ISSN 1991-2927
 

ACP № 2 (56) 2019

Author: "Andrey Sergeevich Korsunsky"

Iurii Ivanovich Starodubtsev, the Marshal Budjonny Military Academy of Signal Corps, Doctor of Military Sciences, Professor; graduated from the Kemerov Military Academy of Communications, the Marshal Budjonny Military Academy of Signal Corps; Honored Worker of Science of the Russian Federation, Academician of the Russian Academy of Military Sciences, Security Forces Academy, Russian Academy of Natural Sciences, Arctic Academy of Sciences; Honored Worker of Higher Professional Education, Professor of Military Communications Academy; an author of monographs, manuals, articles, and inventions in the field of information-resources security of military communication systems and computer-aided control systems in infowar contexts. [e-mail: vas@mail.ru]I. Starodubtsev,

Aleksandr Gennadievich Chukarikov, the Marshal Budjonny Military Academy of Signal Corps, Candidate of Military Sciences, Associate Professor; graduated from the Ulyanovsk Military Academy of Communications; Associate Professor of the Military Academy of Communications; an author of articles, monographs, and inventions in the field electronic protective measures, communication-safety organization and monitoring and information security. [e-mail: agchuk@yandex.ru]A. Chukarikov,

Andrei Sergeevich Korsunskii, FRPC JSC ’RPA ’Mars’, Candidate of Engineering; graduated from the Faculty of Radio-Communications at Ulyanovsk Branch of the Military Communications University; finished his post-graduate studies at the Marshal Budjonny Military Academy of Signal Corps; Chief Specialist at FRPC JSC ’RPA ’Mars’; an author of articles and inventions in the field of radio-electronics protection, communications, and information security as well as data transmission through wireless communication channels in information telecommunication systems. [e-mail: aksspb@mail.ru]A. Korsunskii,

Vadim Gennadievich Fedorov, the Marshal Budjonny Military Academy of Signal Corps, graduated from Novocherkassk Military Academy of Communications; Adjunct of the Marshal Budjonny Military Academy of Signal Corps, an author of articles and inventions in the field of information security. [e-mail: Vadim.fedorov.53@mail.ru]V. Fedorov

A Method for Protecting the Information-telecommunication Networks At Objects Being of Critical Importance Against Computer Network Attacks 51_2.pdf

The article deals with the problem of providing security and protection of information in information-telecommunication networks. It is well known that in order to ensure safety and information security, it is necessary to identify facts of hacks on computer networks with a high probability. There are a large number of systems and methods for detecting the destructive software attacks on a protected network. However, the existing technical solutions do not allow to achieve the required detection probability and recognition of types of destructive software attacks aimed at complex traffic shaping. The authors propose a way to protect the information-telecommunication networks against the effect of destructive complex traffic patterns through the introduction of a new distinction for detecting the class of computer network attacks and fixing it in time. The method provides an adaptive correction of the established access control rules taking into account the objective parameters of served traffic for the conservation of probability-time characteristics of subscriber service quality without increasing the performance of computing resources at the communication node.

Objects being of critical importance, information-telecommunication networks security, protection against computer network attacks, destructive complex traffic.

2018_ 1

Sections: Automated control systems

Subjects: Automated control systems.


Iurii Ivanovitch Starodubtsev, Military Communications Academy, Doctor of Military Sciences, Professor; graduated from Kemerovo Higher Military Command School of Communications and the Marshal Budjonny Military Academy of Signal Corps; Honored Worker of Science of the Russian Federation, Academician of the Russian Academy of Military Sciences, Security Forces Academy, Russian Academy of Natural Sciences, Arctic Academy of Sciences; Honored Worker of Higher Professional Education, Professor of the Marshal Budjonny Military Academy of Signal Corps; an author of monographs, manuals, articles, and inventions in the field of information-resources security of military communication systems and computer-aided control systems in infowar contexts. [e-mail: vas@mail.ru]I. Starodubtsev,

