Skip to main content

Abstract

This chapter investigates the complex issue of an early-warning system for cyber-attacks on Russian state and corporate information resources. An approach to create the required warning systems based on “computing cognitivism” is proposed; it is a relatively new scientific research area with cognition and cognitive processes being a kind of symbolic computation. It is shown that the cognitive approach makes it possible to create systems that are fundamentally different from the traditional systems for cyber-attack detection, prevention, and recovery (SOPCA). SOPCA has a unique ability to independently associate and synthesize new knowledge on qualitative characteristics and quantitative patterns of information confrontation. A feasible architecture of a cognitive early-warning system for a cyber-attack against Russian information resources based on convergent nano-, bio-, info-, and cognitive technologies, NBIC technologies is proposed [1–5].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Biryukov, D.N.: Cognitive-functional memory specification for simulation of purposeful behavior of cyber systems. Proc. SPIIRAS. 3(40), 55–76 (2015)

    Article  Google Scholar 

  2. Bocharov, V.A., Markin, V.I.: Fundamentals of Logic. Moscow State University, Moscow (2008)

    Google Scholar 

  3. Information Operations. Directive TS 3600.1. U. S. Department of Defense, Washington, DC. August 14, 2006 [Electronic resource]. Access mode: https://www.fas.org/irp/doddir/dod/info_ops.pdf

  4. Kaspersky, E.: Computer Malignity, 208 p. Peter, St. Petersburg (2008)

    Google Scholar 

  5. Levin, I.I., Dordopulo, A.I., Kalyaev, I.A., Doronchenko, Y.I., Razkladkin, M.K.: Modern and promising high-performance computing systems with reconfigurable architecture. Proceedings of the international scientific conference “Parallel Computing Technologies (PaVT’2015)”, Ekaterinburg, March 31–April 2, 2015, pp. 188–199. Publishing Center of SUSU, Chelyabinsk (2015)

    Google Scholar 

  6. Abramov, S.M.: Research in the field of supercomputer technologies of the IPS RAS: a retrospective and perspective. In: Proceedings of the International Conference “Software Systems: Theory and Applications”, vol. 1, pp. 153–192. Publishing house “University of Pereslavl”, Pereslavl (2009)

    Google Scholar 

  7. Abramov, S.M., Lilitko, E.P.: State and prospects of ultra-high performance computing systems development. Inf. Technol. Comput. Syst. 2, 6–22 (2013)

    Google Scholar 

  8. Petrenko, A.S., Petrenko, S.A.: Super-productive monitoring centers for security threats. Part 1. Protect. Inf. Inside. 2(74), 29–36 (2017)

    Google Scholar 

  9. Petrenko, A.S., Petrenko, S.A.: Designing of corporate segment SOPKA. Protect. Inf. Inside. 6(72), 48–50 (2016)

    Google Scholar 

  10. Petrenko, A.S., Petrenko, S.A.: Super-productive monitoring centers for security threats. Part 2. Protect. Inf. Inside. 3(75), 48–57 (2017)

    Google Scholar 

  11. Petrenko, S.A., Kurbatov, V.A., Bugaev, I.A., Petrenko, A.S.: Cognitive system of early warning about computer attack. Protect. Inf. Inside. 3(69), 74–82 (2016)

    Google Scholar 

  12. Petrenko, S.A., Asadullin, A.Y., Petrenko, A.S.: Evolution of the von Neumann architecture. Protect. Inf. Inside. 2(74), 18–28 (2017)

    Google Scholar 

  13. Klabukov, I.D., Alekhin, M.D., Nekhina, A.A.: The DARPA research program for 2015. Moscow (2014)

    Google Scholar 

  14. Petrenko, A.A., Petrenko, S.A.: Research and Development Agency DARPA in the field of cybersecurity. Quest. Cybersecurity. 4(12), 2–22 (2015)

