<?xml version="1.0" encoding="utf-8"?>
<journal>
  <titleid>9004</titleid>
  <issn>2071-8217</issn>
  <journalInfo lang="ENG">
    <title>Problems of information security. Computer systems</title>
  </journalInfo>
  <issue>
    <number>3</number>
    <altNumber> </altNumber>
    <dateUni>2021</dateUni>
    <pages>1-158</pages>
    <articles>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>9-15</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Abitov</surname>
              <initials>Roman</initials>
              <email>abitov_roman@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-1345-1874</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Pavlenko</surname>
              <initials>Evgeny</initials>
              <email>pavlenko_eyu@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Identification of vulnerabilities in software for ARM processors using symbological execution</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper discusses the prospects for using symbolic execution as a basis for identifying vulnerabilities in ARM processors software. An analysis of the shortcomings of the existing methods of binary analysis in comparison with the considered method is given. A method for identifying potentially vulnerable functions or procedures in software for ARM processors is proposed. A method is proposed for checking the reachability of the found potential vulnerabilities, taking into account a large number of conditional jumps, logical branches and input data streams embedded in the software. A method for checking the exploitation of found vulnerabilities based on the analysis of registers and their contents is proposed.</abstract>
        </abstracts>
        <codes>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Software Cybersecurity</keyword>
            <keyword>Binary Analysis</keyword>
            <keyword>Symbolic Execution</keyword>
            <keyword>Symbolic Modeling</keyword>
            <keyword>Symbolic Computation</keyword>
            <keyword>Vulnerability Search Methods</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.4.1/</furl>
          <file>2021_3_5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>16-26</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-6501-2008</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>The Academy of Federal Security Guard Service of the Russian Federation</orgName>
              <surname>Kozachok</surname>
              <initials>Alexander</initials>
              <email>totrin@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>Academy of the FSO of Russia</orgName>
              <surname>Kozachok</surname>
              <initials>Vasily</initials>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0002-7231-5728</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>MIREA – Russian Technological University</orgName>
              <surname>Spirin</surname>
              <initials>Andrey </initials>
              <email>spirin_aa@mirea.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Encrypted files detection algorithm</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Since 2010 there is an increase in leaks of confidential information due to the fault of an internal violator, despite the availability of a wide range of means for detecting and preventing information leaks. One of the possible channels leakage is transmission of information in encrypted form, since existing leak detection tools use signature methods of data classification. The article presents an algorithm for detecting encrypted data based on a statistical model of pseudorandom sequences. The proposed algorithm allows classifying encrypted and compressed data with an accuracy of 0.97.</abstract>
        </abstracts>
        <codes>
          <udk>004.056.53</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Statistical Data Analysis</keyword>
            <keyword>Classification of Encrypted and Compressed Data</keyword>
            <keyword>Machine Learning</keyword>
            <keyword>Binary Data Analysis</keyword>
            <keyword>Pseudorandom Sequences</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.4.2/</furl>
          <file>2021_3_5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>27-33</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Kriulin</surname>
              <initials>Artur</initials>
              <email>kriulin@mirea.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-5511-4000</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>MIREA – Russian Technological University</orgName>
              <surname>Eremeev</surname>
              <initials>Mihail</initials>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <surname>Nefedov</surname>
              <initials>V.</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Malware detection approach based on the detection of abnormal network traffic using machine learning algorithms</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The article considers a possibility of using machine learning technologies to detect network connections of malicious programs based on the detection of anomalies. The classification of network connections of malicious software is carried out based on statistical signs during data transmission that occur at the transport and network levels of the OSI model. It is proposed to use machine learning technologies to assess the probability of detecting malware based on their network activity</abstract>
        </abstracts>
        <codes>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Machine Learning Algorithms</keyword>
            <keyword>Malware</keyword>
            <keyword>Intrusion Detection Tools</keyword>
            <keyword>Network Activity</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.4.3/</furl>
          <file>2021_3_5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>34-43</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0005-3102-5950</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Izotova</surname>
              <initials>Oksana</initials>
              <email>izotova@ibks.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-2849-4682</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Lavrova </surname>
              <initials>Daria</initials>
              <email>lavrova_ds@spbstu.ru</email>
