Military School named after General of the Army S. M. Shtemenko</orgName>
              <surname>Novikov</surname>
              <initials>Pavel</initials>
              <email>novikov.p.ark@yandex.ru</email>
            </individInfo>
          </author>
          <author num="004">
            <authorCodes>
              <orcid>0000-0002-0644-4353</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Krasnodar Higher Military School named after General of the Army S. M. Shtemenko</orgName>
              <surname>Dichenko</surname>
              <initials>Sergei</initials>
              <email>dichenko.sa@yandex.ru</email>
            </individInfo>
          </author>
          <author num="005">
            <authorCodes>
              <orcid>0000-0001-9665-2174</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Krasnodar Higher Military School named after General of the Army S. M. Shtemenko</orgName>
              <surname>Samoilenko</surname>
              <initials>Dmitry</initials>
              <email>19sam@mail.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Combinational coding of data taking into account the analysis of the value of the information contained</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">As a result of the analysis of known methods for ensuring data integrity, it was found that in conditions of continuous growth in the volume and value of information processed and stored in information automated systems for various purposes, the main disadvantage is the high redundancy of control information, leading to an increase in the load on the data warehouses of the systems in question and, as a consequence, a reduction in their resources. A method of ensuring data integrity based on combinational coding is considered, taking into account the analysis of the value of the protected information, and the results of its research related to the possibility of reducing the amount of introduced redundancy when using, in particular, Reed-Solomon codes are presented.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/mvrb-h5xa-xx1r</doi>
          <udk>519.718</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information protection</keyword>
            <keyword>data integrity</keyword>
            <keyword>data integrity monitoring and recovery</keyword>
            <keyword>memory capacity</keyword>
            <keyword>Reed-Solomon codes</keyword>
            <keyword>combination codes</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.14.3/</furl>
          <file>2023_4-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>42-47</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-5785-5160</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Omsk State Technical University</orgName>
              <surname>Belim</surname>
              <initials>Sergey</initials>
              <email>sbelim@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0009-0004-8456-8636</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Omsk State Technical University</orgName>
              <surname>Gorshkov</surname>
              <initials>Sergey</initials>
              <email>hench.sg@gmail.com</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Method of embedding hidden data in message stream with error-correcting coding</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The article proposes a model for steganographic embedding of data into a stream of messages using error-correcting coding. Embedded data is disguised as interference in the information channel. The inline message extraction is based on the error correcting code detection procedure for corrupted bits. The robustness of the scheme is based on the inability to obtain complete information about the embedding by the analyst. The model is universal and can be implemented in any network protocol that uses error-correcting codes.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/zdvp-46u8-hzu9</doi>
          <udk>004.056.5</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>network steganography</keyword>
            <keyword>error-correcting codes</keyword>
            <keyword>hidden information channels</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.14.4/</furl>
          <file>2023_4-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>48-60</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Mozhaisky Military Aerospace Academy</orgName>
              <surname>Andrushkevich</surname>
              <initials>Daria</initials>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>Mozhaisky Military Aerospace Academy</orgName>
              <surname>Andrushkevich</surname>
              <initials>Sergey</initials>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <orgName>Mozhaisky Military Aerospace Academy</orgName>
              <surname>Kryukov</surname>
              <initials>Roman</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">A method of responding to targeted attacks based on the mapping of information security events using indication signatures</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">A method of responding to targeted attacks is developed, which is based on the idea of detecting and responding to targeted attacks at the stage of their implementation. The adequacy of application of the developed method in practice is demonstrated.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/rk43-u13d-he2g</doi>
          <udk>004.021</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information security</keyword>
            <keyword>information security event</keyword>
            <keyword>information security incident</keyword>
            <keyword>information security monitoring</keyword>
            <keyword>computer attack</keyword>
            <keyword>SIEM-system</keyword>
            <keyword>correlation</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.14.5/</furl>
