The Relevance of the Early Warning of Cyber-attacks

  • Sergei Petrenko
Chapter

Abstract

It is proved that the problem of information security of the critical infrastructure of the Russian Federation is one of the most important goals of ensuring digital sovereignty and defense capability of the state. The main threats to the information security of the Russian Federation are introduced. They include threats of military-political, terrorist, and criminogenic nature. The necessity of an integrated approach to information security not only at the national but also at the external policy level is explained. The current state of the problem of detection and prevention of cyber-attacks is assessed. Prospective assignments of alerting and anticipation tasks, as well as timely detection and neutralization of cyber-attacks, are considered.

References

  1. 1.
    The Information Security Doctrine of the Russian Federation (approved by the Decree of the President of the Russian Federation No. 646 of December 5, 2016).Google Scholar
  2. 2.
    About formal bases of OWL [Electronic resource]. Access mode: http://semanticfuture.net/index.php. Accessed 20 Dec 2014
  3. 3.
    Abramov, S.M.: Research in the field of supercomputer technologies of the IPS RAS: a retrospective and perspective. In: Proceedings of the International Conference “Software Systems: Theory and Applications”, vol. 1, pp. 153–192. Publishing house “University of Pereslavl”, Pereslavl (2009)Google Scholar
  4. 4.
    Abramov, S.M.: History of development and implementation of a series of Russian supercomputers with cluster architecture. In: History of Domestic Electronic Computers. 2nd edn, Rev. and additional; color. Ill.: Publishing house “Capital Encyclopedia”, Moscow (2016)Google Scholar
  5. 5.
    Abramov, S.M., Lilitko, E.P.: State and prospects of ultra-high performance computing systems development. Inf. Technol. Comput. Syst. 2, 6–22 (2013)Google Scholar
  6. 6.
    Action plan. Document WSIS-03/GENEVA/DOC/5-R dated December 12, 2013. Geneva [Electronic resource]. Access mode: http://www.itu.int/dms_pub/itus/md/03/wsis/doc/S03-WSIS-DOC-0005*PDF-R.pdf
  7. 7.
    Active Engagement, Modern Defence. Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organisation adopted by Heads of State and Government in Lisbon. November 19, 2010 [Electronic resource]. Access mode: http://www.nato.int/cps/en/SID-14EF0623-198FC77E/natolive/official_texts_68580.htm
  8. 8.
    Administration Strategy On Mitigating The Theft Of U.S. Trade Secrets. Executive Office of the President of the United States. February 2013, Washington, DC [Electronic resource]. Access mode: http://www.whitehouse.gov/sites/default/files/omb/IPEC/admin_strategy_on_mitigating_the_theft_of_u.s._trade_secrets.pdf
  9. 9.
    Advances in the field of information and telecommunications in the context of international security. Report of the UN Secretary-General. Document A/66/152 of 15 July 2011 [Electronic resource]. Access mode: http://www.un.org/en/documents/ods.asp?m=A/66/152
  10. 10.
    Advances in the field of information and telecommunications in the context of international security. Report of the First Committee. Document A/66/407 dated November 10, 2011 [Electronic resource]. Access mode: http://www.un.org/en/documents/ods.asp?m=A/66/407
  11. 11.
    Advances in the field of information and telecommunications in the context of international security. Resolution of the General Assembly of the UN. Document A/RES/65/41 dated December 8, 2010 [Electronic resource]. Access mode: http://www.un.org/en/documents/ods.asp?m=A/RES/65/41
  12. 12.
    Advances in the field of information and telecommunications in the context of international security. Resolution of the General Assembly of the UN. Document A/RES/68/243 dated December 27, 2013 [Electronic resource]. Access mode: http://www.un.org/en/ga/search/view_doc.asp?symbol=A/RES/68/243
  13. 13.
    Advancing America’s Networking and Information Technology Research and Development Act of 2013. H. R. 967 [Electronic resource]. Access mode: https://www.govtrack.us/congress/bills/113/hr967/text
  14. 14.
    Agreement between the governments of the member states of the Shanghai Cooperation Organization on cooperation in the field of international information security from June 16, 2009, Yekaterinburg. Appendix 1. [Electronic resource]. Access mode: https://ccdcoe.org/sites/default/files/documents/SCO-090616-IISAgreementRussian.pdf
  15. 15.