              <address>Russia, 195251, St. Petersburg, Polytechnicheskaya str., 29</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Fake posts detection using graph neural networks</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The paper is devoted to the study of graph neural networks as a separate field and the possibility of their application to solve such an urgent cybersecurity problem as the detection of fake posts. The implementation of a proprietary graph neural network model capable of detecting fake posts is presented, and the results of experimental studies demonstrating the effectiveness of using graph neural networks to solve the problem are presented</abstract>
        </abstracts>
        <codes>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Information Security</keyword>
            <keyword>Graph Neural Networks</keyword>
            <keyword>Fake Posts</keyword>
            <keyword>Graph Model</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.4.4/</furl>
          <file>2021_3_5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>44-54</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Kustov</surname>
              <initials>V.</initials>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <surname>Krasnov</surname>
              <initials>A.</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Noise-tolerant coding and highly undetectable stegosystems — is the alliance successful?</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The article deals with the problem of masking hidden messages under natural noise in highly undetectable stegosystems ±1HUGO and ⊕HUGO. To ensure high resistance of stegosystems to hacking, a preliminary discrete chaotic transformation of the hidden message is performed according to the Arnold’s cat algorithm. Further, in their research, the authors effectively apply noise-resistant coding for the covering object and stego using a self-orthogonal noise-resistant code. To model the data transmission channel, the model of a binary synchronous communication channel with interference is used. The article also presents the results of simulation modeling, confirming the high resistance of the proposed stegosystems to hacking.</abstract>
        </abstracts>
        <codes>
          <udk>519.7</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>±1HUGO</keyword>
            <keyword>⊕HUGO</keyword>
            <keyword>Self-orthogonal Noise-tolerant Code</keyword>
            <keyword>Self-orthogonal Code Encoder</keyword>
            <keyword>Multi-threshold Decoder</keyword>
            <keyword>Arnold’s cat transform</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.4.5/</furl>
          <file>2021_3_5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>55-62</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <orgName>ITMO University</orgName>
              <surname>Fedorov</surname>
              <initials>Ivan</initials>
              <email>ivanfedorov@itmo.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>ITMO University</orgName>
              <surname>Pimenov</surname>
              <initials>Andrej</initials>
              <email>tik11994@mail.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <authorCodes>
              <orcid>0000-0002-0924-6221</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>ITMO University</orgName>
              <surname>Panin</surname>
              <initials>Grigorij</initials>
              <email>Llchh@yahoo.com</email>
            </individInfo>
          </author>
          <author num="004">
            <authorCodes>
              <orcid>0000-0002-0924-6221</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Saint Petersburg State University of Aerospace Instrumentation</orgName>
              <surname>Bezzateev</surname>
              <initials>Sergey</initials>
              <email>sergey.bezzateev@gmail.com</email>
              <address>Russia, 190000, St. Petersburg, Bolshaya Morskaya str., 67, liter A</address>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Blockchain in 5G networks: perfomance comparison of private and public blockchain</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Blockchain provides a set of possibilities to improve security, privacy and service quality in 5G mobile networks. In spite of all advantages, blockchain technology has disadvantages such as low throughput and transactions’ high latency. This paper describes an experiment within which two popular blockchain (private and public) are compared. The main aim of experiment is to verify that private blockchain is available for usage in mobile networks and solve these challenges.</abstract>
        </abstracts>
        <codes>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Blockchain</keyword>
            <keyword>5G Mobile Networks</keyword>
            <keyword>Private Blockchain</keyword>
            <keyword>Public Blockchain</keyword>
            <keyword>BLOCKBENCH</keyword>
            <keyword>Hyperledger Fabric</keyword>
            <keyword>Ethereum</keyword>
            <keyword>Geth</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.4.6/</furl>
          <file>2021_3_5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>63-71</pages>
        <authors>
          <author num="001">
            <authorCodes/>
            <individInfo lang="ENG">
              <orgName>Lomonosov Moscow State University</orgName>
              <surname>Grusho</surname>
              <initials>Alexander</initials>
              <email>grusho@yandex.ru</email>
              <address>Russia, 119991, Moscow, Leninskie Gory, 1</address>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0002-5005-2744</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <surname>Grusho</surname>
              <initials>Nikolaj</initials>
              <email>info@itake.ru</email>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <surname>Zabezhailo</surname>
              <initials>Mihail</initials>
            </individInfo>
          </author>
          <author num="004">
            <authorCodes>
              <orcid>0000-0002-6493-3622</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <surname>Timonina</surname>
