Abstract: The architecture of the cloud data storage using Intel SGX technology is proposed. The approach offered in the article is provided to protect the user data on the cloud server from the attacks on the part of the provider and on the client personal computer from the malicious software. The developed architecture supports the group access to the data for several users. PubDate: 2018-12-01

Abstract: The implementation of mandatory distribution of access in distributed systems taking into account a user hierarchy is considered. The access control is based on the scheme of preliminary key distribution similar to KDP-scheme. The algorithm of building a family of subsets taking into account a user hierarchy was developed. PubDate: 2018-12-01

Abstract: —The asymptotics of spatially inhomogeneous periodic solutions of the complex, spatially distributed Hutchinson equation with periodic boundary conditions are presented. It is shown that such solutions are observable in a numerical experiment. PubDate: 2018-12-01

Abstract: — A method for detecting anomalies in the work of cyberphysical systems by analyzing a multidimensional time series is proposed. The method is based on the use of neural network technologies to predict the values of the time series of the system data and to identify deviations between the predicted value and the current data obtained from the sensors and actuators. The results of experimental studies are presented, which testify to the effectiveness of the proposed solution. PubDate: 2018-12-01

Abstract: — The goal of this article is raising the effectiveness of predicting the spread of information in social media. In order to achieve the set goal, the following scientific problem must be solved: based on the specified structure of a social network, typical algorithms of social interaction, statistics of coverage of certain profile groups of social media users, it is necessary to determine the probability distribution for the dissemination of destructive information in the social network, which will make it possible to predict its coverage of various social groups. PubDate: 2018-12-01

Abstract: Oscillations of an elastic beam with longitudinal compressions are investigated. The beam consists of two steel strips connected at the free ends. The compression is caused by tensioned thread. The oscillations are excited by the action of an alternating magnetic field on a magnet mounted at the end of the beam. The law of motion under changes of the frequency of harmonic action is registered. As a result of a full-scale experiment, a large set of data has been obtained. This set contains ordered periodic oscillations as well as disordered oscillations specific to dynamic systems with chaotic behavior. To study the invariant numerical characteristics of the attractor of the corresponding dynamic system, the correlation integral and correlation dimensionality as well as β-statentropy are calculated. A large numerical experiment showed that the calculation of β-statentropy is preferable compared with calculation of the correlation index. Based on the developed algorithms, the dependence of β-statentropy on the frequency of external action is constructed. The constructed dependence can serve as an effective tool to measure the adequacy of the mathematical model of forced oscillations of a beam with loss of stability. PubDate: 2018-12-01

Abstract: — Software-defined networks are a promising technology for constructing communication networks, where network management is the software that configures network devices. This contrasts the traditional approach based on configuring individual devices. This controlling software make it possible to dynamically route the configuration of data streams in the network, depending on service quality requirements. That said, however, it becomes necessary to ensure a secure data transfer [23], e.g., so that streams from confidential nodes could not reach an open segment of the network. The article shows how this task is solved by semantic tools. PubDate: 2018-12-01

Abstract: The article analyzes the information security threats arising when constructing digital production networks; presents the problems, which the cybersecurity control system should solve; and proposes an approach for implementing such systems. PubDate: 2018-12-01

Abstract: An approach is presented to the construction of a hierarchical security management system for large-scale dynamic communication networks (MANET, VANET, FANET, WSN, etc.) with the use of software-defined network technologies and supercomputer elastic computations. The results of experiments to evaluate the effectiveness of the proposed approach are presented. PubDate: 2018-12-01

Abstract: The methods of protection against attacks on the ad hoc networks in the self-organizing cyber-physical systems are analyzed in the article, and their issues are identified. The authors propose an adaptive management method for the ad hoc network topology, where the blockchain-like directed acyclic graph is applied to solve the identified issues. PubDate: 2018-12-01

Abstract: — The noise immunity of single noncoherent reception algorithms optimal in communication and monitoring channels of automated information systems with noise and concentrated interference under complex effect of fluctuating, concentrated, and impulse noise is investigated. Equations for error probabilities are obtained. Calculation examples are given. PubDate: 2018-12-01

Abstract: To ensure traffic safety of railway transport, non-destructive testing of rails is regularly carried out by using various approaches and methods, including magnetic and eddy current flaw detection methods. An automatic analysis of large data sets (defectgrams) that come from the corresponding equipment is still an actual problem. The analysis means a process of determining the presence of defective sections along with identifying structural elements of railway tracks on defectograms. At the same time, under the conditions of significant volumes of incoming information, fast and efficient algorithms of data analysis are of most interest. This article is an addition to the previous article devoted to the problem of automatic determination of a threshold level of amplitudes of useful signals (from defects and structural elements of a railway track) during the analysis of defectograms (records) of magnetic and eddy current flaw detectors, which contains an algorithm for finding the threshold level of a rail noise and its theoretical justification with examples of its operation on several fragments of real magnetic and eddy current defectograms. The article presents a simple and effective implementation of the algorithm, which is successfully used in practice for the automatic analysis of magnetic and eddy current defectograms. PubDate: 2018-12-01