    Aldrich, R.W.: The International Legal Implications of Information Warfare [Electronic resource]. Airpower J. 10(3), 99–110 (1996). Access mode: http://www.airpower.maxwell.af.mil/airchronicles/apj/apj96/fall96/aldrich.pdf
  16. 16.
    Alekseeva, I.Y., et al.: Information Challenges of National and International Security; [under the Society. ed. A. V. Fedorova, VN Tsigichko], 328 p. PIR Center, Moscow (2001)Google Scholar
  17. 17.
    Alessandri, D., et al.: Towards a Taxonomy of Intrusion-Detection Systems and Attacks. Zurich, IBM Research Division (2001)Google Scholar
  18. 18.
    Almgren, M.: Consolidation and evaluation of IDS taxonomies. In: Proceedings of the Eight Nordic Workshop on Secure IT Systems, NordSec 2003Google Scholar
  19. 19.
    An evaluation Framework for National Cyber Security Strategies [Electronic resource]. European Union Agency for Network and Information Security (2014). Access mode: https://www.enisa.europa.eu/activities/Resilienceand-CIIP/national-cyber-security-strategies-ncsss/an-evaluation-framework-for-cyber-security-strategies-1
  20. 20.
    An Open, Safe and Secure Cyberspace. Joint communication to the European Parliament, the Council, the European Economic and Social committee and the Committee of the Regions Cybersecurity Strategy of the European Union of the European Commission and Higher Representative for foreign affairs and security policy. Brussels (2013) [Electronic resource]. Access mode: http://ec.europa.eu/information_society/newsroom/
  21. 21.
    Anderson, J.P.: Computer Security Threat Monitoring and Surveillance. James P. Anderson Co., Fort Washington, PA (1980)Google Scholar
  22. 22.
    Andreev, V.V., Zdiruk, K.B.: IV Jupiter: implementation of corporate security policy in computer networks. Open. Syst. 7–8, 43–46 (2003)Google Scholar
  23. 23.
    Annual Incident Reports 2014: Analysis of Article 13a annual incident reports / European Union Agency for Network and Information Security (ENISA) (2015). [Electronic resource]. Access mode: https://www.enisa.europa.eu/activities/Resilience-and-CIIP/Incidents-reporting/annual-reports/annual-incident-reports-2014. Accessed 10 Apr 2016
  24. 24.
    Appliance of information and communication technologies for development. Resolution of the General Assembly of the UN. Document A/RES/65/141 dated December 20, 2010 [Electronic resource]. Access mode: http://www.un.org/en/ga/search/view_doc.asp?symbol=A/RES/65/141
  25. 25.
    Arbatov A.G. Real and imaginary threats: Military power in world politics in the beginning of the XXI century. [Electronic resource] AG Arbatov. Russia in global politics. March 3, 2013. Access mode: http://www.global- affairs.ru/number/Ugrozy-realnye-i-mnimye-15863Google Scholar
  26. 26.
    Aristotle. Comp. in 4 volumes (Series “Philosophical heritage”). Thought, Moscow. (1975–1983)Google Scholar
  27. 27.
    Arquilla, J.: Ethics and information warfare. In: Khalilzad, Z., White, J., Marsall, A. (eds.) Strategic Appraisal: The Changing Role of Information in Warfare, 475 p. RAND Corporation, Santa Monica (1999)Google Scholar
  28. 28.
    Ashby, U.R.: Principles of Self-Organization, pp. 314–343. Mir, Moscow (1966)Google Scholar
  29. 29.
    Axelsson, S.: Intrusion Detection Systems: A Taxonomy and Survey. Technical Report 99–15. Department of Computer Engineering, Chalmers University of Technology, Goteborg (2000)Google Scholar
  30. 30.
    Barabanov, A.V., Markov, A.S., Tsirlov, V.L.: Methodological framework for analysis and synthesis of a set of secure software development controls. J. Theor. Appl. Info. Technol. 88(1), 77–88 (2016)Google Scholar
  31. 31.