              <initials>Elena</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Using contradictions in data to search implicit failures in computer systems</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper discusses the problem of detecting implicit failures in distributed information systems. If the hardware or software does not provide enough data to detect a failure, then the system administrator or information security officer has to check each element of the computer system associated with the task. In this work, reducing the search for implicit failures (anomalies) is associated with construction of the hierarchical method for representing knowledge about the system. It is proposed to model information technology in the form of directed acyclic graphs. The concept of contradiction is defined, which is used to find the causes of failures and anomalies. A failure or anomaly in the implementation of the transformation is defined as a contradiction between the input and output data. The paper proposes the approximate method for solving contradiction search problems, based on the assumption that data have probabilistic origin and extraordinary data are unlikely. If the calculation results in a contradiction, then the anomaly occurred in the block under consideration and, using the detailing operation, it is possible to specify the localization of the anomaly inside the block.</abstract>
        </abstracts>
        <codes>
          <udk>004.896</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Information Security</keyword>
            <keyword>Root Cause and Anomaly Localization</keyword>
            <keyword>Causal Relationships</keyword>
            <keyword>Contradictions in Data</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.4.7/</furl>
          <file>2021_3_5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>72-82</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0009-0006-6856-2108</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Pahomov</surname>
              <initials>Maksim</initials>
              <email>pahomov_ma@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Research of UEFI BIOS mechanisms for access to motherboard sensors from the operating system on the platform of mass chipsets on the example of temperature and voltage sensors</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">Capturing measurements from motherboard sensors is possible in a variety of environments, but it carries the risk of compromising such data. The safest way to access sensors is to directly access them using UEFI BIOS technologies, bypassing the operating system (OS). This paper examines the mechanisms for accessing motherboard sensors, as well as ways of transferring this information to the OS.</abstract>
        </abstracts>
        <codes>
          <udk>004.056.53</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>UEFI</keyword>
            <keyword>BIOS</keyword>
            <keyword>Motherboard Sensors</keyword>
            <keyword>Temperature Sensors</keyword>
            <keyword>Voltage Sensors</keyword>
            <keyword>Mass Chipsets</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.4.8/</furl>
          <file>2021_3_5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>83-95</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-5757-381X</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Emperor Alexander I St. Petersburg State Transport University</orgName>
              <surname>Gofman</surname>
              <initials>Maksim </initials>
              <email>gofman@moonmail.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Noisproof digitial audio watermarking in mimo audio stegosystems</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The article presents methods of noiseproof combined digital audio watermarking, considering the peculiarities of audio stegosystems using channels with multiple (spatial) input and multiple (spatial) output. Such audio stegosystems include several acoustic speakers (transmitters) and several microphones (receivers), which makes it possible to embed a watermark in the parameters of digital audio signals in the spatial, frequency and time domains. The methods for creating, embedding, and extracting a combined watermark developed in the article are aimed at ensuring a high degree of noiseproof when transmitting a watermarked audio signal through an airborne audio channel at low embedding forces. The method of creating and embedding the combined watermark is based on the transformation of identifying digital information using a synthesized steganographic key into a special sequence and subsequent space-time-frequency coding of the digital audio signal parameters by it. The main attention is paid to the development of a method for detecting and extracting an information bit (extracting) a combined watermark by an authorized receiver in an audio signal transmitted over an airborne audio channel with noise. In this case, it is assumed that the authorized receiver does not know the parameters of the digital audio signal that have been watermarked (blind reception). In the proposed method for extracting a watermark, the decision on its detection is made according to the threshold principle based on the estimation of the peak factor of the kurtosis of the target random variable. As the values of this quantity, the values of the correlation function between the sought-for sequence (watermark) and the sequence extracted from the audio signal received by acoustic microphones and converted into digital form are used. The article contains the results of field experiments to assess the noiseproof of the proposed watermarking method when transmitting audio signals through an airborne audio channel, while the transmission of watermarked audio signals was carried out by several acoustic speakers, and the reception was carried out by a microphone with several capsules. The results of the experiments showed that the developed methods allow the transmission of watermarked digital audio signals with a high degree of noiseproof in audio stegosystems with multiple input and multiple output at low forces of embedding the watermark, providing its auditory transparency.</abstract>
        </abstracts>
        <codes>
          <udk>519.876.5:519.6:004.357</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Audio Stegosystem</keyword>
            <keyword>MIMO</keyword>
            <keyword>Channel with Multiple Input and Multiple Output</keyword>
            <keyword>Watermarking</keyword>
            <keyword>Digital Audio Signal</keyword>
            <keyword>Combined Watermark</keyword>
