Skip to main content
Top
Published in:
Cover of the book

2018 | OriginalPaper | Chapter

1. The Relevance of the Early Warning of Cyber-attacks

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

It is proved that the problem of information security of the critical infrastructure of the Russian Federation is one of the most important goals of ensuring digital sovereignty and defense capability of the state. The main threats to the information security of the Russian Federation are introduced. They include threats of military-political, terrorist, and criminogenic nature. The necessity of an integrated approach to information security not only at the national but also at the external policy level is explained. The current state of the problem of detection and prevention of cyber-attacks is assessed. Prospective assignments of alerting and anticipation tasks, as well as timely detection and neutralization of cyber-attacks, are considered.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
3
Dictionary of military and related terms: US Department of Defense. – 2011. – P. 92–93
 
4
Protection of communication infrastructure. Technical Journal of Bell Laboratories. – Special Issue: Internal Security. – Volume 9. – Issue 2. – 2004
 
5
Glossary of terms and definitions in the field of information security:2nd ed., enlarged and revised. Military Academy of the General Staff of the Armed Forces of the Russian Federation. Research Center for Information Security. – M. – 2008. – P. 40
 
Literature
1.
go back to reference The Information Security Doctrine of the Russian Federation (approved by the Decree of the President of the Russian Federation No. 646 of December 5, 2016). The Information Security Doctrine of the Russian Federation (approved by the Decree of the President of the Russian Federation No. 646 of December 5, 2016).
3.
go back to reference Abramov, S.M.: Research in the field of supercomputer technologies of the IPS RAS: a retrospective and perspective. In: Proceedings of the International Conference “Software Systems: Theory and Applications”, vol. 1, pp. 153–192. Publishing house “University of Pereslavl”, Pereslavl (2009) Abramov, S.M.: Research in the field of supercomputer technologies of the IPS RAS: a retrospective and perspective. In: Proceedings of the International Conference “Software Systems: Theory and Applications”, vol. 1, pp. 153–192. Publishing house “University of Pereslavl”, Pereslavl (2009)
4.
go back to reference Abramov, S.M.: History of development and implementation of a series of Russian supercomputers with cluster architecture. In: History of Domestic Electronic Computers. 2nd edn, Rev. and additional; color. Ill.: Publishing house “Capital Encyclopedia”, Moscow (2016) Abramov, S.M.: History of development and implementation of a series of Russian supercomputers with cluster architecture. In: History of Domestic Electronic Computers. 2nd edn, Rev. and additional; color. Ill.: Publishing house “Capital Encyclopedia”, Moscow (2016)
5.
go back to reference Abramov, S.M., Lilitko, E.P.: State and prospects of ultra-high performance computing systems development. Inf. Technol. Comput. Syst. 2, 6–22 (2013) Abramov, S.M., Lilitko, E.P.: State and prospects of ultra-high performance computing systems development. Inf. Technol. Comput. Syst. 2, 6–22 (2013)
16.
go back to reference Alekseeva, I.Y., et al.: Information Challenges of National and International Security; [under the Society. ed. A. V. Fedorova, VN Tsigichko], 328 p. PIR Center, Moscow (2001) Alekseeva, I.Y., et al.: Information Challenges of National and International Security; [under the Society. ed. A. V. Fedorova, VN Tsigichko], 328 p. PIR Center, Moscow (2001)
17.
go back to reference Alessandri, D., et al.: Towards a Taxonomy of Intrusion-Detection Systems and Attacks. Zurich, IBM Research Division (2001) Alessandri, D., et al.: Towards a Taxonomy of Intrusion-Detection Systems and Attacks. Zurich, IBM Research Division (2001)
18.
go back to reference Almgren, M.: Consolidation and evaluation of IDS taxonomies. In: Proceedings of the Eight Nordic Workshop on Secure IT Systems, NordSec 2003 Almgren, M.: Consolidation and evaluation of IDS taxonomies. In: Proceedings of the Eight Nordic Workshop on Secure IT Systems, NordSec 2003
20.
go back to reference An Open, Safe and Secure Cyberspace. Joint communication to the European Parliament, the Council, the European Economic and Social committee and the Committee of the Regions Cybersecurity Strategy of the European Union of the European Commission and Higher Representative for foreign affairs and security policy. Brussels (2013) [Electronic resource]. Access mode: http://ec.europa.eu/information_society/newsroom/ An Open, Safe and Secure Cyberspace. Joint communication to the European Parliament, the Council, the European Economic and Social committee and the Committee of the Regions Cybersecurity Strategy of the European Union of the European Commission and Higher Representative for foreign affairs and security policy. Brussels (2013) [Electronic resource]. Access mode: http://​ec.​europa.​eu/​information_​society/​newsroom/​
21.