Abstract: — This article presents a comparative analysis of available solutions in authenticating access subjects in computer-aided information and telecommunication systems. Centralized and decentralized public key infrastructures (PKIs) are considered, and their weaknesses are brought to light. A blockchain model of decentralized PKI for access subject authentication in computer-aided information and telecommunication systems is proposed. The current embodiments of blockchain PKIs are checked for compliance with the proposed model. PubDate: 2018-12-01

Abstract: — This work considers the possibility of recovering valuable information when an intruder knows the results of information conversion and conversion in the framework of some information technology. The forest-type model of processable information is built. Approaches to protecting valuable information are investigated. PubDate: 2018-12-01

Abstract: — This paper investigates the problem of ensuring secure input/output operations in the Intel SGX technology. The problem is extremely urgent, and its solution will make it possible to protect confidential user data from attacks from different malicious software while finding data outside the enclave. The authors present different methods for solving the posed problem developed by them. The complexity of the practical application of these methods as well as their main disadvantages and advantages are analyzed. The most preferred method which ensures secure storage and processing of data outside the enclave is also chosen. PubDate: 2018-12-01

Abstract: The article studies the architectures of the modern systems of decentralized data storage and processing, applicability of the blockchain technology in these systems, existing security threats in comparison with the decentralized systems, and methods of security assurance allowing avoidance of these threats. PubDate: 2018-12-01

Abstract: This paper is devoted to clarification of tree centroid properties. The authors attention was drawn to the popular problem of a (binary) partition of a graph, whose solution is known only by a brute force algorithm. It was found that for an “efficient” partition of the tree, it makes sense to consider partitions in the neighborhood of centroid vertices, the definition of which is presented. In the paper, we proposed proofs connected with the limitation of their weight. It is also proven that if there are two centroid vertices in a tree, they are adjacent. In what follows, it is noted that three such vertices cannot be in a tree. The corresponding statements are made. According to the first one, any vertex of a tree with a certain restriction on its weight is a centroid. According to one of the points of the second statement, if there are two centroid vertices in a tree, the order of the tree is an even number. The third statement says that if a tree has a centroid vertex of limited weight, there is another centroid vertex of the same weight, adjacent to the first one. To prove these statements, we consider a branch of the greatest weight with a centroid vertex and take another vertex adjacent to the centroid in this branch. In this paper, Jordan’s theorem is used; three images are used to illustrate the material. PubDate: 2018-12-01

Abstract: — This article presents mathematical tools of wavelet transformations for use in detecting network traffic attacks. The technique consists in discrete wavelet transformation of parameters of network packets extracted from traffic and tracking the degree of dependence of various network traffic parameters using the multiple correlation coefficient. The efficiency of the proposed technique is shown in the results of experimental detections of SYN flood DoS attacks. PubDate: 2018-12-01

Abstract: A modification is presented of the scheme of preliminary Blom’s key distribution taking into account the direction of information flows. The modification makes it necessary to use a function of three variables. The function of forming key materials ceases to be symmetrical. An exponential form of this function was proposed, which does not increase the amount of key materials. PubDate: 2018-12-01

Abstract: The paper considers methods of program transformation equivalent to optimizing the cycle invariant, applied to the functional data-flow model implemented in the Pifagor programming language. Optimization of the cycle invariant in imperative programming languages is reduced to a displacement from the cycle of computations that do not depend on variables that are changes in the loop. A feature of the functional data flow parallel programming language Pifagor is the absence of explicitly specified cyclic computations (the loop operator). However, recurring calculations in this language can be specified recursively or by applying specific language constructs (parallel lists). Both mechanisms provide the possibility of parallel execution. In the case of optimizing a recursive function, repeated calculations are carried out into an auxiliary function, the main function performing only the calculation of the invariant. When optimizing the invariant in computations over parallel lists, the calculation of the invariant moves from the function that executes over the list items to the function containing the call. The paper provides a definition of “invariant” applied to the Pifagor language, algorithms for its optimization, and examples of program source codes, their graph representations (the program dependence graph) before and after optimization. The algorithm shown for computations over parallel lists is applicable only to the Pifagor language, because it rests upon specific data structures and the computational model of this language. However, the algorithm for transforming recursive functions may be applied to other programming languages. PubDate: 2018-12-01