<?xml version="1.0" encoding="utf-8"?>
<journal>
  <titleid>9004</titleid>
  <issn>2071-8217</issn>
  <journalInfo lang="ENG">
    <title>Problems of information security. Computer systems</title>
  </journalInfo>
  <issue>
    <number>2</number>
    <altNumber> </altNumber>
    <dateUni>2021</dateUni>
    <pages>1-152</pages>
    <articles>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>9-20</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Stasyev</surname>
              <initials>V.</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Integrity control of KVM-based virtual machines components on OpenStack platform</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">To mitigate the risks, it is necessary to create additional systems for monitoring the integrity of the OpenStack-based virtual infrastructure. The work examines the architecture of OpenStack, a study of the life cycle of a virtual machine is carried out to determine the OpenStack components (and their parts) for which it is necessary to ensure integrity control.</abstract>
        </abstracts>
        <codes>
          <udk>004.056.2</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>virtualization</keyword>
            <keyword>hypervisor</keyword>
            <keyword>openstack</keyword>
            <keyword>virtual machine</keyword>
            <keyword>integrity</keyword>
            <keyword>integrity control</keyword>
            <keyword>components of virtual machines</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.3.1/</furl>
          <file>2021_2-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>21-40</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Ivanov</surname>
              <initials>M.</initials>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-1345-1874</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Pavlenko</surname>
              <initials>Evgeny</initials>
              <email>pavlenko_eyu@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Anomaly detection in cyber-physical systems using graph neural networks</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper presents a security study of networks with dynamic topology. As a solution to the problem of attack detection, an approach to attack detection in networks with dynamic topology based on adaptive neuro-fuzzy inference system was developed. A software layout of the system that implements the proposed approach has been developed and its effectiveness has been evaluated using various metrics. Experimental results confirmed the validity and effectiveness of the developed approach for attack detection in networks with dynamic topology</abstract>
        </abstracts>
        <codes>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>dynamic topology networks</keyword>
            <keyword>attack detection</keyword>
            <keyword>network security</keyword>
            <keyword>machine learning</keyword>
            <keyword>fuzzy logic</keyword>
            <keyword>neural networks</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.3.2/</furl>
          <file>2021_2-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>41-47</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Smirnov</surname>
              <initials>S.</initials>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-5511-4000</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>MIREA – Russian Technological University</orgName>
              <surname>Eremeev</surname>
              <initials>Mihail</initials>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <surname>Pribylov</surname>
              <initials>I.</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Approach to detecting malicious actions of attacker based on autoregression model in investigation of cyber incident</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper presents an approach to detecting malicious actions of an attacker based on the analysis of the Security.evtx event logs of the Windows operating system when investigating an information security incident. The authors experimentally tested the use of the autoregression model (the Change Finder algorithm), on the basis of which malicious activity of domain users in the corporate network was detected</abstract>
        </abstracts>
        <codes>
          <udk>004.85</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information security incident</keyword>
            <keyword>APT attack</keyword>
            <keyword>lateral movement</keyword>
            <keyword>security log security.evtx</keyword>
            <keyword>change finder algorithm</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.3.3/</furl>
          <file>2021_2-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>48-56</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Kulikov</surname>
              <initials>D.</initials>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-9899-2778</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Platonov</surname>
              <initials>Vladimir</initials>
              <email>plato@ibks.spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Adversarial attacks on intrusion detection systems using LSTM classifier</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper discusses adversarial attacks on machine learning models and their classification. Methods for assessing the resistance of an LSTM classifier to adversarial attacks are investigated. JSMA and FGSM attacks, chosen due to the portability of adversarial examples between machine learning models, are discussed in detail. An attack of “poisoning” of the LSTM classifier is proposed. Methods of protection against the considered adversarial attacks are formulated</abstract>
        </abstracts>
        <codes>
          <udk>004.032.26</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>adversarial attack</keyword>
            <keyword>intrusion detection system</keyword>
            <keyword>neural network</keyword>
            <keyword>LSTM</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.3.4/</furl>
          <file>2021_2-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>57-64</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zavadskii</surname>
              <initials>Evgeniy </initials>
              <email>zavadskij_ev@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0001-8206-2915</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Ivanov</surname>
              <initials>Denis </initials>