go back to reference Anderson, J.P.: Computer Security Threat Monitoring and Surveillance. James P. Anderson Co., Fort Washington, PA (1980) Anderson, J.P.: Computer Security Threat Monitoring and Surveillance. James P. Anderson Co., Fort Washington, PA (1980)
22.
go back to reference Andreev, V.V., Zdiruk, K.B.: IV Jupiter: implementation of corporate security policy in computer networks. Open. Syst. 7–8, 43–46 (2003) Andreev, V.V., Zdiruk, K.B.: IV Jupiter: implementation of corporate security policy in computer networks. Open. Syst. 7–8, 43–46 (2003)
25.
go back to reference Arbatov A.G. Real and imaginary threats: Military power in world politics in the beginning of the XXI century. [Electronic resource] AG Arbatov. Russia in global politics. March 3, 2013. Access mode: http://www.global- affairs.ru/number/Ugrozy-realnye-i-mnimye-15863 Arbatov A.G. Real and imaginary threats: Military power in world politics in the beginning of the XXI century. [Electronic resource] AG Arbatov. Russia in global politics. March 3, 2013. Access mode: http://​www.​global- affairs.ru/number/Ugrozy-realnye-i-mnimye-15863
26.
go back to reference Aristotle. Comp. in 4 volumes (Series “Philosophical heritage”). Thought, Moscow. (1975–1983) Aristotle. Comp. in 4 volumes (Series “Philosophical heritage”). Thought, Moscow. (1975–1983)
27.
go back to reference Arquilla, J.: Ethics and information warfare. In: Khalilzad, Z., White, J., Marsall, A. (eds.) Strategic Appraisal: The Changing Role of Information in Warfare, 475 p. RAND Corporation, Santa Monica (1999) Arquilla, J.: Ethics and information warfare. In: Khalilzad, Z., White, J., Marsall, A. (eds.) Strategic Appraisal: The Changing Role of Information in Warfare, 475 p. RAND Corporation, Santa Monica (1999)
28.
go back to reference Ashby, U.R.: Principles of Self-Organization, pp. 314–343. Mir, Moscow (1966) Ashby, U.R.: Principles of Self-Organization, pp. 314–343. Mir, Moscow (1966)
29.
go back to reference Axelsson, S.: Intrusion Detection Systems: A Taxonomy and Survey. Technical Report 99–15. Department of Computer Engineering, Chalmers University of Technology, Goteborg (2000) Axelsson, S.: Intrusion Detection Systems: A Taxonomy and Survey. Technical Report 99–15. Department of Computer Engineering, Chalmers University of Technology, Goteborg (2000)
30.
go back to reference Barabanov, A.V., Markov, A.S., Tsirlov, V.L.: Methodological framework for analysis and synthesis of a set of secure software development controls. J. Theor. Appl. Info. Technol. 88(1), 77–88 (2016) Barabanov, A.V., Markov, A.S., Tsirlov, V.L.: Methodological framework for analysis and synthesis of a set of secure software development controls. J. Theor. Appl. Info. Technol. 88(1), 77–88 (2016)
31.
go back to reference Barabanov, A., Lavrov, A., Markov, A., Polotnyanschikov, I., Tsirlov, V.: The study into cross-site request forgery attacks within the framework of analysis of software vulnerabilities. In: Preliminary proceedings of the 11th Spring/Summer Young Researchers’ Colloquium on Software Engineering (Innopolis, Republic of Tatarstan, Russian Federation, June 5–7, 2017), pp. 105–109. SYRCoSE, ISP RAS Barabanov, A., Lavrov, A., Markov, A., Polotnyanschikov, I., Tsirlov, V.: The study into cross-site request forgery attacks within the framework of analysis of software vulnerabilities. In: Preliminary proceedings of the 11th Spring/Summer Young Researchers’ Colloquium on Software Engineering (Innopolis, Republic of Tatarstan, Russian Federation, June 5–7, 2017), pp. 105–109. SYRCoSE, ISP RAS
32.
go back to reference Baranov, P.A.: Detection of anomalies based on the application of the criterion of the dispersion degree. Proceedings of the XIV All-Russian Scientific Conference “Information Security Problems in the Higher School System”, pp. 25–27. Izd. department of the St. Petersburg State Polytechnic University, St. Petersburg (2007) Baranov, P.A.: Detection of anomalies based on the application of the criterion of the dispersion degree. Proceedings of the XIV All-Russian Scientific Conference “Information Security Problems in the Higher School System”, pp. 25–27. Izd. department of the St. Petersburg State Polytechnic University, St. Petersburg (2007)
33.