    Barabanov, A., Lavrov, A., Markov, A., Polotnyanschikov, I., Tsirlov, V.: The study into cross-site request forgery attacks within the framework of analysis of software vulnerabilities. In: Preliminary proceedings of the 11th Spring/Summer Young Researchers’ Colloquium on Software Engineering (Innopolis, Republic of Tatarstan, Russian Federation, June 5–7, 2017), pp. 105–109. SYRCoSE, ISP RASGoogle Scholar
  32. 32.
    Baranov, P.A.: Detection of anomalies based on the application of the criterion of the dispersion degree. Proceedings of the XIV All-Russian Scientific Conference “Information Security Problems in the Higher School System”, pp. 25–27. Izd. department of the St. Petersburg State Polytechnic University, St. Petersburg (2007)Google Scholar
  33. 33.
    Batueva, E.V.: American concept of threats to information security and its international political component, 207 p. Doctoral thesis of political sciences. MGIMO (U) Ministry of Foreign Affairs of the Russian Federation, Moscow (2014)Google Scholar
  34. 34.
    Bedritsky, A.V.: American policy of cyber space control. Probl. Natl. Strat. 2(3), 25–40 (2010)Google Scholar
  35. 35.
    Bedritsky, A.V.: Information War: Concepts and Their Implementation in the US, 183p. RISI, Moscow (2008)Google Scholar
  36. 36.
    Bedritsky, A.V.: The Evolution of the American Concept of Information War, 26p. RISI, Moscow. Analytical Rev. (3) (2003)Google Scholar
  37. 37.
    Biryukov, D.N.: Cognitive-functional memory specification for simulation of purposeful behavior of cyber systems. Proc. SPIIRAS. 3(40), 55–76 (2015)CrossRefGoogle Scholar
  38. 38.
    Biryukov, D.N., Lomako, A.G.: Denotational semantics of knowledge contexts in ontological modeling of the subject areas of conflict. Proc. SPIIRAS. 5(42), 155–179 (2015)Google Scholar
  39. 39.
    Biryukov, D.N., Glukhov, A.P., Pilkevich, S.V., Sabirov, T.R.: Approach to the processing of knowledge in the memory of an intellectual system. Natur. Tech. Sci. 11, 455–466 (2015)Google Scholar
  40. 40.
    Biryukov, D.N., Lomako, A.G.: Approach to the construction of information security systems capable of synthesizing scenarios of anticipatory behavior in the information conflict. Protect. Inf. Inside. 6(60), 42–50 (2014)Google Scholar
  41. 41.
    Biryukov, D.N., Lomako, A.G.: The formalization of semantics for representation of knowledge about the behavior of conflicting parties: materials of the 22nd scientific-practical conference “Methods and technical means of information security”, pp. 8–11. Publishing house of Polytechnic University, St. Petersburg (2013)Google Scholar
  42. 42.
    Biryukov, D.N., Lomako, A.G., Petrenko, S.A.: Generating scenarios for preventing cyber-attacks. Protect. Inf. Inside. 4(76) (2017)Google Scholar
  43. 43.
    Biryukov, D.N., Lomako, A.G., Rostovtsev, Y.G.: The appearance of anticipatory systems to prevent the risks of cyber threat realization. Proc. SPIIRAS. 2(39), 5–25 (2015)CrossRefGoogle Scholar
  44. 44.
    Biryukov, D.N., Lomako, A.G., Sabirov, T.R.: Multilevel Modeling of Pre-Emptive Behavior Scenarios. Problems of Information Security. Computer systems, vol. 4, pp. 41–50. Publishing house of Polytechnic University, St. Petersburg (2014)Google Scholar
  45. 45.
    Biryukov, D.N., Rostovtsev, Y.G.: Approach to constructing a consistent theory of synthesis of scenarios of anticipatory behavior in a conflict. Proc. SPIIRAS. 1(38), 94–111 (2015)CrossRefGoogle Scholar
  46. 46.
    Biryukov, D.N., Lomako, A.G.: Approach to Building a Cyber Threat Prevention System. Problems of Information Security. Computer systems, vol. 2, pp. 13–19. Publishing house of Polytechnic University, St. Petersburg (2013)Google Scholar
  47. 47.
