Abstract
This chapter investigates the complex issue of an early-warning system for cyber-attacks on Russian state and corporate information resources. An approach to create the required warning systems based on “computing cognitivism” is proposed; it is a relatively new scientific research area with cognition and cognitive processes being a kind of symbolic computation. It is shown that the cognitive approach makes it possible to create systems that are fundamentally different from the traditional systems for cyber-attack detection, prevention, and recovery (SOPCA). SOPCA has a unique ability to independently associate and synthesize new knowledge on qualitative characteristics and quantitative patterns of information confrontation. A feasible architecture of a cognitive early-warning system for a cyber-attack against Russian information resources based on convergent nano-, bio-, info-, and cognitive technologies, NBIC technologies is proposed [1–5].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Biryukov, D.N.: Cognitive-functional memory specification for simulation of purposeful behavior of cyber systems. Proc. SPIIRAS. 3(40), 55–76 (2015)
Bocharov, V.A., Markin, V.I.: Fundamentals of Logic. Moscow State University, Moscow (2008)
Information Operations. Directive TS 3600.1. U. S. Department of Defense, Washington, DC. August 14, 2006 [Electronic resource]. Access mode: https://www.fas.org/irp/doddir/dod/info_ops.pdf
Kaspersky, E.: Computer Malignity, 208 p. Peter, St. Petersburg (2008)
Levin, I.I., Dordopulo, A.I., Kalyaev, I.A., Doronchenko, Y.I., Razkladkin, M.K.: Modern and promising high-performance computing systems with reconfigurable architecture. Proceedings of the international scientific conference “Parallel Computing Technologies (PaVT’2015)”, Ekaterinburg, March 31–April 2, 2015, pp. 188–199. Publishing Center of SUSU, Chelyabinsk (2015)
Abramov, S.M.: Research in the field of supercomputer technologies of the IPS RAS: a retrospective and perspective. In: Proceedings of the International Conference “Software Systems: Theory and Applications”, vol. 1, pp. 153–192. Publishing house “University of Pereslavl”, Pereslavl (2009)
Abramov, S.M., Lilitko, E.P.: State and prospects of ultra-high performance computing systems development. Inf. Technol. Comput. Syst. 2, 6–22 (2013)
Petrenko, A.S., Petrenko, S.A.: Super-productive monitoring centers for security threats. Part 1. Protect. Inf. Inside. 2(74), 29–36 (2017)
Petrenko, A.S., Petrenko, S.A.: Designing of corporate segment SOPKA. Protect. Inf. Inside. 6(72), 48–50 (2016)
Petrenko, A.S., Petrenko, S.A.: Super-productive monitoring centers for security threats. Part 2. Protect. Inf. Inside. 3(75), 48–57 (2017)
Petrenko, S.A., Kurbatov, V.A., Bugaev, I.A., Petrenko, A.S.: Cognitive system of early warning about computer attack. Protect. Inf. Inside. 3(69), 74–82 (2016)
Petrenko, S.A., Asadullin, A.Y., Petrenko, A.S.: Evolution of the von Neumann architecture. Protect. Inf. Inside. 2(74), 18–28 (2017)
Klabukov, I.D., Alekhin, M.D., Nekhina, A.A.: The DARPA research program for 2015. Moscow (2014)
Petrenko, A.A., Petrenko, S.A.: Research and Development Agency DARPA in the field of cybersecurity. Quest. Cybersecurity. 4(12), 2–22 (2015)
Petrenko, S.A., Petrenko, A.S.: Lecture 12. Perspective tasks of information security. Intelligent information radiophysical systems. Introductory lectures [A. O. Armyakov and others; ed. S.F. Boev, D.D. Stupin, A.A. Kochkarova], pp. 155–166. MSTU them. N.E. Bauman, Moscow (2016)
Petrenko, S.A.: The Cyber Threat model on innovation analytics DARPA. Trudy SPII RAN. 39, 26–41 (2015)
Petrov, A.P.: On the perceptron’s possibilities. Izvestiya AN SSSR, Technical Cybernetics. 6 (1964)
Petrenko, A.S., Bugaev, I.A., Petrenko, S.A.: Master data management system SOPKA. Inf. Protect. Inside. 5(71), 37–43 (2016)
Petrenko, S.A.: Methods of detecting intrusions and anomalies of the functioning of cyber system, Proceedings of ISA RAS. Risk Manag. Safety. 41, 194–202 (2009)
Velichkovsky, B.M.: Cognitive Technical Systems. Computers, Brain, Cognition: Successes of Cognitive Sciences, pp. 273–292. Nauka, Moscow (2008)
Petrenko, A.S., Petrenko, S.A.: Large data technologies (BigData) in the field of information security. Inf. Protect. Inside. 4(70), 82–88 (2016)