go back to reference Batueva, E.V.: American concept of threats to information security and its international political component, 207 p. Doctoral thesis of political sciences. MGIMO (U) Ministry of Foreign Affairs of the Russian Federation, Moscow (2014) Batueva, E.V.: American concept of threats to information security and its international political component, 207 p. Doctoral thesis of political sciences. MGIMO (U) Ministry of Foreign Affairs of the Russian Federation, Moscow (2014)
34.
go back to reference Bedritsky, A.V.: American policy of cyber space control. Probl. Natl. Strat. 2(3), 25–40 (2010) Bedritsky, A.V.: American policy of cyber space control. Probl. Natl. Strat. 2(3), 25–40 (2010)
35.
go back to reference Bedritsky, A.V.: Information War: Concepts and Their Implementation in the US, 183p. RISI, Moscow (2008) Bedritsky, A.V.: Information War: Concepts and Their Implementation in the US, 183p. RISI, Moscow (2008)
36.
go back to reference Bedritsky, A.V.: The Evolution of the American Concept of Information War, 26p. RISI, Moscow. Analytical Rev. (3) (2003) Bedritsky, A.V.: The Evolution of the American Concept of Information War, 26p. RISI, Moscow. Analytical Rev. (3) (2003)
37.
go back to reference Biryukov, D.N.: Cognitive-functional memory specification for simulation of purposeful behavior of cyber systems. Proc. SPIIRAS. 3(40), 55–76 (2015)CrossRef Biryukov, D.N.: Cognitive-functional memory specification for simulation of purposeful behavior of cyber systems. Proc. SPIIRAS. 3(40), 55–76 (2015)CrossRef
38.
go back to reference Biryukov, D.N., Lomako, A.G.: Denotational semantics of knowledge contexts in ontological modeling of the subject areas of conflict. Proc. SPIIRAS. 5(42), 155–179 (2015) Biryukov, D.N., Lomako, A.G.: Denotational semantics of knowledge contexts in ontological modeling of the subject areas of conflict. Proc. SPIIRAS. 5(42), 155–179 (2015)
39.
go back to reference Biryukov, D.N., Glukhov, A.P., Pilkevich, S.V., Sabirov, T.R.: Approach to the processing of knowledge in the memory of an intellectual system. Natur. Tech. Sci. 11, 455–466 (2015) Biryukov, D.N., Glukhov, A.P., Pilkevich, S.V., Sabirov, T.R.: Approach to the processing of knowledge in the memory of an intellectual system. Natur. Tech. Sci. 11, 455–466 (2015)
40.
go back to reference Biryukov, D.N., Lomako, A.G.: Approach to the construction of information security systems capable of synthesizing scenarios of anticipatory behavior in the information conflict. Protect. Inf. Inside. 6(60), 42–50 (2014) Biryukov, D.N., Lomako, A.G.: Approach to the construction of information security systems capable of synthesizing scenarios of anticipatory behavior in the information conflict. Protect. Inf. Inside. 6(60), 42–50 (2014)
41.
go back to reference Biryukov, D.N., Lomako, A.G.: The formalization of semantics for representation of knowledge about the behavior of conflicting parties: materials of the 22nd scientific-practical conference “Methods and technical means of information security”, pp. 8–11. Publishing house of Polytechnic University, St. Petersburg (2013) Biryukov, D.N., Lomako, A.G.: The formalization of semantics for representation of knowledge about the behavior of conflicting parties: materials of the 22nd scientific-practical conference “Methods and technical means of information security”, pp. 8–11. Publishing house of Polytechnic University, St. Petersburg (2013)
42.
go back to reference Biryukov, D.N., Lomako, A.G., Petrenko, S.A.: Generating scenarios for preventing cyber-attacks. Protect. Inf. Inside. 4(76) (2017) Biryukov, D.N., Lomako, A.G., Petrenko, S.A.: Generating scenarios for preventing cyber-attacks. Protect. Inf. Inside. 4(76) (2017)
43.
go back to reference Biryukov, D.N., Lomako, A.G., Rostovtsev, Y.G.: The appearance of anticipatory systems to prevent the risks of cyber threat realization. Proc. SPIIRAS. 2(39), 5–25 (2015)CrossRef Biryukov, D.N., Lomako, A.G., Rostovtsev, Y.G.: The appearance of anticipatory systems to prevent the risks of cyber threat realization. Proc. SPIIRAS. 2(39), 5–25 (2015)CrossRef
44.
go back to reference Biryukov, D.N., Lomako, A.G., Sabirov, T.R.: Multilevel Modeling of Pre-Emptive Behavior Scenarios. Problems of Information Security. Computer systems, vol. 4, pp. 41–50. Publishing house of Polytechnic University, St. Petersburg (2014) Biryukov, D.N., Lomako, A.G., Sabirov, T.R.: Multilevel Modeling of Pre-Emptive Behavior Scenarios. Problems of Information Security. Computer systems, vol. 4, pp. 41–50. Publishing house of Polytechnic University, St. Petersburg (2014)
45.