    Bocharov, V.A., Markin, V.I.: Fundamentals of Logic. Moscow State University, Moscow (2008)Google Scholar
  48. 48.
    Boev, S.F., Kochkarov, A.A., Stupin, D.D.: Development of R & D activities of high-tech B2G-holdings: problems and tasks. Qual. Innov. Educ. 11(78), 54–59 (2011)Google Scholar
  49. 49.
    Boev, S.F., Kochkarov, A.A., Stupin, D.D.: The role and possibilities of pre-university training in the problem of the formation of highly qualified specialists for high-tech branches of the real economy and the experience of the RTI Systems Concern: materials of the International Scientific Conference “Forming the Identity of Finno-Ugric world and Russian education”, pp. 330–333. Mordovian state publishing house University, Saransk (2011)Google Scholar
  50. 50.
    Bongard, M.M.: The Problem of Recognition. Fizmatgiz, Moscow (1967)Google Scholar
  51. 51.
    Brennen, S.: Cyberthreats and the Decline of the Nation-state, 175 p. Susan W. Brenner. Routledge, Abingdon (2014)Google Scholar
  52. 52.
    Brenner, J.: America the Vulnerable, 308 p. Joel Brenner. Penguin Press, New York (2011)Google Scholar
  53. 53.
    Carr, J.: Inside Cyber Warfare, 213 p. Jeffrey Carr. O’Reilly (2010)Google Scholar
  54. 54.
    Cavelty, M.: Cyber-Security and Threat Politics: US Efforts to Secure the Information Age, 182 p. Myriam Dunn Cavelty. Routledge, New York (2007)Google Scholar
  55. 55.
    Chereshkin, D.S.: Problems of Information Security Management, 224 p. Editorial URSS, Moscow (2002)Google Scholar
  56. 56.
    Clarifying Cybersecurity Responsibilities and Activities of the Executive Office of the President and the Department of Homeland Security. Memorandum. Executive Office of the President Office of Management and Budget, Washington, DC. July 6, 2010 [Electronic resource]. Access mode: http://www.whitehouse.gov/sites/default/files/omb/assets/memoranda_2010/m10-28.pdfGoogle Scholar
  57. 57.
    Clark, R., Nake, R.: The Third World War. What Will It Be Like? Publishing house “Peter”, St. Petersburg (2011)Google Scholar
  58. 58.
    Clark, W., Levin, P.: Securing the information highway: How to enhance the United States electronic defenses. Foreign Aff. November/December 2009 [Electronic resource]. Access mode: http://www.foreignaffairs.com/articles/65499/wesley-k-clark-and-peter-llevin/securing-the-information-highway
  59. 59.
    Clarke, R.: Cyber War the Next Threat to National Security and What to Do About It. In: Richard A. Clarke, Robert K. Knake, 290 p. HarperCollins (2010)Google Scholar
  60. 60.
    Clarke, R.: Securing Cyberspace Through International Norms. Good Harbor Security Risk Management [Electronic resource]. Access mode: http://www.goodharbor.net/media/pdfs/SecuringCyberspace_web.pdf
  61. 61.
    Clayton, M.: Presidential Cyberwar Directive Gives Pentagon Long-awaited Marching Orders. The Christian Science Monitor. June 10, 2013 – [Electronic resource]. Access mode: http://www.csmonitor.com/USA/Military/2013/0610/Presidential-cyberwardirective-gives-Pentagon-long-awaited-marching-orders-videoGoogle Scholar
  62. 62.
    Collin, B.: The Future of Cyberterrorism. Crime Justice Int. 13(2) March 1997 [Electronic resource]. Access mode: http://www.cjimagazine.com/archives/cji4c18.html?id=415
  63. 63.
    Collins, A.M., Quillian, M.R.: Retrieval time from semantic memory. J. Verbal Learn. Verbal Behav. 8, 240–247 (1969)CrossRefGoogle Scholar
  64. 64.
    Communication from the Commission to the European Parliament and the Council. The EU Internal Security Strategy in Action: Five steps towards a more secure Europe. Brussels, 22.11.2010. COM (2010)Google Scholar
  65. 65.