            <keyword>Airborne Audio Channel</keyword>
            <keyword>Noiseproof</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.4.9/</furl>
          <file>2021_3_5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>96-107</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000–0002–8424–3071</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Plekhanov Russian University of Economics</orgName>
              <surname>Kirov</surname>
              <initials>Aleksej</initials>
              <email>Kirov.AD@rea.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Development of a metric model of information events in the information security management system of economic activities</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The article is devoted to the problem of developing a model of information events metrics in the information security management system (ISMS) of economic entities (EDMS). Based on the analysis of the organization of information security (IS) monitoring in the EDMS and the implementation of IS monitoring processes in the ISMS EDMS, in order to increase the efficiency of ensuring the IS EDMS, measurable indicators (metrics) of information events, as well as tools designed to measure these metrics, are proposed. A model of metrics of information events in the ISMS EDMS is developed, presented in the form of a tree of incident metrics.</abstract>
        </abstracts>
        <codes>
          <udk>004.9</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Information Security</keyword>
            <keyword>Management System</keyword>
            <keyword>Information Events</keyword>
            <keyword>Incident</keyword>
            <keyword>Model</keyword>
            <keyword>Metric</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.4.10/</furl>
          <file>2021_3_5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>108-117</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0002-6419-0072</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>St. Petersburg State University of Aerospace Instrumentation</orgName>
              <surname>Tatarnikova</surname>
              <initials>Tatiana</initials>
              <email>Tm-tatarn@yandex.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <scopusid>57200960264</scopusid>
              <orcid>0000-0001-6289-3295</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Russian State Hydrometeorological University</orgName>
              <surname>Sikarev</surname>
              <initials>Igor</initials>
              <email>sikarev@yandex.ru</email>
              <address>Russia, 192007, St. Petersburg, Voronezhskaya str., 79</address>
            </individInfo>
          </author>
          <author num="003">
            <individInfo lang="ENG">
              <orgName>Saint-Petersburg State University of Aerospace Instrumentation</orgName>
              <surname>Bogdanov</surname>
              <initials>Pavel</initials>
            </individInfo>
          </author>
          <author num="004">
            <individInfo lang="ENG">
              <orgName>Russian State Hydrometeorological University</orgName>
              <surname>Timochkina</surname>
              <initials>Tatyana</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">An approach to detecting botnet attacks in the Internet of Things networks</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">An approach to detecting network attacks based on deep learning methods - autoencoders is proposed. It is shown that training examples can be obtained when connecting IoT devices to the network, as long as the traffic does not carry malicious code. Statistical values and functions extracted from traffic are proposed, on which patterns of behavior of IoT devices are built.</abstract>
        </abstracts>
        <codes>
          <udk>004.056.5</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Internet of Things</keyword>
            <keyword>Network Attack</keyword>
            <keyword>Attack Detection System</keyword>
            <keyword>Autoencoder</keyword>
            <keyword>Principal Component Method</keyword>
            <keyword>Unsupervised Learning</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.4.11/</furl>
          <file>2021_3_5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>118-129</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-9659-1244</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Poltavtseva</surname>
              <initials>Maria </initials>
              <email>potavtseva@ibks.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000–0002–2954–3899</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Kharitonova</surname>
              <initials>Anna</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Medical cyber-physical systems attack systematization</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The computerization of medicine opens up wide opportunities not only for providing assistance, but also for intruders. The violation of digital control of medical devices can lead not only to data leakage, but also to a threat to human health and life. The diversity and specificity of medical cyber-physical devices makes it difficult to protect them and consider the threat landscape. The purpose of this work is to systematize attacks on medical systems. The authors highlight the features of medical cyber-physical systems (MCPS), consider a set of typical attacks. The authors have identified both common attacks for various CPS, and specialized attacks aimed at medical devices and systems. The paper analyzes the existing systematization as well. The authors present a developed new systematization of attacks on a wide range of features, which is distinguished by the completeness and highlighting of all important attack aspects from the point of view of the medical field.</abstract>
        </abstracts>
        <codes>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Information security</keyword>
            <keyword>Cyber-physical Systems</keyword>
            <keyword>Medical Systems</keyword>
            <keyword>Security Threats</keyword>
            <keyword>Attacks</keyword>
            <keyword>Systematization of Attacks</keyword>
            <keyword>Medical IoTH</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.4.12/</furl>