          <file>2023_4-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>61-71</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-5511-4000</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>MIREA – Russian Technological University</orgName>
              <surname>Eremeev</surname>
              <initials>Mihail</initials>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>MIREA – Russian Technological University</orgName>
              <surname>Zakharchuk</surname>
              <initials>Ivan</initials>
              <email>zaharchuk@mirea.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Risk assessment of the use of open source projects: a method for analyzing metrics of the development process</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The article proposes an approach to the analysis of open source projects for exposure to the risks of a sudden change in the nature of project development associated with external reasons of political or economic personal interest of individuals involved in the development. The aim of the work is an attempt to offer representative features that allow us to highlight the development bias in open source projects at early stages. For this purpose, groups of features are identified: community characteristics, characteristics of the development process and characteristics of the project code base.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/7umb-zgmf-2z8k</doi>
          <udk>004.056.5</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>software composition analysis</keyword>
            <keyword>open-source</keyword>
            <keyword>software development processes evaluation</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.14.6/</furl>
          <file>2023_4-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>72-83</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Volkovskiy</surname>
              <initials>Maxim</initials>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-2009-5460</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Ovasapyan</surname>
              <initials>Tigran</initials>
              <email>otd@ibks.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Makarov</surname>
              <initials>Alexander</initials>
              <email>makarov_as@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Malware detection using deep neural networks</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper proposes a method for detecting malicious executable files by analyzing disassembled code. This method is based on static analysis of assembler instructions of executable files using a special neural network model, the architecture of which is also presented in this paper. In addition, through several different metrics, the effectiveness of the method has been demonstrated, showing a significant reduction of the second-order error compared to other state-of-the-art methods. The results obtained can be used as a basis for designing static malware analysis systems.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/zduz-gzb1-4fmf</doi>
          <udk>004.56</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>detection of malicious software</keyword>
            <keyword>static analysis</keyword>
            <keyword>machine learning</keyword>
            <keyword>deep neural networks</keyword>
            <keyword>disassembled code analysis</keyword>
            <keyword>transformer</keyword>
            <keyword>BERT</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.14.7/</furl>
          <file>2023_4-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>84-94</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-6419-0072</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>St. Petersburg State University of Aerospace Instrumentation</orgName>
              <surname>Tatarnikova</surname>
              <initials>Tatiana</initials>
              <email>Tm-tatarn@yandex.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <scopusid>57200960264</scopusid>
              <orcid>0000-0001-6289-3295</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Russian State Hydrometeorological University</orgName>
              <surname>Sikarev</surname>
              <initials>Igor</initials>
              <email>sikarev@yandex.ru</email>
              <address>Russia, 192007, St. Petersburg, Voronezhskaya str., 79</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Attack detection by artificial neural networks</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The description of the developed neural network attack detection algorithm is given, the peculiarity of which is the possibility of launching two parallel processes: searching for the optimal model of an artificial neural network and normalizing the training sample data. It is shown that the choice of the artificial neural network architecture is carried out taking into account the loss function for a limited set of attack classes. The use of libraries (frameworks) TensorFlow and Keras Tuner for the software implementation of the attack detection algorithm is shown. The description of the experiment on choosing the architecture of the neural network and its training is given. The accuracy obtained in experiments reaches 94-98 % for different classes of attacks.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/u9zt-prru-97em</doi>
          <udk>004.032.26</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>attack detection system</keyword>
            <keyword>artificial neural network</keyword>
            <keyword>classification</keyword>
            <keyword>dataset</keyword>
            <keyword>architecture optimization</keyword>
            <keyword>training</keyword>
            <keyword>loss function</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.14.8/</furl>
          <file>2023_4-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>UNK</artType>
        <langPubl>RUS</langPubl>