              <email>ivanov@ibks.spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Implementation of honeypot systems based on potential attack graph</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper proposes an implementation of Honeypot system that uses dynamic resource management method based on potential attacks graph to enable the deployment of a virtual network infrastructure of any scale. Its resource consumption with a traditional Honeypot system is compared</abstract>
        </abstracts>
        <codes>
          <udk>004.94</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>network infrastructure</keyword>
            <keyword>hybrid honeypot-system</keyword>
            <keyword>potential attack graph</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.3.5/</furl>
          <file>2021_2-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>65-73</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Danilov</surname>
              <initials>V.</initials>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>JSC Russian Space Systems</orgName>
              <surname>Ovcharov</surname>
              <initials>Vladimir</initials>
              <email>eo475944@gmail.com</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Security threat model of network domain name service when implementing attacking scenarios</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper substantiates a threat model for implementing attacking scenarios on the Domain Name System (DNS) network service, taking into account current vulnerabilities in order to develop measures to ensure information security of a controlled information and telecommunications network (ITCS), namely, timely response to computer information security incidents (IS). The data obtained allows us to more fully describe the profiles of network objects that use the DNS service to identify the states of the monitored infrastructure. The use of this model can expand the capabilities of tools for detecting and preventing intruder attack scenarios</abstract>
        </abstracts>
        <codes>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>DNS server</keyword>
            <keyword>DNS query</keyword>
            <keyword>attacking scenarios</keyword>
            <keyword>botnet</keyword>
            <keyword>domain name resolution</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.3.6/</furl>
          <file>2021_2-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>74-81</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0008-4442-5365</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Kubrin</surname>
              <initials>Georgiy</initials>
              <email>kubrin@ibks.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0001-8206-2915</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Ivanov</surname>
              <initials>Denis </initials>
              <email>ivanov@ibks.spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Development of phishing site classificators based on dynamicaly updated dataset</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper describes a method of phishing site classification development based on dynamically updated dataset. A prototype of a system for automating model development and modification is described. A classificatory developed using the proposed method is described</abstract>
        </abstracts>
        <codes>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>phishing site detection</keyword>
            <keyword>machine learning</keyword>
            <keyword>web-page feature selection</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.3.7/</furl>
          <file>2021_2-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>82-88</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-7485-4848</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Aleksandrova </surname>
              <initials>Elena</initials>
              <email>aleksandrova_eb@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <surname>Oblogina</surname>
              <initials>A.</initials>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <surname>Shkorkina</surname>
              <initials>E.</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Authentication of intelligent electronic devices in IoT network with the edge computing architecture</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">An authentication protocol for Internet of Things networks based on the edge computing architecture is proposed. The protocol makes it possible to reduce the computational load on resource-constrained devices, while ensuring high resistance to attacks along different vectors and an acceptable execution speed for such networks</abstract>
        </abstracts>
        <codes>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Internet of Things</keyword>
            <keyword>authentication</keyword>
            <keyword>edge computing</keyword>
            <keyword>resource-constrained devices</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.3.8/</furl>
          <file>2021_2-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>89-96</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Kustov</surname>
              <initials>V.</initials>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <surname>Krasnov</surname>
              <initials>A.</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Discrete chaotic transformations of hidden messages to disguise them as noise in steganography problems</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper considers the problem of masking a hidden message in HUGO stegosystems under natural noise in the communication channel using discrete chaotic Arnold cat map and Baker map, which are iterative reversible discrete transformations in highly undetectable HUGO stegosystems. To estimate the level of chaotic state of a hidden message represented by a digital still image, the authors introduce the concept of the chaotic coefficient, which is a numerical indicator of the entropy of the probability of disordered pixels. The authors propose a method for determining the maximum value of the chaotic coefficient corresponding to the maximum chaotic state of the hidden image</abstract>
        </abstracts>
        <codes>
          <udk>519.7</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>chaotic transformation</keyword>
            <keyword>entropy</keyword>
            <keyword>Arnold cat map</keyword>
            <keyword>baker map</keyword>