          <file>2021_3_5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>130-136</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0003-1798-8257</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Russian State Hydrometeorological University</orgName>
              <surname>Sukhoparov</surname>
              <initials>Mikhail</initials>
              <email>mail@sukhoparovm.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0001-6753-2181</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Saint Petersburg Federal Research Center of Russian Science Academy</orgName>
              <surname>Lebedev</surname>
              <initials>Ilya</initials>
              <email>isl_box@mail.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Segmenting data samples for Internet of Things devices security state analysis</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">The technique of segmenting data samples in order to improve indicators of the classifying algorithms quality is considered. It takes into account the factors that influence the change in the ranges of values of the target variables. Identifying impacts on current and anticipated situations allows for the segmentation of data samples. As a result, the ranges of the studied variables and outliers are reduced, and noisy data is removed. An experiment performed using a split sample is described. The results of the assessment were obtained for each classifier on the general sample and on the segments.</abstract>
        </abstracts>
        <codes>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Segmentation of data samples</keyword>
            <keyword>detection of anomalies</keyword>
            <keyword>parasitic traffic</keyword>
            <keyword>information security</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.4.13/</furl>
          <file>2021_3_5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>137-144</pages>
        <authors>
          <author num="001">
            <individInfo lang="ENG">
              <surname>Fatin</surname>
              <initials>Aleksander</initials>
              <email>sasha-fatin@mail.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <authorCodes>
              <orcid>0000-0003-1345-1874</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Pavlenko</surname>
              <initials>Evgeny</initials>
              <email>pavlenko_eyu@spbstu.ru</email>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Approaches to building situational control systems for cyberphysical systems overview</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This paper provides a detailed overview of methods and tools for building situational management systems in the field of cyber-physical systems security. Recommendations are given for the construction of finite systems in relation to their areas of application and existing solutions in this area. The purpose of this study is to systematize, summarize, analyze and supplement the existing experience in the field of describing and solving problems of information security of cyber-physical systems; to draw up a general information basis for the subsequent implementation of your own system of situational management of the cyber-physical system.</abstract>
        </abstracts>
        <codes>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Information Security</keyword>
            <keyword>Cyber-Physical Systems</keyword>
            <keyword>Situational Control</keyword>
            <keyword>Descriptor Models</keyword>
            <keyword>RX Codes</keyword>
            <keyword>Syntagmatic Chains</keyword>
            <keyword>Graph</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.4.14/</furl>
          <file>2021_3_5-6.pdf</file>
        </files>
      </article>
      <article>
        <artType>RAR</artType>
        <langPubl>RUS</langPubl>
        <pages>145-156</pages>
        <authors>
          <author num="001">
            <authorCodes>
              <orcid>0000-0001-9659-1244</orcid>
            </authorCodes>
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Poltavtseva</surname>
              <initials>Maria </initials>
              <email>potavtseva@ibks.spbstu.ru</email>
            </individInfo>
          </author>
          <author num="002">
            <individInfo lang="ENG">
              <orgName>Peter the Great St. Petersburg Polytechnic University</orgName>
              <surname>Andreeva</surname>
              <initials>Tatyana</initials>
            </individInfo>
          </author>
        </authors>
        <artTitles>
          <artTitle lang="ENG">Methods of time series multidimensional aggregation of streaming data in the cyber-physical systems security monitoring</artTitle>
        </artTitles>
        <abstracts>
          <abstract lang="ENG">This work is devoted to the research and development of data aggregation methods in order to increase the performance of detecting attacks in cyber-physical systems (CPS). A special feature of the work is the aggregation of data presented in the form of time series with different periods for methods of prediction and intrusion detection. The article contains requirements for CPS data aggregation, research of new methods of hierarchical and multidimensional aggregation of stream data. The authors propose methods for multi-dimensional data aggregation based on trees and directed graphs and conduct their comparative analysis. For experimental evaluation, the authors developed a prototype of a data aggregation system with hierarchical and multidimensional aggregation systems. The paper contains an assessment of the developed prototype performance and the amount of memory required for each proposed method. The authors propose the application of the developed solutions, indicating the characteristics of the target systems.</abstract>
        </abstracts>
        <codes>
          <udk>004.056</udk>
        </codes>
        <keywords>
          <kwdGroup lang="ENG">
            <keyword>Cyber Physical Systems (CPS)</keyword>
            <keyword>Multidimensional Aggregation</keyword>
            <keyword>Data aggregation</keyword>
            <keyword>Graph theory</keyword>
            <keyword>Queue tree</keyword>
          </kwdGroup>
        </keywords>
        <files>
          <furl>https://jisp.spbstu.ru/article/2021.4.15/</furl>
          <file>2021_3_5-6.pdf</file>
        </files>
      </article>
    </articles>
  </issue>
</journal>