        <pages>95-104</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0006-4281-1321</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>ITMO University</orgName>
              <surname>Kovalev</surname>
              <initials>Anton</initials>
              <email>supernaruto21@yandex.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>ITMO University</orgName>
              <surname>Fedorov</surname>
              <initials>Ivan</initials>
              <email>ivanfedorov@itmo.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Method for ensuring data integrity in edge computing networks based on blockchain technology</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">With the rapid development of edge computing and the increasing number of connected devices, the article addresses the pressing issue of data integrity. It examines the current problem and focuses on the utilization of blockchain technology, which offers unique opportunities for addressing this challenge. The article provides a brief overview of existing methods and proposes a method for ensuring integrity based on blockchain technology. It suggests utilizing the Hot Stuff consensus algorithm in the presence of multiple active nodes, ensuring efficient operation and system scalability. Special attention is given to the utilization of a secondary blockchain based on Ethereum to enhance security and establish checkpoints in large blockchain networks. This facilitates the work of edge servers and enables users to verify data integrity on-demand using smart contracts. New approaches to ensuring data integrity and leveraging blockchain technology also can be used in different implementations of Internet of things.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/rpdb-gfht-t891</doi>
          <udk>004</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>blockchain</keyword>
            <keyword>edge computing</keyword>
            <keyword>data integrity</keyword>
            <keyword>security</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.14.9/</furl>
          <file>2023_4-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>105-115</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0002-7009-2265</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Anoshkin</surname>
              <initials>Ilya </initials>
              <email>ilya.anoschkin@outlook.com</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0009-0001-1385-8028</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Orel</surname>
              <initials>Eugeniy</initials>
              <email>orel_em@ibks.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Moskvin</surname>
              <initials>Dmitry</initials>
              <email>moskvin_da@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Decentralized messaging systems threat model</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper presents developed model of information security threats for messaging systems with decentralized node structure. Information flows are considered, the diagram of states information in the process of interaction within the decentralized messaging system is developed. The presented security threats correspond to the FSTEC BDU classification and are also categorized by layers of the Open Systems Interoperability Reference Model. For each of the above threats, the ways of their realization were consideredand the possible source of the threat was described.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/fp8h-93nu-t75k</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>threat model</keyword>
            <keyword>decentralized systems</keyword>
            <keyword>information flows</keyword>
            <keyword>state diagram</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.14.10/</furl>
          <file>2023_4-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>116-121</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-5494-7142</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Saint Petersburg State University of Aerospace Instrumentation</orgName>
              <surname>Khutsaeva</surname>
              <initials>Altana</initials>
              <email>afkhutsaeva@itmo.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-5544-2434</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Saint Petersburg State University of Aerospace Instrumentation</orgName>
              <surname>Davydov</surname>
              <initials>Vadim</initials>
              <email>vvdavydov@guap.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0002-0924-6221</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Saint Petersburg State University of Aerospace Instrumentation</orgName>
              <surname>Bezzateev</surname>
              <initials>Sergey</initials>
              <email>sergey.bezzateev@gmail.com</email>
              <address>Russia, 190000, St. Petersburg, Bolshaya Morskaya str., 67, liter A</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Oblivious signature scheme based on isogenies of supersingular elliptic curves</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The proposed oblivious signature scheme 1-out-of-n messages based on the difficulty of finding isogenies between supersingular elliptic curves is a variety of Schnorr’s signature. The signature time of 10 messages takes 42,2 seconds. The signature scheme is aimed at solving problems related to maintaining privacy on the Internet</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/2m49-vg37-99pt</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>digital signature</keyword>
            <keyword>oblivious signature scheme</keyword>
            <keyword>isogeny based cryptography</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.14.11/</furl>
          <file>2023_4-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>122-132</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-9659-1244</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Poltavtseva</surname>