    Comprehensive National Cybersecurity Initiative. The White House, Washington, DC. January 2008 [Electronic resource]. Access mode: http://www.whitehouse.gov/cybersecurity/comprehensive-nationalcybersecurity-initiative
  66. 66.
    Consolidated and Further Continuing Appropriations Act of 2013. H. R. 933 [Electronic resource]. Access mode: http://www.gpo.gov/fdsys/pkg/BILLS-113hr933pp/pdf/BILLS-113hr933pp.pdf
  67. 67.
    Cornish, P.: Cyber security and politically, socially and religiously motivated cyber-attacks. 2009 [Electronic resource]. Access mode: http://www.europarl.europa.eu/activities/committees/studies.do?language=EN
  68. 68.
    Creation of a global culture of cybersecurity and assess national efforts to protect critical information infrastructures. UN Resolution. Document A/RES/64/211 dated December 21, 2009 [Electronic resource]. Access mode: http://www.un.org/en/documents/ods.asp?m=A/RES/64/211
  69. 69.
    Crimes involving the use of a computer network. The Tenth United Nations Congress on the Prevention of Crime and the Treatment of Offenders. Document A / CONF.187 / 10 of 3 February 1999Google Scholar
  70. 70.
    Critical Infrastructure Research and Development Advancement Act of 2013. H. R. 2952 [Electronic resource]. Access mode: https://www.govtrack.us/congress/bills/113/hr2952/text
  71. 71.
    Critical Infrastructure Security and Resilience: Presidential Policy Directive/PPD-21. The White House, Washington, DC. February 12, 2013Google Scholar
  72. 72.
    Cyber Europe 2012: Key Findings Report. ENISA. 2012 [Electronic resource]. Access mode: https://www.enisa.europa.eu/activities/Resilience-and-CIIP/cyber-crisis-cooperation/cce/cyber-europe/cyber-europe-2012/cyber-europe2012-key-findings-report. Accessed date 10 Apr 2016
  73. 73.
    Cyber Intelligence Sharing and Protection Act. 2012. H. R. 3523 [Electronic resource]. Access mode: https://www.govtrack.us/congress/bills/112/hr3523
  74. 74.
    Cyber Security Report. European Commission. 2013 [Electronic resource]. Access mode: http://ec.europa.eu/public_opinion/archives/ebs/ebs_404_en.pdf. Accessed date 10 Apr 2016
  75. 75.
    Cyber Security Report. European Сommission. 2015. [Electronic resource]. Access mode: http://ec.europa.eu/COMMFrontOffice/PublicOpinion/index.cfm/Survey/getSurveyDetail/yearFrom/1973/yearTo/2016/search/cyber/surveyKy/2019. Accessed 10 Apr 2016Google Scholar
  76. 76.
    Cyberpower and National Security [ed. F. Kramer, S. Starr, and L. Wentz], 664 p. Potomac Books Inc. (2009)Google Scholar
  77. 77.
    Cybersecurity Act of 2009. S.773. Open Congress Summary [Electronic resource]. Access mode: http://www.opencongress.org/bill/111-s773/show
  78. 78.
    Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace. High Representative of the European Union for Foreign Affairs and Security Policy. Brussel, 2013 [Electronic resource]. Access mode: http://eeas.europa.eu/policies/eu-cyber-security/cybsec_comm_en.pdf. Accessed 10 Apr 2016
  79. 79.
    Cyberspace Policy Review Assuring a Trusted and Resilient Information and Communications Infrastructure. May 2009 [Electronic resource]. Access mode: http://www.whitehouse.gov/assets/documents/Cyberspace_Policy_Review_final.pdf
  80. 80.
    Debar H., et al.: (IBM Zurich). Towards a Taxonomy of Intrusion-Detection Systems. IBM Research Division, Zurich (1999)Google Scholar
  81. 81.
    Decree of the Government of the Russian Federation of 04 September 2003 No. 547 “On the preparation of the population in the field of protection from natural and man-made emergency situations”Google Scholar
  82. 82.
    Decree of the Government of the Russian Federation of December 30, 2003 No. 794 “On Unified State System for the Prevention and Elimination of Emergency Situations”Google Scholar
  83. 83.