            <keyword>HUGO stegosystem</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.3.9/</furl>
          <file>2021_2-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>97-103</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-0644-4353</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Krasnodar Higher Military School named after General of the Army S. M. Shtemenko</orgName>
              <surname>Dichenko</surname>
              <initials>Sergei</initials>
              <email>dichenko.sa@yandex.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Multi-dimensional data integrity control model</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Multi-dimensional data storage systems designed for storing large amounts of information and functioning under destructive influences are considered. A model for controlling the integrity of multi-dimensional data arrays based on Pascal’s cryptographic pyramid is presented</abstract>
        </abstracts>
        <codes>
          <udk>519.718</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information protection</keyword>
            <keyword>control of the integrity of multi-dimensional data arrays</keyword>
            <keyword>hash function</keyword>
            <keyword>Pascal’s pyramid</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.3.10/</furl>
          <file>2021_2-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>104-108</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-6419-0072</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>St. Petersburg State University of Aerospace Instrumentation</orgName>
              <surname>Tatarnikova</surname>
              <initials>Tatiana</initials>
              <email>Tm-tatarn@yandex.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <surname>Verevkin</surname>
              <initials>S.</initials>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <surname>Kraeva</surname>
              <initials>E.</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Protection against HID attacks</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper examines the relevance of HID attacks in order to gain access to protected information resources or take control over hardware and software and hardware as part of an automated workplace or peripheral equipment. Presented are devices for implementing devices for carrying out HID attacks in order to demonstrate their capabilities. Based on the results of considering the currently existing hardware and software implementations of HID devices, a comprehensive method proposed for ensuring the security of information systems and individual devices from the considered type of attacks</abstract>
        </abstracts>
        <codes>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>human interface device</keyword>
            <keyword>input-output device emulation</keyword>
            <keyword>information security</keyword>
            <keyword>attack</keyword>
            <keyword>malicious code</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.3.11/</furl>
          <file>2021_2-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>109-117</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>ZEGZHDA</surname>
              <initials>Peter</initials>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <scopusid>13103571000</scopusid>
              <orcid>0000-0002-0232-7248</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zegzhda</surname>
              <initials>Dmitry</initials>
              <email>zegzhda_dp@spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0003-1736-7178</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Anisimov</surname>
              <initials>Vladimir</initials>
              <email>an‑33@yandex.ru</email>
            </individInfo>
          </author>
          <author num="004">
            <authorCodes>
              <orcid>0000-0002-6527-2352</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peoples’ Friendship University of Russia named after Patrice Lumumba</orgName>
              <surname>Anisimov</surname>
              <initials>Evgeny</initials>
              <email>anis.an‑33@yandex.ru</email>
            </individInfo>
          </author>
          <author num="005">
            <individInfo lang="ENG">
              <surname>Saurenko</surname>
              <initials>Tatyana</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Model for forming development program of organization’s information security system</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The urgent need for the purposeful development of information security systems in the context of the intensive introduction of digital technologies in the economy and social sphere determines the relevance of improving the methodological apparatus for substantiating appropriate decisions in planning and managing this process. The purpose of this article is to develop a mathematical model and an algorithm for supporting decision-making in the formation of a program for the development of an organization's information security system. At the same time, a generalized structure of the model and an algorithm for solving the problem of forming the optimal version of the program are proposed. Minimization of financial costs is, used as an optimality criterion in the model. Uncertainty inherent in the development of information security systems is, taken into account by setting the intervals of possible costs during the implementation of projects included in the program. To solve the problem, an iterative algorithm is, proposed for the sequential formation of an appropriate version of the program</abstract>
        </abstracts>
        <codes>
          <udk>519.854</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>information security system</keyword>
            <keyword>optimization of the system development program</keyword>
            <keyword>model</keyword>
            <keyword>algorithm</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.3.12/</furl>
          <file>2021_2-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>118-126</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0004-1271-709X</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Ognev</surname>
              <initials>Roman </initials>
              <email>ognev_ra@spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0009-0002-7321-7430</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zhukovskii </surname>