              <initials>Maria </initials>
              <email>potavtseva@ibks.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-9732-0099</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Kalinin</surname>
              <initials>Maxim</initials>
              <email>max@ibks.spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <scopusid>13103571000</scopusid>
              <orcid>0000-0002-0232-7248</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zegzhda</surname>
              <initials>Dmitry</initials>
              <email>zegzhda_dp@spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Data modeling in information security of polystorages</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper is devoted to the problem of modeling data and processes in big data systems including polystorages and other heterogeneous components of information processing. At present, approaches to harmonization of polystorages data models are proposed in this research area. Various proposed methods are considered in this paper, but these solutions are not suitable for use in information security problems directly. The authors formulate requirements for modeling of the considered objects for solving security problems and formulate a level approach to modeling based on the general concept of poly-storage security within the framework of the consistency approach. The paper presents an original systematization of data models of modern poly-storages and DBMS in their composition, taking into account the used mathematical apparatus. A new methodology of three-level modeling of data and processes in the object of protection is proposed, the bases of models for all levels of data representation are formulated. The results of the work lay the foundation for the complex representation of data and processes in solving the problems of security and analyzing the security of big data systems.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/x468-hp82-adav</doi>
          <udk>004.652</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information security</keyword>
            <keyword>Big Data</keyword>
            <keyword>heterogeneous data processing systems</keyword>
            <keyword>set theory</keyword>
            <keyword>graph theory</keyword>
            <keyword>category theory</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.14.12/</furl>
          <file>2023_4-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>133-144</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-2701-6972</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Ryazan State University named for S. A. Yesenin</orgName>
              <surname>Ruchkin</surname>
              <initials>Vladimir</initials>
              <email>v.ruchkin@365.rsu.edu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0001-6062-1966</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Ryazan State University named for S. A. Yesenin</orgName>
              <surname>Fulin</surname>
              <initials>Vladimir</initials>
              <email>v.fulin@365.rsu.edu.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0001-6062-1966</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Ryazan State Agrotechnological University named after P. A. Kostychev</orgName>
              <surname>Ruchkina</surname>
              <initials>Ekaterina</initials>
            </individInfo>
          </author>
          <author num="004">
            <individInfo lang="ENG">
              <orgName>CJSC “Ryazanpribor”</orgName>
              <surname>Grigorenko</surname>
              <initials>Dmitry</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Cluster analysis of a collective of algorithms for multicore neural network automates and robots on chip</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Within the framework of increasing the efficiency of new spheres and directions of development of society, the state pays attention to robotization on a modern domestic basis in order to implement import substitution. One of the urgent problems is the combination of the concepts of a collective of algorithms, a collective of automata, a collective of robots and artificial intelligence. A special role is played by the possibilities of cybernetic research of multicore neural network automata in order to build more complex automata, robots and the behavior of a team of robots based on them. The purpose of this article is to demonstrate the possibilities of a set-theoretic approach of a cybernetic approach to artificial, complex natural objects and systems on this basis and to create a conceptual model for the selection and joint simultaneous design of hardware and software of neural network automata based on a unified study of the processes of parallelization of a collective of algorithms in the form of explicit and implicit clustering. As a result, the authors analyze, show and propose variants of the collective structures of algorithms for ensuring cybersecurity and protection against threats in the form of a hierarchy of security practices. The method of analysis and selection of the best architecture of a multicore neural network collective of an automaton and a robot collective based on automata implemented on a chip is proposed. An expert system based on VLSI 1879VM8YA (NM6408) with a developed user interface is being implemented.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/ht78-3683-mp71</doi>
          <udk>004.032</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>multiple-theoretic approach</keyword>
            <keyword>team of algorithms</keyword>
            <keyword>cybernetic research</keyword>
            <keyword>team of robots</keyword>
            <keyword>conceptual model</keyword>
            <keyword>hardware and software design</keyword>