Elena Valerievna Sukhorukova, of the Marshal Budjonny Military Academy of Signal Corps, Candidate of Engineering; graduated from Novocherkassk Military Communications Institute; finished his post-graduate studies at the Marshal Budjonny Military Academy of Signal Corps; Lecturer at the Department ‘Security of Information and Telecommunication Systems of Social Purposes’ of the Marshal Budjonny Military Academy of Signal Corps; an author of articles and inventions in the field of information security. [e-mail: sukhorukova_lena@mail.ru]E. Sukhorukova,

Andrei Sergeevich Korsunskii, Federal Research-and-Production Center Joint Stock Company ‘Research-and-Production Association ‘Mars’, Candidate of Engineering; graduated from the Faculty of Radio-Communications at Ulyanovsk Branch of the Military Communications University; finished his post-graduate studies at the Marshal Budjonny Military Academy of Signal Corps; Chief Specialist at FRPC JSC ’RPA ’Mars’; an author of articles and inventions in the field of radioelectronics protection, communications, and information security as well as data transmission through wireless communication channels in information telecommunication systems. [e-mail: aksspb@mail.ru]A. Korsunskii,

Tatiana Nikolaevna Maslennikova, Federal Research-and-Production Center Joint Stock Company ‘Research-and-Production Association ‘Mars’, Candidate of Engineering; graduated from the Faculty of Radioengineering of Ulyanovsk Polytechnic Institute; Head of a research-and-development laboratory at FRPC JSC ’RPA ’Mars’; an author of papers and publications in the field of information support of special-purpose computer-aided systems. [e-mail: mars@mv.ru]T. Maslennikova,

Aleksei Vasilievich Vershennik, of the Marshal Budjonny Military Academy of Signal Corps, graduated from Stavropolsk Higher Military Engineering School of Communications and Military Academy of the Strategic Missile Forces, Lecturer of the Department ‘The Security of Information Telecommunications Systems of Special Purposes’ of the Marshal Budjonny Military Academy of Signal Corps; an author of articles and inventions in the field of information security. [e-mail: alex14121972@mail.ru]A. Vershennik

The Problem of Detecting Electronic Devices Installed Without Authorization and the Method of Its Solution 000_1.pdf

The modern development of the Russian society is characterized with the great increase of the role and actuality of security assurance problems in all spheres of life. One of the major problems is industrial (economic) counterespionage. Such types of espionages are carried in order to sweep market, prevent technological breakthroughs of contestants, wreck negotiations on contracts, resale corporate secrets, etc. One of the most widespread technological tools for information retrieval is a radio eavesdropping device. However, existing control devices do not address capabilities of modern radio eavesdropping devices. The article considers the problem of detection of radio devices installed without authorization in information retrieval systems. Such devices are used for espionage. The method for solving the aforesaid problem is also offered. The method is concerned with the field of radio monitoring of electronic devices in a supervised zone, provides detection of signals in conditions of absence of prior information about their parameters and also allows to define the base frequency of performance.

Information security, eavesdropping devices, radio eavesdropping device.

2017_ 2

Sections: Задача обнаружения несанкционированно установленных радиоэлектронных устройств и способ ее решения

Subjects: Automated control systems, Mathematical modeling.


Eduard Dmitrievich Pavlygin, Federal Research-and-Production Center Joint Stock Company ‘Research-and-Production Association ‘Mars’, Candidate of Engineering; graduated from the Faculty of Radioengineering at Ulyanovsk Polytechnic Institute; First Deputy Director General for Scientific Affair at Federal Research-and-Production Center Joint Stock Company ‘Research-and-Production Association ‘Mars’; an author of articles in the field of statistical methods for signal processing. [e-mail: mars@mv.ru]E. Pavlygin,