Petrenko, S.A., Shamsutdinov, T.I., Petrenko, A.S.: Scientific and technical problems of development of situational centers in the Russian Federation. Inf. Protect. Inside. 6(72), 37–43 (2016)
Aristotle. Comp. in 4 volumes (Series “Philosophical heritage”). Thought, Moscow. (1975–1983)
Bongard, M.M.: The Problem of Recognition. Fizmatgiz, Moscow (1967)
Ryzhikov, Y.I.: Work on the Thesis on Technical Sciences, 496 p. BHV-Petersburg, St. Petersburg (2005)
Kolmogorov, A.N.: Automats and life. In: Berg, A.I., Kolman, E. (eds.) Cybernetics: Expected and Cybernetics Unexpected, pp. 12–30. Science, Moscow (1968)
Pospelov, D.A.: The modeling of reasoning. Experience in the analysis of mental acts, 184 p. Radio and communication, Moscow (1989)
Pospelov, D.A.: Thinking and Automatons, 224 p. 130. Soviet radio, Moscow (1972)
Redko, V.G.: Evolution, Neural Networks, Intellect. LIBROKOM Book House/URSS, Moscow (2013)
Tarasov, V.B.: System-organizational approach in artificial intelligence. Softw. Prod. Syst. 3, 6–13 (1999)
Marr, B.: Big Data: Using SMART Big Data, Analytics and Metrics to Make Better Decisions and Improve Performance, 246 c. Wiley, New York (2015)
Massel, L.V.: Problems of smart grid creation in Russia from the perspective of information technologies and cyber security. In: Proceedings of the All-Russian Seminar with International Participation: Methodological Issues of Research into the Reliability of Large Energy Systems. Vol. 64. Reliability of energy systems: achievements, problems, prospects, pp. 171–181. ISEM SB RAS, Irkutsk (2014)
Petrenko, S.A., Petrenko, A.A.: Ontology of cyber-security of self-healing SmartGrid. Protect. Inf. Inside. 2(68), 12–24 (2016)
Petrenko, S.A., Petrenko, A.S.: Practice of application of GOST R IEC 61508. Inf. Protect. Insider. 2(68), 42–49 (2016)
Petrenko, A.A., Petrenko, S.A.: Cyber units: methodical recommendations of ENISA. Quest. Cybersecurity. 3(11), 2–14 (2015)
Petrenko, A.A., Petrenko, S.A.: Intranet Security Audit (Information Technologies for Engineers), 416 p. DMK Press, Moscow (2002)
Petrenko, A.A., Petrenko, S.A.: The way to increase the stability of LTE-network in the conditions of destructive cyber-attacks. Quest. Cybersecurity. 2(10), 36–42 (2015)
Petrenko, A.S., Petrenko, S.A.: The first interstate cyber-training of the CIS countries: “Cyber-Antiterror2016”. Inf. Protect. Inside. 5(71), 57–63 (2016)
Petrenko, S.A.: Methods of ensuring the stability of the functioning of cyber systems under conditions of destructive effects. Proceedings of the ISA RAS. Risk Manag. Security, 52, 106–151 (2010)
Petrenko, S.A.: Methods of Information and Technical Impact on Cyber Systems and Possible Countermeasures. Proceedings of ISA RAS. Risk Manag. Security, 41, 104–146 (2009)
Petrenko, S.A., Petrenko, A.S.: Creation of a cognitive supercomputer for the computer attacks prevention. Protect Inf. Inside. 3(75), 14–22 (2017)
Petrenko, S.A., Petrenko, A.S.: From detection to prevention: trends and prospects of development of situational centers in the Russian Federation. Intellect Technol. 1(12), 68–71 (2017)
Petrenko, S.A., Petrenko, A.S.: New doctrine as an impulse for the development of domestic information security technologies. Intellect Technol. 2(13), 70–75 (2017)
Petrenko, S.A., Petrenko, A.S.: New doctrine of information security of the Russian Federation. Inf. Protect. Inside. 1(73), 33–39 (2017)
Petrenko, S.A., Simonov, S.V.: Management of Information Risks. Economically Justified Safety (Information technology for engineers), 384 p. DMK-Press, Moscow (2004)
Petrenko, S.A.: The concept of maintaining the efficiency of cyber system in the context of information and technical impacts. Proceedings of the ISA RAS. Risk Manag. Safety. 41, 175–193 (2009)
Petrenko, S.A.: The problem of the stability of the functioning of cyber systems under the conditions of destructive effects. Proceedings of the ISA RAS. Risk Manag. Security. 52, 68–105 (2010)
Petrenko, S.A., Kurbatov, V.A.: Information Security Policies (Information Technologies for Engineers), 400 p. DMK Press, Moscow (2005)