    Google Scholar 

  15. Petrenko, S.A., Petrenko, A.S.: Lecture 12. Perspective tasks of information security. Intelligent information radiophysical systems. Introductory lectures [A. O. Armyakov and others; ed. S.F. Boev, D.D. Stupin, A.A. Kochkarova], pp. 155–166. MSTU them. N.E. Bauman, Moscow (2016)

    Google Scholar 

  16. Petrenko, S.A.: The Cyber Threat model on innovation analytics DARPA. Trudy SPII RAN. 39, 26–41 (2015)

    Google Scholar 

  17. Petrov, A.P.: On the perceptron’s possibilities. Izvestiya AN SSSR, Technical Cybernetics. 6 (1964)

    Google Scholar 

  18. Petrenko, A.S., Bugaev, I.A., Petrenko, S.A.: Master data management system SOPKA. Inf. Protect. Inside. 5(71), 37–43 (2016)

    Google Scholar 

  19. Petrenko, S.A.: Methods of detecting intrusions and anomalies of the functioning of cyber system, Proceedings of ISA RAS. Risk Manag. Safety. 41, 194–202 (2009)

    Google Scholar 

  20. Velichkovsky, B.M.: Cognitive Technical Systems. Computers, Brain, Cognition: Successes of Cognitive Sciences, pp. 273–292. Nauka, Moscow (2008)

    Google Scholar 

  21. Petrenko, A.S., Petrenko, S.A.: Large data technologies (BigData) in the field of information security. Inf. Protect. Inside. 4(70), 82–88 (2016)

    Google Scholar 

  22. Petrenko, S.A., Shamsutdinov, T.I., Petrenko, A.S.: Scientific and technical problems of development of situational centers in the Russian Federation. Inf. Protect. Inside. 6(72), 37–43 (2016)

    Google Scholar 

  23. Aristotle. Comp. in 4 volumes (Series “Philosophical heritage”). Thought, Moscow. (1975–1983)

    Google Scholar 

  24. Bongard, M.M.: The Problem of Recognition. Fizmatgiz, Moscow (1967)

    Google Scholar 

  25. Ryzhikov, Y.I.: Work on the Thesis on Technical Sciences, 496 p. BHV-Petersburg, St. Petersburg (2005)

    Google Scholar 

  26. Kolmogorov, A.N.: Automats and life. In: Berg, A.I., Kolman, E. (eds.) Cybernetics: Expected and Cybernetics Unexpected, pp. 12–30. Science, Moscow (1968)

    Google Scholar 

  27. Pospelov, D.A.: The modeling of reasoning. Experience in the analysis of mental acts, 184 p. Radio and communication, Moscow (1989)

    Google Scholar 

  28. Pospelov, D.A.: Thinking and Automatons, 224 p. 130. Soviet radio, Moscow (1972)

    Google Scholar 

  29. Redko, V.G.: Evolution, Neural Networks, Intellect. LIBROKOM Book House/URSS, Moscow (2013)

    Google Scholar 

  30. Tarasov, V.B.: System-organizational approach in artificial intelligence. Softw. Prod. Syst. 3, 6–13 (1999)

    Google Scholar 

  31. Marr, B.: Big Data: Using SMART Big Data, Analytics and Metrics to Make Better Decisions and Improve Performance, 246 c. Wiley, New York (2015)

    Google Scholar 

  32. Massel, L.V.: Problems of smart grid creation in Russia from the perspective of information technologies and cyber security. In: Proceedings of the All-Russian Seminar with International Participation: Methodological Issues of Research into the Reliability of Large Energy Systems. Vol. 64. Reliability of energy systems: achievements, problems, prospects, pp. 171–181. ISEM SB RAS, Irkutsk (2014)

    Google Scholar 

  33. Petrenko, S.A., Petrenko, A.A.: Ontology of cyber-security of self-healing SmartGrid. Protect. Inf. Inside. 2(68), 12–24 (2016)

    Google Scholar 

  34. Petrenko, S.A., Petrenko, A.S.: Practice of application of GOST R IEC 61508. Inf. Protect. Insider. 2(68), 42–49 (2016)