              <initials>Evgeniy </initials>
              <email>bugaev.va@edu.spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <scopusid>13103571000</scopusid>
              <orcid>0000-0002-0232-7248</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Zegzhda</surname>
              <initials>Dmitry</initials>
              <email>zegzhda_dp@spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Detection malware based on clusterization of performed actions</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The application of classification algorithms for detecting malicious software is investigated using classes of actions obtained as a result of clustering based on the analysis of sequences of calls to WinAPI-functions as features. The application of the following classification algorithms is considered: gradient boosting, adaptive boosting, linear regression, and the forest case. The quality assessment was carried out using the accuracy metrics, F1-measure, the area under the ROC curve, as well as taking into account the training time</abstract>
        </abstracts>
        <codes>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>classification</keyword>
            <keyword>clustering</keyword>
            <keyword>malicious software</keyword>
            <keyword>malicious behavior</keyword>
            <keyword>machine learning</keyword>
            <keyword>behavioral analysis</keyword>
            <keyword>dynamic analysis</keyword>
            <keyword>computer security</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.3.13/</furl>
          <file>2021_2-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>127-134</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-1798-8257</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Russian State Hydrometeorological University</orgName>
              <surname>Sukhoparov</surname>
              <initials>Mikhail</initials>
              <email>mail@sukhoparovm.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0001-6753-2181</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Saint Petersburg Federal Research Center of Russian Science Academy</orgName>
              <surname>Lebedev</surname>
              <initials>Ilya</initials>
              <email>isl_box@mail.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">IoT devices analysis using neural networks ensemble trained on unbalanced sample</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">An approach to identifying anomalous situations in network segments of the Internet of Things based on an ensemble of classifiers is considered. Classifying algorithms are tuned for different types of events and anomalies using training samples of different composition. The use of an ensemble of algorithms makes it possible to increase the accuracy of the results due to collective voting. The experiment performed using three neural networks identical in architecture is described. The results of the assessment were obtained both for each classifier separately and with the use of an ensemble</abstract>
        </abstracts>
        <codes>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>ensemble of classifiers</keyword>
            <keyword>anomaly detection</keyword>
            <keyword>parasitic traffic</keyword>
            <keyword>information security</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.3.14/</furl>
          <file>2021_2-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>135-144</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-2009-5460</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Ovasapyan</surname>
              <initials>Tigran</initials>
              <email>otd@ibks.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <surname>Nikulkin</surname>
              <initials>V.</initials>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Moskvin</surname>
              <initials>Dmitry</initials>
              <email>moskvin_da@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Application of Honeypot technology with adaptive behavior for IoT networks</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper discusses the application of Honeypot technology with adaptive behavior for tracking and analyzing attacks on the Internet of Things networks. The analysis of existing adaptive systems is carried out and the optimal one for building a honeypot is determined. It is proposed to use the Markov decision process as a mathematical apparatus for the adaptive Honeypot system. The resulting honeypot can be used to track XMPP and SSH attacks</abstract>
        </abstracts>
        <codes>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>honeypot</keyword>
            <keyword>Internet of Things</keyword>
            <keyword>adaptive behavior</keyword>
            <keyword>Markov decision process (MDP)</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.3.15/</furl>
          <file>2021_2-5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>145-150</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-2141-6780</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great Saint-Petersburg Polytechnic University</orgName>
              <surname>Shtyrkina</surname>
              <initials>Anna</initials>
              <email>anna_sh@ibks.spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Cyber-physical systems sustainability based on graph theory</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper explores an approach to ensuring the sustainability of cyber-physical systems (CPS) based on graph theory. The existing approaches of ensuring the security of CPS are considered. To formalize the problem it is proposed to model the behavior of CPS based on graph theory. Representation of CPS as a graph allows to take into account the structural characteristics of the system under study that change as a result of attacking influences, as well as to produce compensating actions aimed at maintaining the sustainability of functioning</abstract>
        </abstracts>
        <codes>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>sustainability of functioning</keyword>
            <keyword>cyber-sustainability</keyword>
            <keyword>cyber-physical system</keyword>
            <keyword>information security</keyword>
            <keyword>graph theory</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.3.16/</furl>
          <file>2021_2-5-6.pdf</file>
        </files>
      </article>
    </articles>
  </issue>
</journal>