Abramov, S.M.: History of development and implementation of a series of Russian supercomputers with cluster architecture. In: History of Domestic Electronic Computers. 2nd edn, Rev. and additional; color. Ill.: Publishing house “Capital Encyclopedia”, Moscow (2016)
Action plan. Document WSIS-03/GENEVA/DOC/5-R dated December 12, 2013. Geneva [Electronic resource]. Access mode: http://www.itu.int/dms_pub/itus/md/03/wsis/doc/S03-WSIS-DOC-0005*PDF-R.pdf
Active Engagement, Modern Defence. Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organisation adopted by Heads of State and Government in Lisbon. November 19, 2010 [Electronic resource]. Access mode: http://www.nato.int/cps/en/SID-14EF0623-198FC77E/natolive/official_texts_68580.htm
Administration Strategy On Mitigating The Theft Of U.S. Trade Secrets. Executive Office of the President of the United States. February 2013, Washington, DC [Electronic resource]. Access mode: http://www.whitehouse.gov/sites/default/files/omb/IPEC/admin_strategy_on_mitigating_the_theft_of_u.s._trade_secrets.pdf
Advances in the field of information and telecommunications in the context of international security. Report of the UN Secretary-General. Document A/66/152 of 15 July 2011 [Electronic resource]. Access mode: http://www.un.org/en/documents/ods.asp?m=A/66/152
Advances in the field of information and telecommunications in the context of international security. Report of the First Committee. Document A/66/407 dated November 10, 2011 [Electronic resource]. Access mode: http://www.un.org/en/documents/ods.asp?m=A/66/407
Biryukov, D.N., Glukhov, A.P., Pilkevich, S.V., Sabirov, T.R.: Approach to the processing of knowledge in the memory of an intellectual system. Natur. Tech. Sci. 11, 455–466 (2015)
Biryukov, D.N., Lomako, A.G.: Approach to the construction of information security systems capable of synthesizing scenarios of anticipatory behavior in the information conflict. Protect. Inf. Inside. 6(60), 42–50 (2014)
Biryukov, D.N., Lomako, A.G.: Denotational semantics of knowledge contexts in ontological modeling of the subject areas of conflict. Proc. SPIIRAS. 5(42), 155–179 (2015)
Biryukov, D.N., Lomako, A.G.: The formalization of semantics for representation of knowledge about the behavior of conflicting parties: materials of the 22nd scientific-practical conference “Methods and technical means of information security”, pp. 8–11. Publishing house of Polytechnic University, St. Petersburg (2013)
Biryukov, D.N., Lomako, A.G., Petrenko, S.A.: Generating scenarios for preventing cyber-attacks. Protect. Inf. Inside. 4(76) (2017)
Biryukov, D.N., Rostovtsev, Y.G.: Approach to constructing a consistent theory of synthesis of scenarios of anticipatory behavior in a conflict. Proc. SPIIRAS. 1(38), 94–111 (2015)
Biryukov, D.N., Lomako, A.G., Sabirov, T.R.: Multilevel Modeling of Pre-Emptive Behavior Scenarios. Problems of Information Security. Computer systems, vol. 4, pp. 41–50. Publishing house of Polytechnic University, St. Petersburg (2014)
Biryukov, D.N., Lomako, A.G., Rostovtsev, Y.G.: The appearance of anticipatory systems to prevent the risks of cyber threat realization. Proc. SPIIRAS. 2(39), 5–25 (2015)
Scott, D.S.: Models for various type-free calculi. Logic, Methodology and Philosophy of Science IV (Proc. Int. Congress 1971), pp. 157–188. North-Holland (1973)
Scott, D.S.: Outline of mathematical theory. 4th Annual Princeton Conference on Information Sciences and Systems, Princeton University, pp. 169–176 (1970)
Scott, D.S.: Logic and programming languages. Lectures of the winners of the Turing Award, pp. 65–83; [ed. R. Eschenhurst]. Mir, Moscow (1993)
Biryukov, D.N., Lomako, A.G.: Approach to Building a Cyber Threat Prevention System. Problems of Information Security. Computer systems, vol. 2, pp. 13–19. Publishing house of Polytechnic University, St. Petersburg (2013)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this chapter
Cite this chapter
Petrenko, S. (2018). Possible Scientific-Technical Solutions to the Problem of Giving Early Warning. In: Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation. Springer, Cham. https://doi.org/10.1007/978-3-319-79036-7_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-79036-7_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-79035-0
Online ISBN: 978-3-319-79036-7
eBook Packages: Computer ScienceComputer Science (R0)