    Decree of the Government of the Russian Federation of December 8, 2011 No. 2227-r “On the Approval of the Strategy for Innovative Development of the Russian Federation for the Period to 2020”. [Electronic resource]. Access mode: http://mon.gov.ru/files/materials/4432/11.12.08-2227r.pdf. 145. RD 50-34.698-90. Automated systems. Requirements for the content of documents
  84. 84.
    Denning, D.: Cyberterrorism. George Town University. May 23, 2000 [Electronic resource]. Access mode: http://www.cs.georgetown.edu/~denning/infosec/cyberterror.html
  85. 85.
    Denning, D.: Information Operations and Terrorism / Defense Technical Information Center. August 18, 2005. [Electronic resource]. Access mode: http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA484999
  86. 86.
    Denning, D.: Information Warfare and Security, 522 p. ACM Press, New York (1999)Google Scholar
  87. 87.
    Denning, D.: Is cyberterror next? Social Science Research Council. November 1, 2001 [Electronic resource]. Access mode: http://essays.ssrc.org/sept11/essays/denning.htm
  88. 88.
    Denning, D.: Reflections on cyberweapons controls. Comput. Security J. XVI(4), 43–53 (2000)Google Scholar
  89. 89.
    Denning, D.E., (SRI International): An intrusion detection model. IEEE Trans. Softw. Eng. (SE-13), 2, 222–232 (1987)Google Scholar
  90. 90.
    Department of Defense Dictionary of Military and Associated Terms. November 8, 2010 [Electronic resource]. Access mode: http://www.dtic.mil/doctrine/dod_dictionary/
  91. 91.
    Department of Defense Strategy for Operating in Cyberspace. July 2011. [Electronic resource]. Access mode: http://www.defense.gov/news/d20110714cyber.pdf
  92. 92.
    Digital Agenda for Europe. A Europe 2020 Strategy. 2010 [Electronic resource]. Access mode: http://ec.europa.eu/digitalagenda.
  93. 93.
    Dunlap, C. Jr.: Perspectives for cyber strategists on law for cyberwar (Charles J. Dunlap Jr.). Strateg. Stud. Q. Spring, 81–99 (2011)Google Scholar
  94. 94.
    Electronic Communications Privacy Act Amendments Act of 2013. S. 607 [Electronic resource]. Access mode: https://www.govtrack.us/congress/bills/113/s607
  95. 95.
    Elliott, D.: Weighing the Case for a Convention to Limit Cyberwarfare. Arms Control Association. November 2009 [Electronic resource]. Access mode: http://www.armscontrol.org/act/2009_11/Elliott
  96. 96.
    Ermakov, S.M.: Transformation of NATO after the Lisbon Summit in 2010: from the defense of the territory to the protection of the public domain. Probl. Natl. Strateg. 4(9), 107–128 (2011)Google Scholar
  97. 97.
    Terrorist Use of the Internet: Information Operations in Cyberspace. Congressional Research Service. March 8, 2011. 16 p. [Electronic resource]. Access mode: http://www.fas.org/sgp/crs/terror/R41674.pdf
  98. 98.
    The concept of foreign policy of the Russian Federation (approved by the Decree of the President of the Russian Federation of November 30, 2016 No. 640Google Scholar
  99. 99.
    The concept of the development of an intelligent electric power system in Russia with an actively adaptive network. OJSC “FGC UES” OJSC “Scientific and technological center of electric power industry”. Moscow (2011)Google Scholar
  100. 100.
    The concept of the state system for detecting, preventing and eliminating the consequences of computer attacks on the information resources of the Russian Federation (approved by the President of the Russian Federation on December 12, 2014, No. K 1274)Google Scholar
  101. 101.
    The Economic Impact of Cybercrime and Cyber Espionage. The Center for Strategic and International Studies Report. July 2013. 19 p. [Electronic resource]. Access mode: http://csis.org/files/publication/60396rpt_cybercrimecost_0713_ph4_0.pdfGoogle Scholar
  102. 102.
    The European Cyber Security Month 2015: Deployment report. European Union Agency for Network and Information Security (ENISA). 2015 [Electronic resource]. Access mode: https://www.enisa.europa.eu/activities/stakeholder-relations/nis-brokerage-1/european-cyber-security-month-advocacy-campaign/2015. Accessed 10 Apr 2016
  103. 103.