go back to reference Biryukov, D.N., Rostovtsev, Y.G.: Approach to constructing a consistent theory of synthesis of scenarios of anticipatory behavior in a conflict. Proc. SPIIRAS. 1(38), 94–111 (2015)CrossRef Biryukov, D.N., Rostovtsev, Y.G.: Approach to constructing a consistent theory of synthesis of scenarios of anticipatory behavior in a conflict. Proc. SPIIRAS. 1(38), 94–111 (2015)CrossRef
46.
go back to reference Biryukov, D.N., Lomako, A.G.: Approach to Building a Cyber Threat Prevention System. Problems of Information Security. Computer systems, vol. 2, pp. 13–19. Publishing house of Polytechnic University, St. Petersburg (2013) Biryukov, D.N., Lomako, A.G.: Approach to Building a Cyber Threat Prevention System. Problems of Information Security. Computer systems, vol. 2, pp. 13–19. Publishing house of Polytechnic University, St. Petersburg (2013)
47.
go back to reference Bocharov, V.A., Markin, V.I.: Fundamentals of Logic. Moscow State University, Moscow (2008) Bocharov, V.A., Markin, V.I.: Fundamentals of Logic. Moscow State University, Moscow (2008)
48.
go back to reference Boev, S.F., Kochkarov, A.A., Stupin, D.D.: Development of R & D activities of high-tech B2G-holdings: problems and tasks. Qual. Innov. Educ. 11(78), 54–59 (2011) Boev, S.F., Kochkarov, A.A., Stupin, D.D.: Development of R & D activities of high-tech B2G-holdings: problems and tasks. Qual. Innov. Educ. 11(78), 54–59 (2011)
49.
go back to reference Boev, S.F., Kochkarov, A.A., Stupin, D.D.: The role and possibilities of pre-university training in the problem of the formation of highly qualified specialists for high-tech branches of the real economy and the experience of the RTI Systems Concern: materials of the International Scientific Conference “Forming the Identity of Finno-Ugric world and Russian education”, pp. 330–333. Mordovian state publishing house University, Saransk (2011) Boev, S.F., Kochkarov, A.A., Stupin, D.D.: The role and possibilities of pre-university training in the problem of the formation of highly qualified specialists for high-tech branches of the real economy and the experience of the RTI Systems Concern: materials of the International Scientific Conference “Forming the Identity of Finno-Ugric world and Russian education”, pp. 330–333. Mordovian state publishing house University, Saransk (2011)
50.
go back to reference Bongard, M.M.: The Problem of Recognition. Fizmatgiz, Moscow (1967) Bongard, M.M.: The Problem of Recognition. Fizmatgiz, Moscow (1967)
51.
go back to reference Brennen, S.: Cyberthreats and the Decline of the Nation-state, 175 p. Susan W. Brenner. Routledge, Abingdon (2014) Brennen, S.: Cyberthreats and the Decline of the Nation-state, 175 p. Susan W. Brenner. Routledge, Abingdon (2014)
52.
go back to reference Brenner, J.: America the Vulnerable, 308 p. Joel Brenner. Penguin Press, New York (2011) Brenner, J.: America the Vulnerable, 308 p. Joel Brenner. Penguin Press, New York (2011)
53.
go back to reference Carr, J.: Inside Cyber Warfare, 213 p. Jeffrey Carr. O’Reilly (2010) Carr, J.: Inside Cyber Warfare, 213 p. Jeffrey Carr. O’Reilly (2010)
54.
go back to reference Cavelty, M.: Cyber-Security and Threat Politics: US Efforts to Secure the Information Age, 182 p. Myriam Dunn Cavelty. Routledge, New York (2007) Cavelty, M.: Cyber-Security and Threat Politics: US Efforts to Secure the Information Age, 182 p. Myriam Dunn Cavelty. Routledge, New York (2007)
55.
go back to reference Chereshkin, D.S.: Problems of Information Security Management, 224 p. Editorial URSS, Moscow (2002) Chereshkin, D.S.: Problems of Information Security Management, 224 p. Editorial URSS, Moscow (2002)
56.
go back to reference Clarifying Cybersecurity Responsibilities and Activities of the Executive Office of the President and the Department of Homeland Security. Memorandum. Executive Office of the President Office of Management and Budget, Washington, DC. July 6, 2010 [Electronic resource]. Access mode: http://www.whitehouse.gov/sites/default/files/omb/assets/memoranda_2010/m10-28.pdf Clarifying Cybersecurity Responsibilities and Activities of the Executive Office of the President and the Department of Homeland Security. Memorandum. Executive Office of the President Office of Management and Budget, Washington, DC. July 6, 2010 [Electronic resource]. Access mode: http://​www.​whitehouse.​gov/​sites/​default/​files/​omb/​assets/​memoranda_​2010/​m10-28.​pdf
57.