Andrei Sergeevich Korsunskii, Federal Research-and-Production Center Joint Stock Company ‘Research-and-Production Association ‘Mars’, Candidate of Engineering; graduated from the Faculty of Radio-Communications at Ulyanovsk Branch of the Military Communications University; finished his post-graduate studies at the S.M. Budenny Military Academy of Communications; Chief Specialist at FRPC JSC ’RPA ’Mars’; an author of articles and inventions in the field of radioelectronics protection, communications, and information security as well as data transmission through wireless communication channels in information telecommunication systems. [e-mail: aksspb@mail.ru]A. Korsunskii,

Anatolii Aleksandrovich Kupryiyanov, retired, Candidate of Engineering, Associate Professor; graduated from the Faculty of Radioengineering at Ulyanovsk Polytechnic Institute; interested in the methodology for design and creation of distributed computer systems; an author of a monograph, articles, and other scientific papers in the field of development and design of local and corporate networks, complexes of automation tools and automated control systems of special and general purpose. [e-mail: aakupr1828@rambler.ru]A. Kupryiyanov,

Anatolii Stepanovich Melnichenko, Ulyanovsk State University, Senior Teacher of the Basic Department of Information Technologies and Information Security at Ulyanovsk State University; Chief Specialist at FRPC JSC ’RPA ’Mars’; interested in intelligence systems and program engineering; an author of scientific papers and articles in the field of development and design of expert systems and automation tool complexes. [e-mail: masulgu@yandex.ru]A. Melnichenko

Fcmi-approach to Testing Interoperability of Integrated Combat Management System 000_1.pdf

Integrated ship combat management system as a complex open system represents a composition of components that use internal and external communication facilities intended for prescribed functions implementation. Interoperability is the one of complex system characteristics, i.e. an ability of one or two information systems or its components to exchange information and use the information received as a result of exchange [GOST R 55062-2012. Information Technologies. Industrial Automation Systems and Integration. Interoperability. Basic Principles]. The subsystems being included into the interoperability system work with the use of independent algorithms. These subsystems do not have a unified control point. The whole control is determined by a unified standard set that is interoperability profile. The interoperability of systems of different classes and purposes is testing with a variety of characteristics that determine the system attribute directly and indirectly. The article presents FCMI-approach to evaluation of integrated ship combat management system interoperability on the basis of the fuzzy cognitive model with fuzzy logic tools in MATLAB environment. The proposed approach assists the analysis and decision-making in not completely determined situations. The basis of the approach lies in modelling expert perceptions on testing interoperability of integrated ship combat management systems. Integrated ship combat management system as a complex open system represents a composition of components that use internal and external communication facilities intended for prescribed functions implementation.

Fcmi-подход, integrated ship combat management system, interoperability, cognitive model, hierarchy analysis method, fuzzy knowledge base, fuzzy cognitive map, fuzzy logic inference, fcmi-approach.

2015_ 4

Sections: Automated control systems

Subjects: Automated control systems, Architecture of ship's system.


Andrei Sergeevich Popov, S.M. Budenny Military Academy of Communications, Candidate of Engineering; graduated from Ryazan State Radioengineering University; Instructor of the General Vocational Subject Faculty at the S.M. Budenny Military Academy of Communications; an author of articles in the field of signal processing, statistical decision theory, and data transmission through wireless communication channels in information systems. [e-mail: andrzn62@yandex.ru]A. Popov,

Sergei Sergeevich Popov, Ryazan Higher Command Airborn College, graduated from Ryazan State Radioengineering University; Officer of the State Secrets Protection Service at Ryazan Higher Command Airborn College; an applicant of the S.M. Budenny Military Academy of Communications; an author of articles in the field of signal processing and statistical decision theory. [e-mail: andrzn62@yandex.ru]S. Popov,

Andrei Sergeevich Korsunskii, FRPC JSC ’RPA ’Mars’, Candidate of Engineering; graduated from the Faculty of Radio Communications at Ulyanovsk Branch of the Military Communications University; finished his post-graduate studies at the S.M. Budenny Military Academy of Communications; Chief Specialist at FRPC JSC ’RPA ’Mars’; an author of articles and inventions in the field of radio-electronics protection, communications, and information security as well as data transmission through wireless communication channels in information telecommunication systems. [e-mail: aksspb@mail.ru]A. Korsunsky,