    The national security strategy of the Russian Federation (approved by the Decree of the President of the Russian Federation of December 31, 2015, No. 683Google Scholar
  104. 104.
    The Order of the Ministry of Emergency Measures of the Russian Federation from February, 28th, 2003 № 105. On the statement of requirements on the prevention of extreme situations on potentially dangerous objects and objects of life-supportGoogle Scholar
  105. 105.
    The Regulation on Cooperation of the Member States of the Collective Security Treaty Organization in the Sphere of Ensuring Information Security of December 10, 2010. [Electronic resource]. Access mode: http://docs.pravo.ru/document/view/16657605/14110649. 129. Pospelov DA Thinking and automatons, 224 p. Soviet radio, Moscow (1972)
  106. 106.
    The role of science and technology in the context of international security, disarmament and other related fields. Report of the First Committee. Document A/53/576 of 18 November 1998 [Electronic resource]. Access mode: http://www.un.org/en/documents/ods.asp?m=A/53/576
  107. 107.
    The Russia U.S. Bilateral on Cybersecurity – Critical Terminology Foundations. EastWest Institute. Issue 1. April 2011. 47 p. [Electronic resource]. Access mode: http://www.ewi.info/idea/russia-us-bilateral-cybersecurity-criticalterminologyfoundations
  108. 108.
    The Stuxnet Computer Worm: Harbinger of an Emerging Warfare Capability. Congressional Research Service. December 9, 2010. 9 p. [Electronic resource]. Access mode: http://fas.org/sgp/crs/natsec/R41524.pdf
  109. 109.
    Thomas, T.: Cyber Silhouettes. Shadows Over Information Operations, 334 p. Timothy L. Thomas. Foreign Military Studies Office (FMSO). Fort Leavenworth (2005)Google Scholar
  110. 110.
    Thomas, T.: Is the IW paradigm outdated? A discussion of U.S. IW theory. J. Inf. Warfare. 2(3), 109–116 (2003)Google Scholar
  111. 111.
    Threats Posed by the Internet. Threat Working Group of the CSIS Commission on Cybersecurity for the 44th Presidency. October 2008. 28 p. [Electronic resource]. Access mode: http://csis.org/files/media/csis/pubs/081028_threats_working_group.pdf
  112. 112.
    Toffler, A.: War and Anti-War: Survival at the Down of the Twenty-First Century, 1st edn, 302 p. Alvin and Heidi Toffler (1993)Google Scholar
  113. 113.
    Toffler, E.: The Third Wave, 784 p. AST, Moscow (2010)Google Scholar
  114. 114.
    Tsygichko, V.N., Votrin, D.S., Krutskikh, A.V., Smolyan, G.L., Chereshkin, D.S.: Information Weapons Are a New Challenge to International Security, 52 p. Institute of System Analysis of the Russian Academy of Sciences, Moscow (2000)Google Scholar
  115. 115.
    Tulving E. Episodic and Semantic Memory. Organization of Memory New York: Academic, 1972. Р. 381–403.Google Scholar
  116. 116.
    Unsecured Economies: Protecting Vital Information. McAfee Report. (2009) 33 p. [Electronic resource]. Access mode: https://resources2.secureforms.mcafee.com/LP=2984
  117. 117.
    Vasyutin, S.V., Zavyalov, S.S.: Neural network method for analyzing the sequence of system calls for the detection of computer attacks and the classification of application modes. Methods and Means of Information Processing: Proceedings of the Second All-Russian Scientific Conference; [ed. member corr. RAS L.N. Koroleva], pp. 142–147. Pub. Department of the Factor of Computational Mathematics and Cybernetics of the Moscow State University. M.V. Lomonosov, Moscow (2005)Google Scholar
  118. 118.
    Wales Summit Declaration. Issued by the Heads of State and Government participating in the meeting of the North Atlantic Council in Wales. September 5, 2014 [Electronic resource]. Access mode: http://www.nato.int/cps/en/natohq/official_texts_112964.htm
  119. 119.
    Weimann, G.: Cyberterrorism. How Real Is the Threat? United States Institute of Peace. Special Report. 12 p. [Electronic resource]. Access mode: http://www.usip.org/sites/default/files/sr119.pdf
  120. 120.