go back to reference Clark, R., Nake, R.: The Third World War. What Will It Be Like? Publishing house “Peter”, St. Petersburg (2011) Clark, R., Nake, R.: The Third World War. What Will It Be Like? Publishing house “Peter”, St. Petersburg (2011)
59.
go back to reference Clarke, R.: Cyber War the Next Threat to National Security and What to Do About It. In: Richard A. Clarke, Robert K. Knake, 290 p. HarperCollins (2010) Clarke, R.: Cyber War the Next Threat to National Security and What to Do About It. In: Richard A. Clarke, Robert K. Knake, 290 p. HarperCollins (2010)
61.
go back to reference Clayton, M.: Presidential Cyberwar Directive Gives Pentagon Long-awaited Marching Orders. The Christian Science Monitor. June 10, 2013 – [Electronic resource]. Access mode: http://www.csmonitor.com/USA/Military/2013/0610/Presidential-cyberwardirective-gives-Pentagon-long-awaited-marching-orders-video Clayton, M.: Presidential Cyberwar Directive Gives Pentagon Long-awaited Marching Orders. The Christian Science Monitor. June 10, 2013 – [Electronic resource]. Access mode: http://​www.​csmonitor.​com/​USA/​Military/​2013/​0610/​Presidential-cyberwardirectiv​e-gives-Pentagon-long-awaited-marching-orders-video
63.
go back to reference Collins, A.M., Quillian, M.R.: Retrieval time from semantic memory. J. Verbal Learn. Verbal Behav. 8, 240–247 (1969)CrossRef Collins, A.M., Quillian, M.R.: Retrieval time from semantic memory. J. Verbal Learn. Verbal Behav. 8, 240–247 (1969)CrossRef
64.
go back to reference Communication from the Commission to the European Parliament and the Council. The EU Internal Security Strategy in Action: Five steps towards a more secure Europe. Brussels, 22.11.2010. COM (2010) Communication from the Commission to the European Parliament and the Council. The EU Internal Security Strategy in Action: Five steps towards a more secure Europe. Brussels, 22.11.2010. COM (2010)
69.
go back to reference Crimes involving the use of a computer network. The Tenth United Nations Congress on the Prevention of Crime and the Treatment of Offenders. Document A / CONF.187 / 10 of 3 February 1999 Crimes involving the use of a computer network. The Tenth United Nations Congress on the Prevention of Crime and the Treatment of Offenders. Document A / CONF.187 / 10 of 3 February 1999
71.
go back to reference Critical Infrastructure Security and Resilience: Presidential Policy Directive/PPD-21. The White House, Washington, DC. February 12, 2013 Critical Infrastructure Security and Resilience: Presidential Policy Directive/PPD-21. The White House, Washington, DC. February 12, 2013
75.
go back to reference Cyber Security Report. European Сommission. 2015. [Electronic resource]. Access mode: http://ec.europa.eu/COMMFrontOffice/PublicOpinion/index.cfm/Survey/getSurveyDetail/yearFrom/1973/yearTo/2016/search/cyber/surveyKy/2019. Accessed 10 Apr 2016 Cyber Security Report. European Сommission. 2015. [Electronic resource]. Access mode: http://​ec.​europa.​eu/​COMMFrontOffice/​PublicOpinion/​index.​cfm/​Survey/​getSurveyDetail/​yearFrom/​1973/​yearTo/​2016/​search/​cyber/​surveyKy/​2019.​ Accessed 10 Apr 2016
76.
go back to reference Cyberpower and National Security [ed. F. Kramer, S. Starr, and L. Wentz], 664 p. Potomac Books Inc. (2009) Cyberpower and National Security [ed. F. Kramer, S. Starr, and L. Wentz], 664 p. Potomac Books Inc. (2009)
80.
go back to reference Debar H., et al.: (IBM Zurich). Towards a Taxonomy of Intrusion-Detection Systems. IBM Research Division, Zurich (1999) Debar H., et al.: (IBM Zurich). Towards a Taxonomy of Intrusion-Detection Systems. IBM Research Division, Zurich (1999)
81.
go back to reference Decree of the Government of the Russian Federation of 04 September 2003 No. 547 “On the preparation of the population in the field of protection from natural and man-made emergency situations” Decree of the Government of the Russian Federation of 04 September 2003 No. 547 “On the preparation of the population in the field of protection from natural and man-made emergency situations”
82.
go back to reference Decree of the Government of the Russian Federation of December 30, 2003 No. 794 “On Unified State System for the Prevention and Elimination of Emergency Situations” Decree of the Government of the Russian Federation of December 30, 2003 No. 794 “On Unified State System for the Prevention and Elimination of Emergency Situations”
86.
go back to reference Denning, D.: Information Warfare and Security, 522 p. ACM Press, New York (1999) Denning, D.: Information Warfare and Security, 522 p. ACM Press, New York (1999)
88.
go back to reference Denning, D.: Reflections on cyberweapons controls. Comput. Security J. XVI(4), 43–53 (2000) Denning, D.: Reflections on cyberweapons controls. Comput. Security J. XVI(4), 43–53 (2000)
89.
go back to reference Denning, D.E., (SRI International): An intrusion detection model. IEEE Trans. Softw. Eng. (SE-13), 2, 222–232 (1987) Denning, D.E., (SRI International): An intrusion detection model. IEEE Trans. Softw. Eng. (SE-13), 2, 222–232 (1987)
93.
go back to reference Dunlap, C. Jr.: Perspectives for cyber strategists on law for cyberwar (Charles J. Dunlap Jr.). Strateg. Stud. Q. Spring, 81–99 (2011) Dunlap, C. Jr.: Perspectives for cyber strategists on law for cyberwar (Charles J. Dunlap Jr.). Strateg. Stud. Q. Spring, 81–99 (2011)
96.
go back to reference Ermakov, S.M.: Transformation of NATO after the Lisbon Summit in 2010: from the defense of the territory to the protection of the public domain. Probl. Natl. Strateg. 4(9), 107–128 (2011) Ermakov, S.M.: Transformation of NATO after the Lisbon Summit in 2010: from the defense of the territory to the protection of the public domain. Probl. Natl. Strateg. 4(9), 107–128 (2011)
98.
go back to reference The concept of foreign policy of the Russian Federation (approved by the Decree of the President of the Russian Federation of November 30, 2016 No. 640 The concept of foreign policy of the Russian Federation (approved by the Decree of the President of the Russian Federation of November 30, 2016 No. 640
99.
go back to reference The concept of the development of an intelligent electric power system in Russia with an actively adaptive network. OJSC “FGC UES” OJSC “Scientific and technological center of electric power industry”. Moscow (2011) The concept of the development of an intelligent electric power system in Russia with an actively adaptive network. OJSC “FGC UES” OJSC “Scientific and technological center of electric power industry”. Moscow (2011)
100.
go back to reference The concept of the state system for detecting, preventing and eliminating the consequences of computer attacks on the information resources of the Russian Federation (approved by the President of the Russian Federation on December 12, 2014, No. K 1274) The concept of the state system for detecting, preventing and eliminating the consequences of computer attacks on the information resources of the Russian Federation (approved by the President of the Russian Federation on December 12, 2014, No. K 1274)
101.
go back to reference The Economic Impact of Cybercrime and Cyber Espionage. The Center for Strategic and International Studies Report. July 2013. 19 p. [Electronic resource]. Access mode: http://csis.org/files/publication/60396rpt_cybercrimecost_0713_ph4_0.pdf The Economic Impact of Cybercrime and Cyber Espionage. The Center for Strategic and International Studies Report. July 2013. 19 p. [Electronic resource]. Access mode: http://​csis.​org/​files/​publication/​60396rpt_​cybercrimecost_​0713_​ph4_​0.​pdf
103.
go back to reference The national security strategy of the Russian Federation (approved by the Decree of the President of the Russian Federation of December 31, 2015, No. 683 The national security strategy of the Russian Federation (approved by the Decree of the President of the Russian Federation of December 31, 2015, No. 683
104.
go back to reference The Order of the Ministry of Emergency Measures of the Russian Federation from February, 28th, 2003 № 105. On the statement of requirements on the prevention of extreme situations on potentially dangerous objects and objects of life-support The Order of the Ministry of Emergency Measures of the Russian Federation from February, 28th, 2003 № 105. On the statement of requirements on the prevention of extreme situations on potentially dangerous objects and objects of life-support
105.
109.
go back to reference Thomas, T.: Cyber Silhouettes. Shadows Over Information Operations, 334 p. Timothy L. Thomas. Foreign Military Studies Office (FMSO). Fort Leavenworth (2005) Thomas, T.: Cyber Silhouettes. Shadows Over Information Operations, 334 p. Timothy L. Thomas. Foreign Military Studies Office (FMSO). Fort Leavenworth (2005)
110.
go back to reference Thomas, T.: Is the IW paradigm outdated? A discussion of U.S. IW theory. J. Inf. Warfare. 2(3), 109–116 (2003) Thomas, T.: Is the IW paradigm outdated? A discussion of U.S. IW theory. J. Inf. Warfare. 2(3), 109–116 (2003)
112.
go back to reference Toffler, A.: War and Anti-War: Survival at the Down of the Twenty-First Century, 1st edn, 302 p. Alvin and Heidi Toffler (1993) Toffler, A.: War and Anti-War: Survival at the Down of the Twenty-First Century, 1st edn, 302 p. Alvin and Heidi Toffler (1993)
113.
go back to reference Toffler, E.: The Third Wave, 784 p. AST, Moscow (2010) Toffler, E.: The Third Wave, 784 p. AST, Moscow (2010)
114.
go back to reference Tsygichko, V.N., Votrin, D.S., Krutskikh, A.V., Smolyan, G.L., Chereshkin, D.S.: Information Weapons Are a New Challenge to International Security, 52 p. Institute of System Analysis of the Russian Academy of Sciences, Moscow (2000) Tsygichko, V.N., Votrin, D.S., Krutskikh, A.V., Smolyan, G.L., Chereshkin, D.S.: Information Weapons Are a New Challenge to International Security, 52 p. Institute of System Analysis of the Russian Academy of Sciences, Moscow (2000)
115.
go back to reference Tulving E. Episodic and Semantic Memory. Organization of Memory New York: Academic, 1972. Р. 381–403. Tulving E. Episodic and Semantic Memory. Organization of Memory New York: Academic, 1972. Р. 381–403.
117.
go back to reference Vasyutin, S.V., Zavyalov, S.S.: Neural network method for analyzing the sequence of system calls for the detection of computer attacks and the classification of application modes. Methods and Means of Information Processing: Proceedings of the Second All-Russian Scientific Conference; [ed. member corr. RAS L.N. Koroleva], pp. 142–147. Pub. Department of the Factor of Computational Mathematics and Cybernetics of the Moscow State University. M.V. Lomonosov, Moscow (2005) Vasyutin, S.V., Zavyalov, S.S.: Neural network method for analyzing the sequence of system calls for the detection of computer attacks and the classification of application modes. Methods and Means of Information Processing: Proceedings of the Second All-Russian Scientific Conference; [ed. member corr. RAS L.N. Koroleva], pp. 142–147. Pub. Department of the Factor of Computational Mathematics and Cybernetics of the Moscow State University. M.V. Lomonosov, Moscow (2005)
120.
go back to reference Weimann, G.: Special Report 116: www.terror.net How Modern Terrorism Uses the Internet/United Institute of Peace, March 2004. [Electronic resource]. Access mode: http://dspace.cigilibrary.org/jspui/bitstream/123456789/4610/1/www%20terror%20net%20How%20Modern%20Terrorism%20Uses %20the%20Internet.pdf? Weimann, G.: Special Report 116: www.​terror.​net How Modern Terrorism Uses the Internet/United Institute of Peace, March 2004. [Electronic resource]. Access mode: http://​dspace.​cigilibrary.​org/​jspui/​bitstream/​123456789/​4610/​1/​www%20terror%20net%20How%20Modern%20Terrorism%20Uses %20the%20Internet.pdf?
121.
go back to reference Petrenko, A.A., Petrenko, S.A.: Cyber units: methodical recommendations of ENISA. Quest. Cybersecurity. 3(11), 2–14 (2015) Petrenko, A.A., Petrenko, S.A.: Cyber units: methodical recommendations of ENISA. Quest. Cybersecurity. 3(11), 2–14 (2015)
122.
go back to reference Petrenko, A.A., Petrenko, S.A.: The way to increase the stability of LTE-network in the conditions of destructive cyber-attacks. Quest. Cybersecurity. 2(10), 36–42 (2015) Petrenko, A.A., Petrenko, S.A.: The way to increase the stability of LTE-network in the conditions of destructive cyber-attacks. Quest. Cybersecurity. 2(10), 36–42 (2015)
123.
go back to reference Petrenko, S.A.: Methods of ensuring the stability of the functioning of cyber systems under conditions of destructive effects. Proceedings of the ISA RAS. Risk Manag. Security, 52, 106–151 (2010) Petrenko, S.A.: Methods of ensuring the stability of the functioning of cyber systems under conditions of destructive effects. Proceedings of the ISA RAS. Risk Manag. Security, 52, 106–151 (2010)
124.
go back to reference Petrenko, S.A., Kurbatov, V.A., Bugaev, I.A., Petrenko, A.S.: Cognitive system of early warning about computer attack. Protect. Inf. Inside. 3(69), 74–82 (2016) Petrenko, S.A., Kurbatov, V.A., Bugaev, I.A., Petrenko, A.S.: Cognitive system of early warning about computer attack. Protect. Inf. Inside. 3(69), 74–82 (2016)
125.
go back to reference Tallinn Manual on the International Law Applicable to Cyber Warfare. [Electronic resource] general editor Michael N. Schmitt. Cambridge University Press (2013). 282 p. Access mode: http://issuu.com/nato_ccd_coe/docs/tallinnmanual?mode=embed&layout=http%3A%2F%2Fskin.issuu.com%2Fv%2Flight%2Flayout.xml&showFlipBtn=true Tallinn Manual on the International Law Applicable to Cyber Warfare. [Electronic resource] general editor Michael N. Schmitt. Cambridge University Press (2013). 282 p. Access mode: http://​issuu.​com/​nato_​ccd_​coe/​docs/​tallinnmanual?​mode=​embed&​layout=​http%3A%2F%2Fskin.issuu.com%2Fv%2Flight%2Flayout.xml&showFlipBtn=true
126.
go back to reference Gamayunov, D.Y.: Detection of computer attacks based on the analysis of the behavior of network objects: dis. for the competition uch. degree of Cand. fiz.-mat. sciences. Moscow State University, Moscow (2007) Gamayunov, D.Y.: Detection of computer attacks based on the analysis of the behavior of network objects: dis. for the competition uch. degree of Cand. fiz.-mat. sciences. Moscow State University, Moscow (2007)
127.
go back to reference Petrenko, S.A.: Methods of detecting intrusions and anomalies of the functioning of cyber system, Proceedings of ISA RAS. Risk Manag. Safety. 41, 194–202 (2009) Petrenko, S.A.: Methods of detecting intrusions and anomalies of the functioning of cyber system, Proceedings of ISA RAS. Risk Manag. Safety. 41, 194–202 (2009)
128.
go back to reference Ilgun, K.: USTAT: A real-Time Intrusion Detection System for UNIX. Computer Science Department, University of California, Santa Barbara (1992) Ilgun, K.: USTAT: A real-Time Intrusion Detection System for UNIX. Computer Science Department, University of California, Santa Barbara (1992)
129.
go back to reference Kumar, S., Spafford, E.H.: An Application of Pattern Matching in Intrusion Detection. Purdue University, New York (1994) Kumar, S., Spafford, E.H.: An Application of Pattern Matching in Intrusion Detection. Purdue University, New York (1994)
130.
go back to reference Petrenko, A.S., Petrenko, S.A.: Designing of corporate segment SOPKA. Protect. Inf. Inside. 6(72), 48–50 (2016) Petrenko, A.S., Petrenko, S.A.: Designing of corporate segment SOPKA. Protect. Inf. Inside. 6(72), 48–50 (2016)
131.
go back to reference Petrenko, S.A., Petrenko, A.S.: From detection to prevention: trends and prospects of development of situational centers in the Russian Federation. Intellect Technol. 1(12), 68–71 (2017) Petrenko, S.A., Petrenko, A.S.: From detection to prevention: trends and prospects of development of situational centers in the Russian Federation. Intellect Technol. 1(12), 68–71 (2017)
132.
go back to reference Petrenko, S.A., Shamsutdinov, T.I., Petrenko, A.S.: Scientific and technical problems of development of situational centers in the Russian Federation. Inf. Protect. Inside. 6(72), 37–43 (2016) Petrenko, S.A., Shamsutdinov, T.I., Petrenko, A.S.: Scientific and technical problems of development of situational centers in the Russian Federation. Inf. Protect. Inside. 6(72), 37–43 (2016)
133.
go back to reference Portnoy, L., et al.: Intrusion detection with unlabeled data using clustering. ACM Workshop on Data Mining Applied to Security (2001) Portnoy, L., et al.: Intrusion detection with unlabeled data using clustering. ACM Workshop on Data Mining Applied to Security (2001)
134.
go back to reference Kotenko, I.V.: Intellectual mechanisms of cybersecurity management. Proceedings of ISA RAS. Risk Manag. Safety, 41, 74–103 (2009) Kotenko, I.V.: Intellectual mechanisms of cybersecurity management. Proceedings of ISA RAS. Risk Manag. Safety, 41, 74–103 (2009)
135.
go back to reference Petrenko, A.S., Petrenko, S.A.: Super-productive monitoring centers for security threats. Part 1. Protect. Inf. Inside. 2(74), 29–36 (2017) Petrenko, A.S., Petrenko, S.A.: Super-productive monitoring centers for security threats. Part 1. Protect. Inf. Inside. 2(74), 29–36 (2017)
136.
go back to reference Petrenko, A.S., Bugaev, I.A., Petrenko, S.A.: Master data management system SOPKA. Inf. Protect. Inside. 5(71), 37–43 (2016) Petrenko, A.S., Bugaev, I.A., Petrenko, S.A.: Master data management system SOPKA. Inf. Protect. Inside. 5(71), 37–43 (2016)
Metadata
Title
The Relevance of the Early Warning of Cyber-attacks
Author
Sergei Petrenko
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-79036-7_1

Premium Partner