Tatiana Nikolaevna Maslennikova, FRPC JSC ’RPA ’Mars’, Candidate of Engineering; graduated from the Faculty of Radioengineering of Ulyanovsk Polytechnic Institute; Head of a research-and-development la-boratory at FRPC JSC ’RPA ’Mars’; an author of papers and publications in the field of infor-mation support of special-purpose computer-aided systems. [e-mail: mars@mv.ru]T. Maslennikova

Estimation of Optimal Multiservice Telecommunications Network Router Buffer Size 000_5.pdf

The article deals with different approaches to the estimation of optimal multiservice network router buffer size. It has been found that in plenty of existing approaches the most rational one should take into account the real traffic spectrum jointly with the facilities providing quality of service when optimal buffer size estimating. The qualitative traffic control can be realized only under conditions of prioritizing multimedia data flows in a format of fast and slow buffers. In addition, to provide the guaranteed quality of service during short-period traffic pulsations it is necessary to calculate the router buffer size taking into account packet loss prevention. The achieved conclusions can be used for the development of multipurpose integrated information management systems.

Buffer, router, multiservice telecommunications network, communications channel, quality of service.

2015_ 2

Sections: Information systems

Subjects: Information systems, Electrical engineering and electronics.


Andrey Sergeevich Korsunsky, FRPC OJSC ’RPA ’Mars’, Candidate of Engineering; graduated from the Faculty of Radio-Communications at Ulyanovsk branch of the Military Communications University; finished his post-graduate studies at the Military Communications Academy named after S. Budenny; Chief Specialist at FRPC OJSC ’RPA ’Mars’; author of articles and inventions in the field of radio-electronics protection, communications and information security as well as information transport through wireless channels. [e-mail: aksspb@mail.ru]A. Korsunsky,

Tatiana Nikolaevna Maslennikova, FRPC OJSC ’RPA ’Mars’, Candidate of Engineering; graduated from the Faculty of Radio-Engineering of Ulyanovsk Polytechnic Institute; Head of a research-and-development laboratory at FRPC OJSC ’RPA ’Mars’; author of papers and publications in the field of information support of special-purpose computer-aided systems [e-mail: mars@mv.ru]T. Maslennikova,

Vadim Georgievich Eryshov, Military Communications Academy, [e-mail: eryshov@mail.ru]V. Eryshov

A Simulation Model of an Information Security Analysis System in Computer-aided Systems 32_2.pdf

The article deals with a simulation model of an information security analysis system in computer-aided systems processing the confidential information. Hereafter, the dependences obtained while modeling can form a basis for the analysis of the existing information security analysis systems and for synthesis of new ones.

Information security analysis system, computer-aided system, queuing system, exposure scanner, simulation model.

2013_ 2

Sections: System analysis, data management and processing

Subjects: Automated control systems, Computer-aided engineering, Information systems.


Andrei Sergeevich Popov, Military Communications Academy named after S. Budenny, graduated from Ryazan State Radioengineering University; post-graduate student of the Chair General Disciplines at the Military Communications Academy named after S. Budenny; author of articles in the field of signal processing, statistic decision-making theory as well as data transmission through wireless data links of information systems [e-mail: koks85230@mail.ru]A. Popov,

Roman Vasilyevich Ivanenko, Ryazan State Radioengineering University, graduated from Ryazan Higher Military Communications Command College; head of the Military Chair at Ryazan State Radioengineering University; author of tutorials, articles in the field of data transmission in military-purpose control systems, digital signal processing [e-mail: koks85230@mail.ru]R. Ivanenko,