            <keyword>explicit and implicit clustering</keyword>
            <keyword>cybersecurity</keyword>
            <keyword>threat protection</keyword>
            <keyword>expert system</keyword>
            <keyword>NM Card tool module</keyword>
            <keyword>user interfa</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.14.13/</furl>
          <file>2023_4-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>145-155</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-3830-1840</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Yugai</surname>
              <initials>Pavel </initials>
              <email>yugaj_pe@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Moskvin</surname>
              <initials>Dmitry</initials>
              <email>moskvin_da@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Using machine learning algorithms and Honeypot system to detect adversarial attacks on intrusion detection systems</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper presents adversarial attacks on machine learning algorithms in intrusion detection systems. Some examples of existing intrusion detection systems are examined. Existing approaches to detecting these attacks are considered. Requirements have been formed to improve the stability of machine learning algorithms. Two approaches are proposed for detecting adversarial attacks on machine learning algorithms, the first of which is based on a multi-class classifier and a honeypot system, and the second approach uses a combination of a multi-class and a binary classifier. The proposed approaches can be used in further research aimed at detecting adversarial attacks on machine learning algorithms.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/xkgk-zgmm-d7nh</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>intrusion detection system</keyword>
            <keyword>machine learning</keyword>
            <keyword>adversarial attack</keyword>
            <keyword>honeypot system</keyword>
            <keyword>evasion attack</keyword>
            <keyword>poisoning attack</keyword>
            <keyword>model extraction attack</keyword>
            <keyword>binary classifier</keyword>
            <keyword>multi-class classifier</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.14.14/</furl>
          <file>2023_4-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>156-190</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-6562-9008</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Ivannikov Institute for System Programming of the Russian Academy of Sciences</orgName>
              <surname>Getman</surname>
              <initials>Aleksandr</initials>
              <email>ever@ispras.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-0284-690X</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>The Academy of Federal Security Guard Service of the Russian Federation</orgName>
              <surname>Goryunov</surname>
              <initials>Maxim</initials>
              <email>max.gor@mail.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0001-9557-3765</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>The Academy of Federal Security Guard Service of the Russian Federation</orgName>
              <surname>Matskevich</surname>
              <initials>Andrey</initials>
              <email>mag3d.78@gmail.com</email>
            </individInfo>
          </author>
          <author num="004">
            <authorCodes>
              <orcid>0000-0003-4524-655X</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>The Academy of Federal Security Guard Service of the Russian Federation</orgName>
              <surname>Rybolovlev</surname>
              <initials>Dmitry</initials>
              <email>dmitrij-rybolovlev@yandex.ru</email>
            </individInfo>
          </author>
          <author num="005">
            <authorCodes>
              <orcid>0000-0001-5965-4664</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <surname>Nikolskaya</surname>
              <initials>Anastasiya</initials>
              <email>nikolskaya.a.g@yandex.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Adversarial attacks against a machine learning based intrusion detection system</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper analyzes relevant sources in the field of implementing modern adversarial attacks against a network intrusion detection system with an analyzer based on machine learning methods. The process of building such a system is summarized; common errors made by developers at each stage, which can be exploited by attackers when implementing various attacks, are indicated. A classification of adversarial attacks against machine learning models is given, and the most well-known adversarial attacks against neural networks and ensembles of decision trees are analyzed. The existing limitations in the use of adversarial attacks against intrusion detection models of the “random forest” type are noted; poisoning and evasion attacks against the object of study are implemented in practice. Possible defense strategies are considered, and the effectiveness of the most common method, adversarial learning, is experimentally assessed. It is concluded that there are no guarantees to ensure the robustness of the used machine learning model to adversarial attacks and there is a need to search for protective strategies that provide such guarantees.</abstract>
        </abstracts>
        <codes>
          <doi>10.48612/jisp/eatr-5pxb-akt8</doi>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>network intrusion detection system</keyword>
            <keyword>adversarial attack</keyword>
            <keyword>machine learning</keyword>
            <keyword>network traffic</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2023.14.15/</furl>
          <file>2023_4-5-6.pdf</file>
        </files>
      </article>
    </articles>
  </issue>
</journal>