    Google Scholar 

  35. Petrenko, A.A., Petrenko, S.A.: Cyber units: methodical recommendations of ENISA. Quest. Cybersecurity. 3(11), 2–14 (2015)

    Google Scholar 

  36. Petrenko, A.A., Petrenko, S.A.: Intranet Security Audit (Information Technologies for Engineers), 416 p. DMK Press, Moscow (2002)

    Google Scholar 

  37. Petrenko, A.A., Petrenko, S.A.: The way to increase the stability of LTE-network in the conditions of destructive cyber-attacks. Quest. Cybersecurity. 2(10), 36–42 (2015)

    Google Scholar 

  38. Petrenko, A.S., Petrenko, S.A.: The first interstate cyber-training of the CIS countries: “Cyber-Antiterror2016”. Inf. Protect. Inside. 5(71), 57–63 (2016)

    Google Scholar 

  39. Petrenko, S.A.: Methods of ensuring the stability of the functioning of cyber systems under conditions of destructive effects. Proceedings of the ISA RAS. Risk Manag. Security, 52, 106–151 (2010)

    Google Scholar 

  40. Petrenko, S.A.: Methods of Information and Technical Impact on Cyber Systems and Possible Countermeasures. Proceedings of ISA RAS. Risk Manag. Security, 41, 104–146 (2009)

    Google Scholar 

  41. Petrenko, S.A., Petrenko, A.S.: Creation of a cognitive supercomputer for the computer attacks prevention. Protect Inf. Inside. 3(75), 14–22 (2017)

    Google Scholar 

  42. Petrenko, S.A., Petrenko, A.S.: From detection to prevention: trends and prospects of development of situational centers in the Russian Federation. Intellect Technol. 1(12), 68–71 (2017)

    Google Scholar 

  43. Petrenko, S.A., Petrenko, A.S.: New doctrine as an impulse for the development of domestic information security technologies. Intellect Technol. 2(13), 70–75 (2017)

    Google Scholar 

  44. Petrenko, S.A., Petrenko, A.S.: New doctrine of information security of the Russian Federation. Inf. Protect. Inside. 1(73), 33–39 (2017)

    Google Scholar 

  45. Petrenko, S.A., Simonov, S.V.: Management of Information Risks. Economically Justified Safety (Information technology for engineers), 384 p. DMK-Press, Moscow (2004)

    Google Scholar 

  46. Petrenko, S.A.: The concept of maintaining the efficiency of cyber system in the context of information and technical impacts. Proceedings of the ISA RAS. Risk Manag. Safety. 41, 175–193 (2009)

    Google Scholar 

  47. Petrenko, S.A.: The problem of the stability of the functioning of cyber systems under the conditions of destructive effects. Proceedings of the ISA RAS. Risk Manag. Security. 52, 68–105 (2010)

    Google Scholar 

  48. Petrenko, S.A., Kurbatov, V.A.: Information Security Policies (Information Technologies for Engineers), 400 p. DMK Press, Moscow (2005)

    Google Scholar 

  49. Abramov, S.M.: History of development and implementation of a series of Russian supercomputers with cluster architecture. In: History of Domestic Electronic Computers. 2nd edn, Rev. and additional; color. Ill.: Publishing house “Capital Encyclopedia”, Moscow (2016)

    Google Scholar 

  50. Action plan. Document WSIS-03/GENEVA/DOC/5-R dated December 12, 2013. Geneva [Electronic resource]. Access mode: http://www.itu.int/dms_pub/itus/md/03/wsis/doc/S03-WSIS-DOC-0005*PDF-R.pdf

  51. Active Engagement, Modern Defence. Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organisation adopted by Heads of State and Government in Lisbon. November 19, 2010 [Electronic resource]. Access mode: http://www.nato.int/cps/en/SID-14EF0623-198FC77E/natolive/official_texts_68580.htm

  52. Administration Strategy On Mitigating The Theft Of U.S. Trade Secrets. Executive Office of the President of the United States. February 2013, Washington, DC [Electronic resource]. Access mode: http://www.whitehouse.gov/sites/default/files/omb/IPEC/admin_strategy_on_mitigating_the_theft_of_u.s._trade_secrets.pdf

  53. Advances in the field of information and telecommunications in the context of international security. Report of the UN Secretary-General. Document A/66/152 of 15 July 2011 [Electronic resource]. Access mode: http://www.un.org/en/documents/ods.asp?m=A/66/152

  54. Advances in the field of information and telecommunications in the context of international security. Report of the First Committee. Document A/66/407 dated November 10, 2011 [Electronic resource]. Access mode: http://www.un.org/en/documents/ods.asp?m=A/66/407

  55. Biryukov, D.N., Glukhov, A.P., Pilkevich, S.V., Sabirov, T.R.: Approach to the processing of knowledge in the memory of an intellectual system. Natur. Tech. Sci. 11, 455–466 (2015)

    Google Scholar 

  56. Biryukov, D.N., Lomako, A.G.: Approach to the construction of information security systems capable of synthesizing scenarios of anticipatory behavior in the information conflict. Protect. Inf. Inside. 6(60), 42–50 (2014)

    Google Scholar 

  57. Biryukov, D.N., Lomako, A.G.: Denotational semantics of knowledge contexts in ontological modeling of the subject areas of conflict. Proc. SPIIRAS. 5(42), 155–179 (2015)

    Google Scholar 

  58. Biryukov, D.N., Lomako, A.G.: The formalization of semantics for representation of knowledge about the behavior of conflicting parties: materials of the 22nd scientific-practical conference “Methods and technical means of information security”, pp. 8–11. Publishing house of Polytechnic University, St. Petersburg (2013)

    Google Scholar 

  59. Biryukov, D.N., Lomako, A.G., Petrenko, S.A.: Generating scenarios for preventing cyber-attacks. Protect. Inf. Inside. 4(76) (2017)

    Google Scholar 

  60. Biryukov, D.N., Rostovtsev, Y.G.: Approach to constructing a consistent theory of synthesis of scenarios of anticipatory behavior in a conflict. Proc. SPIIRAS. 1(38), 94–111 (2015)

    Article  Google Scholar 

  61. Biryukov, D.N., Lomako, A.G., Sabirov, T.R.: Multilevel Modeling of Pre-Emptive Behavior Scenarios. Problems of Information Security. Computer systems, vol. 4, pp. 41–50. Publishing house of Polytechnic University, St. Petersburg (2014)

    Google Scholar 

  62. Biryukov, D.N., Lomako, A.G., Rostovtsev, Y.G.: The appearance of anticipatory systems to prevent the risks of cyber threat realization. Proc. SPIIRAS. 2(39), 5–25 (2015)

    Article  Google Scholar 

  63. Scott, D.S.: Models for various type-free calculi. Logic, Methodology and Philosophy of Science IV (Proc. Int. Congress 1971), pp. 157–188. North-Holland (1973)

    Chapter  Google Scholar 

  64. Scott, D.S.: Outline of mathematical theory. 4th Annual Princeton Conference on Information Sciences and Systems, Princeton University, pp. 169–176 (1970)

    Google Scholar 

  65. Scott, D.S.: Logic and programming languages. Lectures of the winners of the Turing Award, pp. 65–83; [ed. R. Eschenhurst]. Mir, Moscow (1993)

    Google Scholar 

  66. Biryukov, D.N., Lomako, A.G.: Approach to Building a Cyber Threat Prevention System. Problems of Information Security. Computer systems, vol. 2, pp. 13–19. Publishing house of Polytechnic University, St. Petersburg (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Petrenko, S. (2018). Possible Scientific-Technical Solutions to the Problem of Giving Early Warning. In: Big Data Technologies for Monitoring of Computer Security: A Case Study of the Russian Federation. Springer, Cham. https://doi.org/10.1007/978-3-319-79036-7_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-79036-7_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-79035-0

  • Online ISBN: 978-3-319-79036-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics