Skip to main content

Information Flow Control on the Basis of Meta Data

  • Conference paper
  • First Online:
Distributed Computer and Communication Networks (DCCN 2019)

Abstract

Usually security of information flows is supported by Firewalls, Proxy servers, Intrusion Detection Systems. These mechanisms work when there can be malicious information flows. The paper presents the new security mechanism which can be used instead of traditional measures. This is due to the strong limitation of the existence of non needed information flows.

The main objective of our method is the prevention of interactions which are initiated by a malicious code. For the solution of this problem it is offered to define legal communications by meta data.

The review of the results connected with the usage of the method of meta data for creation of an authorization system of connections in a distributed information system and, in particular, in information systems on the basis of SDN is provided in the paper. It is shown that the found vulnerabilities can be compensated by means of an expansion of the functionality of controlling tasks \(\mathcal N\) and \(\mathcal M\), and by cryptography.

Using the fact that meta data reflect a reduced model of relationships of cause and effect in information technologies it is possible to solve an inverse problem connected with localization of failures and errors in data.

Partially supported by Russian Foundation for Basic Research (project 18-07-00274).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rieck, K., Stewin, P., Seifert, J.-P. (eds.): DIMVA 2013. LNCS, vol. 7967, 207 p. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39235-1

    Google Scholar 

  2. Skorobogatov, S., Woods, C.: Breakthrough silicon scanning discovers backdoor in military chip. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 23–40. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-33027-8_2

    Chapter  Google Scholar 

  3. Nilsson, N.J.: Problem-Solving Methods in Artificial Intelligence. McGraw-Hill Pub. Co., New York (1971)

    Google Scholar 

  4. TCSEC: Department of Defense Trusted Computer System Evaluation Criteria. DoD (1985)

    Google Scholar 

  5. Samuylov, K.E., Chukarin, A.V., Yarkina, N.V.: Business Processes and Information Technologies in Management of the Telecommunication Companies. Alpina Pablisherz, Moscow (2009)

    Google Scholar 

  6. Finn, V.K. (ed.): Automatic Hypotheses Generation in Intelligent Systems. KD “LIBROKOM”, Moscow (2009)

    Google Scholar 

  7. Tran, C.N., Danciu, V.: A general approach to conflict detection in software-defined networks. SN Comput. Sci. 1, 9 (2020). https://doi.org/10.1007/s142979-019-0009-9

  8. Shu, Z., Wan, J., Li, D., Lin, J., Vasilakos, A.V., Imran, M.: Security in software-dened networking: threats and countermeasures. J. Mob. Netw. Appl. 21(5), 764–776 (2016). https://doi.org/10.1007/s11036-016-0676-x

    Article  Google Scholar 

  9. Petrov, I.S.: Systems of detection of compromised switches in software-defined networks. J. Inf. Technol. 25(3), 131–142 (2019)

    Google Scholar 

  10. Petrov, I.S.: A problem of detection of compromised switchs in SDN. J. REDS: Telecommun. Devices Syst. 7(4), 515–518 (2017)

    Google Scholar 

  11. Grusho, A.A., Timonina, E.E., Shorgin, S.Y.: Modelling for ensuring information security of the distributed information systems. In: 31th European Conference on Modelling and Simulation Proceedings, pp. 656–660. Digitaldruck Pirrot GmbHP Dudweiler, Germany (2017)

    Google Scholar 

  12. Grusho, A., Timonina, E., Shorgin, S.: Security models based on stochastic meta data. In: Rykov, V.V., Singpurwalla, N.D., Zubkov, A.M. (eds.) ACMPT 2017. LNCS, vol. 10684, pp. 388–400. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-71504-9_32

    Chapter  Google Scholar 

  13. Grusho, A.A., Timonina, E.E., Shorgin, S.Y.: Hierarchical method of meta data generation for control of network connections. J. Inf. Appl. 12(2), 44–49 (2018)

    Google Scholar 

  14. Grusho, A., Grusho, N., Zabezhailo, M., Zatsarinny, A., Timonina, E.: Information security of SDN on the basis of meta data. In: Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V., Szczypiorski, K. (eds.) MMM-ACNS 2017. LNCS, vol. 10446, pp. 339–347. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-65127-9_27

    Chapter  Google Scholar 

  15. Grusho, A.A., Timonina, E.E., Shorgin, S.Y.: Overcoming of protection of the network where connections are controled by meta data. J. Syst. Means Inf. 28(4), 22–30 (2018)

    Google Scholar 

  16. Grusho, A.A., Zabezhailo, M.I., Zatsarinnyy, A.A., Nikolaev, A.V., Piskovski, V.O., Timonina, E.E.: Erroneous states classification in distributed computing systems and sources of their occurrence. J. Syst. Means Inf. 27(2), 30–41 (2017)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alexander Grusho .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Grusho, A., Grusho, N., Timonina, E. (2019). Information Flow Control on the Basis of Meta Data. In: Vishnevskiy, V., Samouylov, K., Kozyrev, D. (eds) Distributed Computer and Communication Networks. DCCN 2019. Lecture Notes in Computer Science(), vol 11965. Springer, Cham. https://doi.org/10.1007/978-3-030-36614-8_42

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-36614-8_42

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-36613-1

  • Online ISBN: 978-3-030-36614-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics