Skip to main content
Erschienen in:
Buchtitelbild

2018 | OriginalPaper | Buchkapitel

1. The Relevance of the Early Warning of Cyber-attacks

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

It is proved that the problem of information security of the critical infrastructure of the Russian Federation is one of the most important goals of ensuring digital sovereignty and defense capability of the state. The main threats to the information security of the Russian Federation are introduced. They include threats of military-political, terrorist, and criminogenic nature. The necessity of an integrated approach to information security not only at the national but also at the external policy level is explained. The current state of the problem of detection and prevention of cyber-attacks is assessed. Prospective assignments of alerting and anticipation tasks, as well as timely detection and neutralization of cyber-attacks, are considered.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
3
Dictionary of military and related terms: US Department of Defense. – 2011. – P. 92–93
 
4
Protection of communication infrastructure. Technical Journal of Bell Laboratories. – Special Issue: Internal Security. – Volume 9. – Issue 2. – 2004
 
5
Glossary of terms and definitions in the field of information security:2nd ed., enlarged and revised. Military Academy of the General Staff of the Armed Forces of the Russian Federation. Research Center for Information Security. – M. – 2008. – P. 40
 
Literatur
1.
Zurück zum Zitat The Information Security Doctrine of the Russian Federation (approved by the Decree of the President of the Russian Federation No. 646 of December 5, 2016). The Information Security Doctrine of the Russian Federation (approved by the Decree of the President of the Russian Federation No. 646 of December 5, 2016).
3.
Zurück zum Zitat Abramov, S.M.: Research in the field of supercomputer technologies of the IPS RAS: a retrospective and perspective. In: Proceedings of the International Conference “Software Systems: Theory and Applications”, vol. 1, pp. 153–192. Publishing house “University of Pereslavl”, Pereslavl (2009) Abramov, S.M.: Research in the field of supercomputer technologies of the IPS RAS: a retrospective and perspective. In: Proceedings of the International Conference “Software Systems: Theory and Applications”, vol. 1, pp. 153–192. Publishing house “University of Pereslavl”, Pereslavl (2009)
4.
Zurück zum Zitat Abramov, S.M.: History of development and implementation of a series of Russian supercomputers with cluster architecture. In: History of Domestic Electronic Computers. 2nd edn, Rev. and additional; color. Ill.: Publishing house “Capital Encyclopedia”, Moscow (2016) Abramov, S.M.: History of development and implementation of a series of Russian supercomputers with cluster architecture. In: History of Domestic Electronic Computers. 2nd edn, Rev. and additional; color. Ill.: Publishing house “Capital Encyclopedia”, Moscow (2016)
5.
Zurück zum Zitat Abramov, S.M., Lilitko, E.P.: State and prospects of ultra-high performance computing systems development. Inf. Technol. Comput. Syst. 2, 6–22 (2013) Abramov, S.M., Lilitko, E.P.: State and prospects of ultra-high performance computing systems development. Inf. Technol. Comput. Syst. 2, 6–22 (2013)
16.
Zurück zum Zitat Alekseeva, I.Y., et al.: Information Challenges of National and International Security; [under the Society. ed. A. V. Fedorova, VN Tsigichko], 328 p. PIR Center, Moscow (2001) Alekseeva, I.Y., et al.: Information Challenges of National and International Security; [under the Society. ed. A. V. Fedorova, VN Tsigichko], 328 p. PIR Center, Moscow (2001)
17.
Zurück zum Zitat Alessandri, D., et al.: Towards a Taxonomy of Intrusion-Detection Systems and Attacks. Zurich, IBM Research Division (2001) Alessandri, D., et al.: Towards a Taxonomy of Intrusion-Detection Systems and Attacks. Zurich, IBM Research Division (2001)
18.
Zurück zum Zitat Almgren, M.: Consolidation and evaluation of IDS taxonomies. In: Proceedings of the Eight Nordic Workshop on Secure IT Systems, NordSec 2003 Almgren, M.: Consolidation and evaluation of IDS taxonomies. In: Proceedings of the Eight Nordic Workshop on Secure IT Systems, NordSec 2003
20.
Zurück zum Zitat An Open, Safe and Secure Cyberspace. Joint communication to the European Parliament, the Council, the European Economic and Social committee and the Committee of the Regions Cybersecurity Strategy of the European Union of the European Commission and Higher Representative for foreign affairs and security policy. Brussels (2013) [Electronic resource]. Access mode: http://ec.europa.eu/information_society/newsroom/ An Open, Safe and Secure Cyberspace. Joint communication to the European Parliament, the Council, the European Economic and Social committee and the Committee of the Regions Cybersecurity Strategy of the European Union of the European Commission and Higher Representative for foreign affairs and security policy. Brussels (2013) [Electronic resource]. Access mode: http://​ec.​europa.​eu/​information_​society/​newsroom/​
21.
Zurück zum Zitat Anderson, J.P.: Computer Security Threat Monitoring and Surveillance. James P. Anderson Co., Fort Washington, PA (1980) Anderson, J.P.: Computer Security Threat Monitoring and Surveillance. James P. Anderson Co., Fort Washington, PA (1980)
22.
Zurück zum Zitat Andreev, V.V., Zdiruk, K.B.: IV Jupiter: implementation of corporate security policy in computer networks. Open. Syst. 7–8, 43–46 (2003) Andreev, V.V., Zdiruk, K.B.: IV Jupiter: implementation of corporate security policy in computer networks. Open. Syst. 7–8, 43–46 (2003)
25.
Zurück zum Zitat Arbatov A.G. Real and imaginary threats: Military power in world politics in the beginning of the XXI century. [Electronic resource] AG Arbatov. Russia in global politics. March 3, 2013. Access mode: http://www.global- affairs.ru/number/Ugrozy-realnye-i-mnimye-15863 Arbatov A.G. Real and imaginary threats: Military power in world politics in the beginning of the XXI century. [Electronic resource] AG Arbatov. Russia in global politics. March 3, 2013. Access mode: http://​www.​global- affairs.ru/number/Ugrozy-realnye-i-mnimye-15863
26.
Zurück zum Zitat Aristotle. Comp. in 4 volumes (Series “Philosophical heritage”). Thought, Moscow. (1975–1983) Aristotle. Comp. in 4 volumes (Series “Philosophical heritage”). Thought, Moscow. (1975–1983)
27.
Zurück zum Zitat Arquilla, J.: Ethics and information warfare. In: Khalilzad, Z., White, J., Marsall, A. (eds.) Strategic Appraisal: The Changing Role of Information in Warfare, 475 p. RAND Corporation, Santa Monica (1999) Arquilla, J.: Ethics and information warfare. In: Khalilzad, Z., White, J., Marsall, A. (eds.) Strategic Appraisal: The Changing Role of Information in Warfare, 475 p. RAND Corporation, Santa Monica (1999)
28.
Zurück zum Zitat Ashby, U.R.: Principles of Self-Organization, pp. 314–343. Mir, Moscow (1966) Ashby, U.R.: Principles of Self-Organization, pp. 314–343. Mir, Moscow (1966)
29.
Zurück zum Zitat Axelsson, S.: Intrusion Detection Systems: A Taxonomy and Survey. Technical Report 99–15. Department of Computer Engineering, Chalmers University of Technology, Goteborg (2000) Axelsson, S.: Intrusion Detection Systems: A Taxonomy and Survey. Technical Report 99–15. Department of Computer Engineering, Chalmers University of Technology, Goteborg (2000)
30.
Zurück zum Zitat Barabanov, A.V., Markov, A.S., Tsirlov, V.L.: Methodological framework for analysis and synthesis of a set of secure software development controls. J. Theor. Appl. Info. Technol. 88(1), 77–88 (2016) Barabanov, A.V., Markov, A.S., Tsirlov, V.L.: Methodological framework for analysis and synthesis of a set of secure software development controls. J. Theor. Appl. Info. Technol. 88(1), 77–88 (2016)
31.
Zurück zum Zitat Barabanov, A., Lavrov, A., Markov, A., Polotnyanschikov, I., Tsirlov, V.: The study into cross-site request forgery attacks within the framework of analysis of software vulnerabilities. In: Preliminary proceedings of the 11th Spring/Summer Young Researchers’ Colloquium on Software Engineering (Innopolis, Republic of Tatarstan, Russian Federation, June 5–7, 2017), pp. 105–109. SYRCoSE, ISP RAS Barabanov, A., Lavrov, A., Markov, A., Polotnyanschikov, I., Tsirlov, V.: The study into cross-site request forgery attacks within the framework of analysis of software vulnerabilities. In: Preliminary proceedings of the 11th Spring/Summer Young Researchers’ Colloquium on Software Engineering (Innopolis, Republic of Tatarstan, Russian Federation, June 5–7, 2017), pp. 105–109. SYRCoSE, ISP RAS
32.
Zurück zum Zitat Baranov, P.A.: Detection of anomalies based on the application of the criterion of the dispersion degree. Proceedings of the XIV All-Russian Scientific Conference “Information Security Problems in the Higher School System”, pp. 25–27. Izd. department of the St. Petersburg State Polytechnic University, St. Petersburg (2007) Baranov, P.A.: Detection of anomalies based on the application of the criterion of the dispersion degree. Proceedings of the XIV All-Russian Scientific Conference “Information Security Problems in the Higher School System”, pp. 25–27. Izd. department of the St. Petersburg State Polytechnic University, St. Petersburg (2007)
33.
Zurück zum Zitat Batueva, E.V.: American concept of threats to information security and its international political component, 207 p. Doctoral thesis of political sciences. MGIMO (U) Ministry of Foreign Affairs of the Russian Federation, Moscow (2014) Batueva, E.V.: American concept of threats to information security and its international political component, 207 p. Doctoral thesis of political sciences. MGIMO (U) Ministry of Foreign Affairs of the Russian Federation, Moscow (2014)
34.
Zurück zum Zitat Bedritsky, A.V.: American policy of cyber space control. Probl. Natl. Strat. 2(3), 25–40 (2010) Bedritsky, A.V.: American policy of cyber space control. Probl. Natl. Strat. 2(3), 25–40 (2010)
35.
Zurück zum Zitat Bedritsky, A.V.: Information War: Concepts and Their Implementation in the US, 183p. RISI, Moscow (2008) Bedritsky, A.V.: Information War: Concepts and Their Implementation in the US, 183p. RISI, Moscow (2008)
36.
Zurück zum Zitat Bedritsky, A.V.: The Evolution of the American Concept of Information War, 26p. RISI, Moscow. Analytical Rev. (3) (2003) Bedritsky, A.V.: The Evolution of the American Concept of Information War, 26p. RISI, Moscow. Analytical Rev. (3) (2003)
37.
Zurück zum Zitat Biryukov, D.N.: Cognitive-functional memory specification for simulation of purposeful behavior of cyber systems. Proc. SPIIRAS. 3(40), 55–76 (2015)CrossRef Biryukov, D.N.: Cognitive-functional memory specification for simulation of purposeful behavior of cyber systems. Proc. SPIIRAS. 3(40), 55–76 (2015)CrossRef
38.
Zurück zum Zitat Biryukov, D.N., Lomako, A.G.: Denotational semantics of knowledge contexts in ontological modeling of the subject areas of conflict. Proc. SPIIRAS. 5(42), 155–179 (2015) Biryukov, D.N., Lomako, A.G.: Denotational semantics of knowledge contexts in ontological modeling of the subject areas of conflict. Proc. SPIIRAS. 5(42), 155–179 (2015)
39.
Zurück zum Zitat Biryukov, D.N., Glukhov, A.P., Pilkevich, S.V., Sabirov, T.R.: Approach to the processing of knowledge in the memory of an intellectual system. Natur. Tech. Sci. 11, 455–466 (2015) Biryukov, D.N., Glukhov, A.P., Pilkevich, S.V., Sabirov, T.R.: Approach to the processing of knowledge in the memory of an intellectual system. Natur. Tech. Sci. 11, 455–466 (2015)
40.
Zurück zum Zitat Biryukov, D.N., Lomako, A.G.: Approach to the construction of information security systems capable of synthesizing scenarios of anticipatory behavior in the information conflict. Protect. Inf. Inside. 6(60), 42–50 (2014) Biryukov, D.N., Lomako, A.G.: Approach to the construction of information security systems capable of synthesizing scenarios of anticipatory behavior in the information conflict. Protect. Inf. Inside. 6(60), 42–50 (2014)
41.
Zurück zum Zitat Biryukov, D.N., Lomako, A.G.: The formalization of semantics for representation of knowledge about the behavior of conflicting parties: materials of the 22nd scientific-practical conference “Methods and technical means of information security”, pp. 8–11. Publishing house of Polytechnic University, St. Petersburg (2013) Biryukov, D.N., Lomako, A.G.: The formalization of semantics for representation of knowledge about the behavior of conflicting parties: materials of the 22nd scientific-practical conference “Methods and technical means of information security”, pp. 8–11. Publishing house of Polytechnic University, St. Petersburg (2013)
42.
Zurück zum Zitat Biryukov, D.N., Lomako, A.G., Petrenko, S.A.: Generating scenarios for preventing cyber-attacks. Protect. Inf. Inside. 4(76) (2017) Biryukov, D.N., Lomako, A.G., Petrenko, S.A.: Generating scenarios for preventing cyber-attacks. Protect. Inf. Inside. 4(76) (2017)
43.
Zurück zum Zitat Biryukov, D.N., Lomako, A.G., Rostovtsev, Y.G.: The appearance of anticipatory systems to prevent the risks of cyber threat realization. Proc. SPIIRAS. 2(39), 5–25 (2015)CrossRef Biryukov, D.N., Lomako, A.G., Rostovtsev, Y.G.: The appearance of anticipatory systems to prevent the risks of cyber threat realization. Proc. SPIIRAS. 2(39), 5–25 (2015)CrossRef
44.
Zurück zum Zitat Biryukov, D.N., Lomako, A.G., Sabirov, T.R.: Multilevel Modeling of Pre-Emptive Behavior Scenarios. Problems of Information Security. Computer systems, vol. 4, pp. 41–50. Publishing house of Polytechnic University, St. Petersburg (2014) Biryukov, D.N., Lomako, A.G., Sabirov, T.R.: Multilevel Modeling of Pre-Emptive Behavior Scenarios. Problems of Information Security. Computer systems, vol. 4, pp. 41–50. Publishing house of Polytechnic University, St. Petersburg (2014)
45.
Zurück zum Zitat Biryukov, D.N., Rostovtsev, Y.G.: Approach to constructing a consistent theory of synthesis of scenarios of anticipatory behavior in a conflict. Proc. SPIIRAS. 1(38), 94–111 (2015)CrossRef Biryukov, D.N., Rostovtsev, Y.G.: Approach to constructing a consistent theory of synthesis of scenarios of anticipatory behavior in a conflict. Proc. SPIIRAS. 1(38), 94–111 (2015)CrossRef
46.
Zurück zum Zitat Biryukov, D.N., Lomako, A.G.: Approach to Building a Cyber Threat Prevention System. Problems of Information Security. Computer systems, vol. 2, pp. 13–19. Publishing house of Polytechnic University, St. Petersburg (2013) Biryukov, D.N., Lomako, A.G.: Approach to Building a Cyber Threat Prevention System. Problems of Information Security. Computer systems, vol. 2, pp. 13–19. Publishing house of Polytechnic University, St. Petersburg (2013)
47.
Zurück zum Zitat Bocharov, V.A., Markin, V.I.: Fundamentals of Logic. Moscow State University, Moscow (2008) Bocharov, V.A., Markin, V.I.: Fundamentals of Logic. Moscow State University, Moscow (2008)
48.
Zurück zum Zitat Boev, S.F., Kochkarov, A.A., Stupin, D.D.: Development of R & D activities of high-tech B2G-holdings: problems and tasks. Qual. Innov. Educ. 11(78), 54–59 (2011) Boev, S.F., Kochkarov, A.A., Stupin, D.D.: Development of R & D activities of high-tech B2G-holdings: problems and tasks. Qual. Innov. Educ. 11(78), 54–59 (2011)
49.
Zurück zum Zitat Boev, S.F., Kochkarov, A.A., Stupin, D.D.: The role and possibilities of pre-university training in the problem of the formation of highly qualified specialists for high-tech branches of the real economy and the experience of the RTI Systems Concern: materials of the International Scientific Conference “Forming the Identity of Finno-Ugric world and Russian education”, pp. 330–333. Mordovian state publishing house University, Saransk (2011) Boev, S.F., Kochkarov, A.A., Stupin, D.D.: The role and possibilities of pre-university training in the problem of the formation of highly qualified specialists for high-tech branches of the real economy and the experience of the RTI Systems Concern: materials of the International Scientific Conference “Forming the Identity of Finno-Ugric world and Russian education”, pp. 330–333. Mordovian state publishing house University, Saransk (2011)
50.
Zurück zum Zitat Bongard, M.M.: The Problem of Recognition. Fizmatgiz, Moscow (1967) Bongard, M.M.: The Problem of Recognition. Fizmatgiz, Moscow (1967)
51.
Zurück zum Zitat Brennen, S.: Cyberthreats and the Decline of the Nation-state, 175 p. Susan W. Brenner. Routledge, Abingdon (2014) Brennen, S.: Cyberthreats and the Decline of the Nation-state, 175 p. Susan W. Brenner. Routledge, Abingdon (2014)
52.
Zurück zum Zitat Brenner, J.: America the Vulnerable, 308 p. Joel Brenner. Penguin Press, New York (2011) Brenner, J.: America the Vulnerable, 308 p. Joel Brenner. Penguin Press, New York (2011)
53.
Zurück zum Zitat Carr, J.: Inside Cyber Warfare, 213 p. Jeffrey Carr. O’Reilly (2010) Carr, J.: Inside Cyber Warfare, 213 p. Jeffrey Carr. O’Reilly (2010)
54.
Zurück zum Zitat Cavelty, M.: Cyber-Security and Threat Politics: US Efforts to Secure the Information Age, 182 p. Myriam Dunn Cavelty. Routledge, New York (2007) Cavelty, M.: Cyber-Security and Threat Politics: US Efforts to Secure the Information Age, 182 p. Myriam Dunn Cavelty. Routledge, New York (2007)
55.
Zurück zum Zitat Chereshkin, D.S.: Problems of Information Security Management, 224 p. Editorial URSS, Moscow (2002) Chereshkin, D.S.: Problems of Information Security Management, 224 p. Editorial URSS, Moscow (2002)
56.
Zurück zum Zitat Clarifying Cybersecurity Responsibilities and Activities of the Executive Office of the President and the Department of Homeland Security. Memorandum. Executive Office of the President Office of Management and Budget, Washington, DC. July 6, 2010 [Electronic resource]. Access mode: http://www.whitehouse.gov/sites/default/files/omb/assets/memoranda_2010/m10-28.pdf Clarifying Cybersecurity Responsibilities and Activities of the Executive Office of the President and the Department of Homeland Security. Memorandum. Executive Office of the President Office of Management and Budget, Washington, DC. July 6, 2010 [Electronic resource]. Access mode: http://​www.​whitehouse.​gov/​sites/​default/​files/​omb/​assets/​memoranda_​2010/​m10-28.​pdf
57.
Zurück zum Zitat Clark, R., Nake, R.: The Third World War. What Will It Be Like? Publishing house “Peter”, St. Petersburg (2011) Clark, R., Nake, R.: The Third World War. What Will It Be Like? Publishing house “Peter”, St. Petersburg (2011)
59.
Zurück zum Zitat Clarke, R.: Cyber War the Next Threat to National Security and What to Do About It. In: Richard A. Clarke, Robert K. Knake, 290 p. HarperCollins (2010) Clarke, R.: Cyber War the Next Threat to National Security and What to Do About It. In: Richard A. Clarke, Robert K. Knake, 290 p. HarperCollins (2010)
61.
Zurück zum Zitat Clayton, M.: Presidential Cyberwar Directive Gives Pentagon Long-awaited Marching Orders. The Christian Science Monitor. June 10, 2013 – [Electronic resource]. Access mode: http://www.csmonitor.com/USA/Military/2013/0610/Presidential-cyberwardirective-gives-Pentagon-long-awaited-marching-orders-video Clayton, M.: Presidential Cyberwar Directive Gives Pentagon Long-awaited Marching Orders. The Christian Science Monitor. June 10, 2013 – [Electronic resource]. Access mode: http://​www.​csmonitor.​com/​USA/​Military/​2013/​0610/​Presidential-cyberwardirectiv​e-gives-Pentagon-long-awaited-marching-orders-video
63.
Zurück zum Zitat Collins, A.M., Quillian, M.R.: Retrieval time from semantic memory. J. Verbal Learn. Verbal Behav. 8, 240–247 (1969)CrossRef Collins, A.M., Quillian, M.R.: Retrieval time from semantic memory. J. Verbal Learn. Verbal Behav. 8, 240–247 (1969)CrossRef
64.
Zurück zum Zitat Communication from the Commission to the European Parliament and the Council. The EU Internal Security Strategy in Action: Five steps towards a more secure Europe. Brussels, 22.11.2010. COM (2010) Communication from the Commission to the European Parliament and the Council. The EU Internal Security Strategy in Action: Five steps towards a more secure Europe. Brussels, 22.11.2010. COM (2010)
69.
Zurück zum Zitat Crimes involving the use of a computer network. The Tenth United Nations Congress on the Prevention of Crime and the Treatment of Offenders. Document A / CONF.187 / 10 of 3 February 1999 Crimes involving the use of a computer network. The Tenth United Nations Congress on the Prevention of Crime and the Treatment of Offenders. Document A / CONF.187 / 10 of 3 February 1999
71.
Zurück zum Zitat Critical Infrastructure Security and Resilience: Presidential Policy Directive/PPD-21. The White House, Washington, DC. February 12, 2013 Critical Infrastructure Security and Resilience: Presidential Policy Directive/PPD-21. The White House, Washington, DC. February 12, 2013
75.
Zurück zum Zitat Cyber Security Report. European Сommission. 2015. [Electronic resource]. Access mode: http://ec.europa.eu/COMMFrontOffice/PublicOpinion/index.cfm/Survey/getSurveyDetail/yearFrom/1973/yearTo/2016/search/cyber/surveyKy/2019. Accessed 10 Apr 2016 Cyber Security Report. European Сommission. 2015. [Electronic resource]. Access mode: http://​ec.​europa.​eu/​COMMFrontOffice/​PublicOpinion/​index.​cfm/​Survey/​getSurveyDetail/​yearFrom/​1973/​yearTo/​2016/​search/​cyber/​surveyKy/​2019.​ Accessed 10 Apr 2016
76.
Zurück zum Zitat Cyberpower and National Security [ed. F. Kramer, S. Starr, and L. Wentz], 664 p. Potomac Books Inc. (2009) Cyberpower and National Security [ed. F. Kramer, S. Starr, and L. Wentz], 664 p. Potomac Books Inc. (2009)
80.
Zurück zum Zitat Debar H., et al.: (IBM Zurich). Towards a Taxonomy of Intrusion-Detection Systems. IBM Research Division, Zurich (1999) Debar H., et al.: (IBM Zurich). Towards a Taxonomy of Intrusion-Detection Systems. IBM Research Division, Zurich (1999)
81.
Zurück zum Zitat Decree of the Government of the Russian Federation of 04 September 2003 No. 547 “On the preparation of the population in the field of protection from natural and man-made emergency situations” Decree of the Government of the Russian Federation of 04 September 2003 No. 547 “On the preparation of the population in the field of protection from natural and man-made emergency situations”
82.
Zurück zum Zitat Decree of the Government of the Russian Federation of December 30, 2003 No. 794 “On Unified State System for the Prevention and Elimination of Emergency Situations” Decree of the Government of the Russian Federation of December 30, 2003 No. 794 “On Unified State System for the Prevention and Elimination of Emergency Situations”
83.
86.
Zurück zum Zitat Denning, D.: Information Warfare and Security, 522 p. ACM Press, New York (1999) Denning, D.: Information Warfare and Security, 522 p. ACM Press, New York (1999)
88.
Zurück zum Zitat Denning, D.: Reflections on cyberweapons controls. Comput. Security J. XVI(4), 43–53 (2000) Denning, D.: Reflections on cyberweapons controls. Comput. Security J. XVI(4), 43–53 (2000)
89.
Zurück zum Zitat Denning, D.E., (SRI International): An intrusion detection model. IEEE Trans. Softw. Eng. (SE-13), 2, 222–232 (1987) Denning, D.E., (SRI International): An intrusion detection model. IEEE Trans. Softw. Eng. (SE-13), 2, 222–232 (1987)
93.
Zurück zum Zitat Dunlap, C. Jr.: Perspectives for cyber strategists on law for cyberwar (Charles J. Dunlap Jr.). Strateg. Stud. Q. Spring, 81–99 (2011) Dunlap, C. Jr.: Perspectives for cyber strategists on law for cyberwar (Charles J. Dunlap Jr.). Strateg. Stud. Q. Spring, 81–99 (2011)
96.
Zurück zum Zitat Ermakov, S.M.: Transformation of NATO after the Lisbon Summit in 2010: from the defense of the territory to the protection of the public domain. Probl. Natl. Strateg. 4(9), 107–128 (2011) Ermakov, S.M.: Transformation of NATO after the Lisbon Summit in 2010: from the defense of the territory to the protection of the public domain. Probl. Natl. Strateg. 4(9), 107–128 (2011)
98.
Zurück zum Zitat The concept of foreign policy of the Russian Federation (approved by the Decree of the President of the Russian Federation of November 30, 2016 No. 640 The concept of foreign policy of the Russian Federation (approved by the Decree of the President of the Russian Federation of November 30, 2016 No. 640
99.
Zurück zum Zitat The concept of the development of an intelligent electric power system in Russia with an actively adaptive network. OJSC “FGC UES” OJSC “Scientific and technological center of electric power industry”. Moscow (2011) The concept of the development of an intelligent electric power system in Russia with an actively adaptive network. OJSC “FGC UES” OJSC “Scientific and technological center of electric power industry”. Moscow (2011)
100.
Zurück zum Zitat The concept of the state system for detecting, preventing and eliminating the consequences of computer attacks on the information resources of the Russian Federation (approved by the President of the Russian Federation on December 12, 2014, No. K 1274) The concept of the state system for detecting, preventing and eliminating the consequences of computer attacks on the information resources of the Russian Federation (approved by the President of the Russian Federation on December 12, 2014, No. K 1274)
101.
Zurück zum Zitat The Economic Impact of Cybercrime and Cyber Espionage. The Center for Strategic and International Studies Report. July 2013. 19 p. [Electronic resource]. Access mode: http://csis.org/files/publication/60396rpt_cybercrimecost_0713_ph4_0.pdf The Economic Impact of Cybercrime and Cyber Espionage. The Center for Strategic and International Studies Report. July 2013. 19 p. [Electronic resource]. Access mode: http://​csis.​org/​files/​publication/​60396rpt_​cybercrimecost_​0713_​ph4_​0.​pdf
103.
Zurück zum Zitat The national security strategy of the Russian Federation (approved by the Decree of the President of the Russian Federation of December 31, 2015, No. 683 The national security strategy of the Russian Federation (approved by the Decree of the President of the Russian Federation of December 31, 2015, No. 683
104.
Zurück zum Zitat The Order of the Ministry of Emergency Measures of the Russian Federation from February, 28th, 2003 № 105. On the statement of requirements on the prevention of extreme situations on potentially dangerous objects and objects of life-support The Order of the Ministry of Emergency Measures of the Russian Federation from February, 28th, 2003 № 105. On the statement of requirements on the prevention of extreme situations on potentially dangerous objects and objects of life-support
105.
109.
Zurück zum Zitat Thomas, T.: Cyber Silhouettes. Shadows Over Information Operations, 334 p. Timothy L. Thomas. Foreign Military Studies Office (FMSO). Fort Leavenworth (2005) Thomas, T.: Cyber Silhouettes. Shadows Over Information Operations, 334 p. Timothy L. Thomas. Foreign Military Studies Office (FMSO). Fort Leavenworth (2005)
110.
Zurück zum Zitat Thomas, T.: Is the IW paradigm outdated? A discussion of U.S. IW theory. J. Inf. Warfare. 2(3), 109–116 (2003) Thomas, T.: Is the IW paradigm outdated? A discussion of U.S. IW theory. J. Inf. Warfare. 2(3), 109–116 (2003)
112.
Zurück zum Zitat Toffler, A.: War and Anti-War: Survival at the Down of the Twenty-First Century, 1st edn, 302 p. Alvin and Heidi Toffler (1993) Toffler, A.: War and Anti-War: Survival at the Down of the Twenty-First Century, 1st edn, 302 p. Alvin and Heidi Toffler (1993)
113.
Zurück zum Zitat Toffler, E.: The Third Wave, 784 p. AST, Moscow (2010) Toffler, E.: The Third Wave, 784 p. AST, Moscow (2010)
114.
Zurück zum Zitat Tsygichko, V.N., Votrin, D.S., Krutskikh, A.V., Smolyan, G.L., Chereshkin, D.S.: Information Weapons Are a New Challenge to International Security, 52 p. Institute of System Analysis of the Russian Academy of Sciences, Moscow (2000) Tsygichko, V.N., Votrin, D.S., Krutskikh, A.V., Smolyan, G.L., Chereshkin, D.S.: Information Weapons Are a New Challenge to International Security, 52 p. Institute of System Analysis of the Russian Academy of Sciences, Moscow (2000)
115.
Zurück zum Zitat Tulving E. Episodic and Semantic Memory. Organization of Memory New York: Academic, 1972. Р. 381–403. Tulving E. Episodic and Semantic Memory. Organization of Memory New York: Academic, 1972. Р. 381–403.
117.
Zurück zum Zitat Vasyutin, S.V., Zavyalov, S.S.: Neural network method for analyzing the sequence of system calls for the detection of computer attacks and the classification of application modes. Methods and Means of Information Processing: Proceedings of the Second All-Russian Scientific Conference; [ed. member corr. RAS L.N. Koroleva], pp. 142–147. Pub. Department of the Factor of Computational Mathematics and Cybernetics of the Moscow State University. M.V. Lomonosov, Moscow (2005) Vasyutin, S.V., Zavyalov, S.S.: Neural network method for analyzing the sequence of system calls for the detection of computer attacks and the classification of application modes. Methods and Means of Information Processing: Proceedings of the Second All-Russian Scientific Conference; [ed. member corr. RAS L.N. Koroleva], pp. 142–147. Pub. Department of the Factor of Computational Mathematics and Cybernetics of the Moscow State University. M.V. Lomonosov, Moscow (2005)
120.
Zurück zum Zitat Weimann, G.: Special Report 116: www.terror.net How Modern Terrorism Uses the Internet/United Institute of Peace, March 2004. [Electronic resource]. Access mode: http://dspace.cigilibrary.org/jspui/bitstream/123456789/4610/1/www%20terror%20net%20How%20Modern%20Terrorism%20Uses %20the%20Internet.pdf? Weimann, G.: Special Report 116: www.​terror.​net How Modern Terrorism Uses the Internet/United Institute of Peace, March 2004. [Electronic resource]. Access mode: http://​dspace.​cigilibrary.​org/​jspui/​bitstream/​123456789/​4610/​1/​www%20terror%20net%20How%20Modern%20Terrorism%20Uses %20the%20Internet.pdf?
121.
Zurück zum Zitat Petrenko, A.A., Petrenko, S.A.: Cyber units: methodical recommendations of ENISA. Quest. Cybersecurity. 3(11), 2–14 (2015) Petrenko, A.A., Petrenko, S.A.: Cyber units: methodical recommendations of ENISA. Quest. Cybersecurity. 3(11), 2–14 (2015)
122.
Zurück zum Zitat Petrenko, A.A., Petrenko, S.A.: The way to increase the stability of LTE-network in the conditions of destructive cyber-attacks. Quest. Cybersecurity. 2(10), 36–42 (2015) Petrenko, A.A., Petrenko, S.A.: The way to increase the stability of LTE-network in the conditions of destructive cyber-attacks. Quest. Cybersecurity. 2(10), 36–42 (2015)
123.
Zurück zum Zitat Petrenko, S.A.: Methods of ensuring the stability of the functioning of cyber systems under conditions of destructive effects. Proceedings of the ISA RAS. Risk Manag. Security, 52, 106–151 (2010) Petrenko, S.A.: Methods of ensuring the stability of the functioning of cyber systems under conditions of destructive effects. Proceedings of the ISA RAS. Risk Manag. Security, 52, 106–151 (2010)
124.
Zurück zum Zitat Petrenko, S.A., Kurbatov, V.A., Bugaev, I.A., Petrenko, A.S.: Cognitive system of early warning about computer attack. Protect. Inf. Inside. 3(69), 74–82 (2016) Petrenko, S.A., Kurbatov, V.A., Bugaev, I.A., Petrenko, A.S.: Cognitive system of early warning about computer attack. Protect. Inf. Inside. 3(69), 74–82 (2016)
125.
Zurück zum Zitat Tallinn Manual on the International Law Applicable to Cyber Warfare. [Electronic resource] general editor Michael N. Schmitt. Cambridge University Press (2013). 282 p. Access mode: http://issuu.com/nato_ccd_coe/docs/tallinnmanual?mode=embed&layout=http%3A%2F%2Fskin.issuu.com%2Fv%2Flight%2Flayout.xml&showFlipBtn=true Tallinn Manual on the International Law Applicable to Cyber Warfare. [Electronic resource] general editor Michael N. Schmitt. Cambridge University Press (2013). 282 p. Access mode: http://​issuu.​com/​nato_​ccd_​coe/​docs/​tallinnmanual?​mode=​embed&​layout=​http%3A%2F%2Fskin.issuu.com%2Fv%2Flight%2Flayout.xml&showFlipBtn=true
126.
Zurück zum Zitat Gamayunov, D.Y.: Detection of computer attacks based on the analysis of the behavior of network objects: dis. for the competition uch. degree of Cand. fiz.-mat. sciences. Moscow State University, Moscow (2007) Gamayunov, D.Y.: Detection of computer attacks based on the analysis of the behavior of network objects: dis. for the competition uch. degree of Cand. fiz.-mat. sciences. Moscow State University, Moscow (2007)
127.
Zurück zum Zitat Petrenko, S.A.: Methods of detecting intrusions and anomalies of the functioning of cyber system, Proceedings of ISA RAS. Risk Manag. Safety. 41, 194–202 (2009) Petrenko, S.A.: Methods of detecting intrusions and anomalies of the functioning of cyber system, Proceedings of ISA RAS. Risk Manag. Safety. 41, 194–202 (2009)
128.
Zurück zum Zitat Ilgun, K.: USTAT: A real-Time Intrusion Detection System for UNIX. Computer Science Department, University of California, Santa Barbara (1992) Ilgun, K.: USTAT: A real-Time Intrusion Detection System for UNIX. Computer Science Department, University of California, Santa Barbara (1992)
129.
Zurück zum Zitat Kumar, S., Spafford, E.H.: An Application of Pattern Matching in Intrusion Detection. Purdue University, New York (1994) Kumar, S., Spafford, E.H.: An Application of Pattern Matching in Intrusion Detection. Purdue University, New York (1994)
130.
Zurück zum Zitat Petrenko, A.S., Petrenko, S.A.: Designing of corporate segment SOPKA. Protect. Inf. Inside. 6(72), 48–50 (2016) Petrenko, A.S., Petrenko, S.A.: Designing of corporate segment SOPKA. Protect. Inf. Inside. 6(72), 48–50 (2016)
131.
Zurück zum Zitat Petrenko, S.A., Petrenko, A.S.: From detection to prevention: trends and prospects of development of situational centers in the Russian Federation. Intellect Technol. 1(12), 68–71 (2017) Petrenko, S.A., Petrenko, A.S.: From detection to prevention: trends and prospects of development of situational centers in the Russian Federation. Intellect Technol. 1(12), 68–71 (2017)
132.
Zurück zum Zitat Petrenko, S.A., Shamsutdinov, T.I., Petrenko, A.S.: Scientific and technical problems of development of situational centers in the Russian Federation. Inf. Protect. Inside. 6(72), 37–43 (2016) Petrenko, S.A., Shamsutdinov, T.I., Petrenko, A.S.: Scientific and technical problems of development of situational centers in the Russian Federation. Inf. Protect. Inside. 6(72), 37–43 (2016)
133.
Zurück zum Zitat Portnoy, L., et al.: Intrusion detection with unlabeled data using clustering. ACM Workshop on Data Mining Applied to Security (2001) Portnoy, L., et al.: Intrusion detection with unlabeled data using clustering. ACM Workshop on Data Mining Applied to Security (2001)
134.
Zurück zum Zitat Kotenko, I.V.: Intellectual mechanisms of cybersecurity management. Proceedings of ISA RAS. Risk Manag. Safety, 41, 74–103 (2009) Kotenko, I.V.: Intellectual mechanisms of cybersecurity management. Proceedings of ISA RAS. Risk Manag. Safety, 41, 74–103 (2009)
135.
Zurück zum Zitat Petrenko, A.S., Petrenko, S.A.: Super-productive monitoring centers for security threats. Part 1. Protect. Inf. Inside. 2(74), 29–36 (2017) Petrenko, A.S., Petrenko, S.A.: Super-productive monitoring centers for security threats. Part 1. Protect. Inf. Inside. 2(74), 29–36 (2017)
136.
Zurück zum Zitat Petrenko, A.S., Bugaev, I.A., Petrenko, S.A.: Master data management system SOPKA. Inf. Protect. Inside. 5(71), 37–43 (2016) Petrenko, A.S., Bugaev, I.A., Petrenko, S.A.: Master data management system SOPKA. Inf. Protect. Inside. 5(71), 37–43 (2016)
Metadaten
Titel
The Relevance of the Early Warning of Cyber-attacks
verfasst von
Sergei Petrenko
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-79036-7_1