Abstract
Usually security of information flows is supported by Firewalls, Proxy servers, Intrusion Detection Systems. These mechanisms work when there can be malicious information flows. The paper presents the new security mechanism which can be used instead of traditional measures. This is due to the strong limitation of the existence of non needed information flows.
The main objective of our method is the prevention of interactions which are initiated by a malicious code. For the solution of this problem it is offered to define legal communications by meta data.
The review of the results connected with the usage of the method of meta data for creation of an authorization system of connections in a distributed information system and, in particular, in information systems on the basis of SDN is provided in the paper. It is shown that the found vulnerabilities can be compensated by means of an expansion of the functionality of controlling tasks \(\mathcal N\) and \(\mathcal M\), and by cryptography.
Using the fact that meta data reflect a reduced model of relationships of cause and effect in information technologies it is possible to solve an inverse problem connected with localization of failures and errors in data.
Partially supported by Russian Foundation for Basic Research (project 18-07-00274).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rieck, K., Stewin, P., Seifert, J.-P. (eds.): DIMVA 2013. LNCS, vol. 7967, 207 p. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-39235-1
Skorobogatov, S., Woods, C.: Breakthrough silicon scanning discovers backdoor in military chip. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 23–40. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-33027-8_2
Nilsson, N.J.: Problem-Solving Methods in Artificial Intelligence. McGraw-Hill Pub. Co., New York (1971)
TCSEC: Department of Defense Trusted Computer System Evaluation Criteria. DoD (1985)
Samuylov, K.E., Chukarin, A.V., Yarkina, N.V.: Business Processes and Information Technologies in Management of the Telecommunication Companies. Alpina Pablisherz, Moscow (2009)
Finn, V.K. (ed.): Automatic Hypotheses Generation in Intelligent Systems. KD “LIBROKOM”, Moscow (2009)
Tran, C.N., Danciu, V.: A general approach to conflict detection in software-defined networks. SN Comput. Sci. 1, 9 (2020). https://doi.org/10.1007/s142979-019-0009-9
Shu, Z., Wan, J., Li, D., Lin, J., Vasilakos, A.V., Imran, M.: Security in software-dened networking: threats and countermeasures. J. Mob. Netw. Appl. 21(5), 764–776 (2016). https://doi.org/10.1007/s11036-016-0676-x
Petrov, I.S.: Systems of detection of compromised switches in software-defined networks. J. Inf. Technol. 25(3), 131–142 (2019)
Petrov, I.S.: A problem of detection of compromised switchs in SDN. J. REDS: Telecommun. Devices Syst. 7(4), 515–518 (2017)
Grusho, A.A., Timonina, E.E., Shorgin, S.Y.: Modelling for ensuring information security of the distributed information systems. In: 31th European Conference on Modelling and Simulation Proceedings, pp. 656–660. Digitaldruck Pirrot GmbHP Dudweiler, Germany (2017)
Grusho, A., Timonina, E., Shorgin, S.: Security models based on stochastic meta data. In: Rykov, V.V., Singpurwalla, N.D., Zubkov, A.M. (eds.) ACMPT 2017. LNCS, vol. 10684, pp. 388–400. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-71504-9_32
Grusho, A.A., Timonina, E.E., Shorgin, S.Y.: Hierarchical method of meta data generation for control of network connections. J. Inf. Appl. 12(2), 44–49 (2018)
Grusho, A., Grusho, N., Zabezhailo, M., Zatsarinny, A., Timonina, E.: Information security of SDN on the basis of meta data. In: Rak, J., Bay, J., Kotenko, I., Popyack, L., Skormin, V., Szczypiorski, K. (eds.) MMM-ACNS 2017. LNCS, vol. 10446, pp. 339–347. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-65127-9_27
Grusho, A.A., Timonina, E.E., Shorgin, S.Y.: Overcoming of protection of the network where connections are controled by meta data. J. Syst. Means Inf. 28(4), 22–30 (2018)
Grusho, A.A., Zabezhailo, M.I., Zatsarinnyy, A.A., Nikolaev, A.V., Piskovski, V.O., Timonina, E.E.: Erroneous states classification in distributed computing systems and sources of their occurrence. J. Syst. Means Inf. 27(2), 30–41 (2017)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Grusho, A., Grusho, N., Timonina, E. (2019). Information Flow Control on the Basis of Meta Data. In: Vishnevskiy, V., Samouylov, K., Kozyrev, D. (eds) Distributed Computer and Communication Networks. DCCN 2019. Lecture Notes in Computer Science(), vol 11965. Springer, Cham. https://doi.org/10.1007/978-3-030-36614-8_42
Download citation
DOI: https://doi.org/10.1007/978-3-030-36614-8_42
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-36613-1
Online ISBN: 978-3-030-36614-8
eBook Packages: Computer ScienceComputer Science (R0)