    Weimann, G.: Special Report 116: www.terror.net How Modern Terrorism Uses the Internet/United Institute of Peace, March 2004. [Electronic resource]. Access mode: http://dspace.cigilibrary.org/jspui/bitstream/123456789/4610/1/www%20terror%20net%20How%20Modern%20Terrorism%20Uses %20the%20Internet.pdf?
  121. 121.
    Petrenko, A.A., Petrenko, S.A.: Cyber units: methodical recommendations of ENISA. Quest. Cybersecurity. 3(11), 2–14 (2015)Google Scholar
  122. 122.
    Petrenko, A.A., Petrenko, S.A.: The way to increase the stability of LTE-network in the conditions of destructive cyber-attacks. Quest. Cybersecurity. 2(10), 36–42 (2015)Google Scholar
  123. 123.
    Petrenko, S.A.: Methods of ensuring the stability of the functioning of cyber systems under conditions of destructive effects. Proceedings of the ISA RAS. Risk Manag. Security, 52, 106–151 (2010)Google Scholar
  124. 124.
    Petrenko, S.A., Kurbatov, V.A., Bugaev, I.A., Petrenko, A.S.: Cognitive system of early warning about computer attack. Protect. Inf. Inside. 3(69), 74–82 (2016)Google Scholar
  125. 125.
    Tallinn Manual on the International Law Applicable to Cyber Warfare. [Electronic resource] general editor Michael N. Schmitt. Cambridge University Press (2013). 282 p. Access mode: http://issuu.com/nato_ccd_coe/docs/tallinnmanual?mode=embed&layout=http%3A%2F%2Fskin.issuu.com%2Fv%2Flight%2Flayout.xml&showFlipBtn=trueGoogle Scholar
  126. 126.
    Gamayunov, D.Y.: Detection of computer attacks based on the analysis of the behavior of network objects: dis. for the competition uch. degree of Cand. fiz.-mat. sciences. Moscow State University, Moscow (2007)Google Scholar
  127. 127.
    Petrenko, S.A.: Methods of detecting intrusions and anomalies of the functioning of cyber system, Proceedings of ISA RAS. Risk Manag. Safety. 41, 194–202 (2009)Google Scholar
  128. 128.
    Ilgun, K.: USTAT: A real-Time Intrusion Detection System for UNIX. Computer Science Department, University of California, Santa Barbara (1992)Google Scholar
  129. 129.
    Kumar, S., Spafford, E.H.: An Application of Pattern Matching in Intrusion Detection. Purdue University, New York (1994)Google Scholar
  130. 130.
    Petrenko, A.S., Petrenko, S.A.: Designing of corporate segment SOPKA. Protect. Inf. Inside. 6(72), 48–50 (2016)Google Scholar
  131. 131.
    Petrenko, S.A., Petrenko, A.S.: From detection to prevention: trends and prospects of development of situational centers in the Russian Federation. Intellect Technol. 1(12), 68–71 (2017)Google Scholar
  132. 132.
    Petrenko, S.A., Shamsutdinov, T.I., Petrenko, A.S.: Scientific and technical problems of development of situational centers in the Russian Federation. Inf. Protect. Inside. 6(72), 37–43 (2016)Google Scholar
  133. 133.
    Portnoy, L., et al.: Intrusion detection with unlabeled data using clustering. ACM Workshop on Data Mining Applied to Security (2001)Google Scholar
  134. 134.
    Kotenko, I.V.: Intellectual mechanisms of cybersecurity management. Proceedings of ISA RAS. Risk Manag. Safety, 41, 74–103 (2009)Google Scholar
  135. 135.
    Petrenko, A.S., Petrenko, S.A.: Super-productive monitoring centers for security threats. Part 1. Protect. Inf. Inside. 2(74), 29–36 (2017)Google Scholar
  136. 136.
    Petrenko, A.S., Bugaev, I.A., Petrenko, S.A.: Master data management system SOPKA. Inf. Protect. Inside. 5(71), 37–43 (2016)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Sergei Petrenko
    • 1
  1. 1.Innopolis UniversityInnopolisRussia

Personalised recommendations