Andrey Sergeevich Korsunsky, Federal Research-and-Production Center Research-and-Production Association Mars, Candidate of Engineering; graduated from the Faculty of Radio-Communications of Ulyanovsk branch of the Military Communications University; completed his post-graduate program at the Military Communications Academy named after S. Budenny; lead programmer at Federal Research-and-Production Center Research-and-Production Association Mars; author of articles and inventions in the field of radioelectronic protection, communications and information security as well as data transmission through wireless communications channels of infotelecommunication systems [e-mail: aksspb@mail.ru]A. Korsunsky

Influence of Malicious and Unintended Interference on Detection of Pulsed Ultra-broadband Signals 29_11.pdf

The article deals with potential characteristics of pulsed ultra-broadband signals. It gives a principal consideration to a system for signal detection and suggests a bloc of detector with adaptation of threshold when changing signal and noise levels. The authors have researched into issues of different-interference impact on detection system. The different types of interference allowed speaking about a high level of noise immunity of pulsed ultra-broadband signals of wireless-access systems.

Pulsed ultra-broadband signals, signal-detection system, malicious and unintended interference.

2012_ 3

Sections: Telecomm unications systems and computer networks

Subjects: Automated control systems.


Alexander Vladimirovich Barabanov, Echelon, JSC, graduated from Bauman Moscow State Technical University; head of a group of the test and certification department at Echelon, JSC; author of articles in the field of analysis of information-technology product security against unauthorized access to information [e-mail: mail@cnpo.ru]A. Barabanov,

Alexey Sergeevich Markov, Echelon, JSC, Candidate of Engineering, Associate Professor at the chair 'Information Security' of Bauman Moscow State Technical University, CISSP, SBCI; Director General of Echelon, JSC; is interested in testing and certification of software as per requirements of information security, issues of software reliability [e-mail: mail@cnpo.ru]A. Markov,

Valentin Leonidovich Tsirlov, Echelon, JSC, Candidate of Engineering, Associate Professor at the chair 'Information Security' of Bauman Moscow State Technical University, CISSP, AMBCI; Chief Executive Officer at Echelon, JSC; is interested in security audit and formal verification of software and computer-aided systems, management of information security [e-mail: mail@cnpo.ru]V. Tsirlov,

Andrey Sergeevich Korsunsky, Federal Research-and-Production Center 'Research-and-Production Association 'Mars', Candidate of Engineering; graduated from the Faculty of Radio-Communications of Ulyanovsk branch of the Military Communications University; finished his post-graduate studies at the Military Communications Academy named after S. Budenny; lead programmer; author of articles and inventions in the field of radioelectronic protection, communications and information security as well as data transmission through wireless communications channels of infotelecommunication systems [e-mail: aksspb@mail.ru]A. Korsunsky

Stability Inspection for Characteristicsof Certified Information-security Facilities 27_2.pdf

The article deals with issues of periodic inspection of stability of characteristics of certified information-security facilities. The authors have developed stochastic and deterministic models for inspections of information-security facilities and operation environment.

Inspection, periodic inspection, stochastic inspection models, regular flow, bernoulli flow, certification, security mechanisms.

2012_ 1

Sections: System analysis, datamanagement andprocessing

Subjects: Automated control systems, Information systems.


Andrei Sergeevich Popov, Military Communications Academy named after S. Budenny, graduated from Ryazan State Radioengineering University; post-graduate student at the chair 'General Disciplines' of the Military Communications Academy named after S. Budenny; author of articles in the field of signal processing, statistic decision-making theory as well as data transmission through wireless data links of information systems [e-mail: koks85230@mail.ru]A. Popov,

Oleg Nikolaevich Kiselev, Military Communications Academy named after S. Budenny, graduated from Ryazan Higher Military Command Communications College; Associate Professor at the chair 'General Disciplines' of the Military Communications Academy named after S. Budenny; author of textbooks and articles in the field of theory of electrical link and digital processing of signals [e-mail: kisel1979@mail.ru]O. Kiselev,

Andrey Sergeevich Korsunsky, Federal Research-and-Production Center 'Research-and-Production Association 'Mars', Candidate of Engineering, graduated from the Faculty of Radio-Communications of Ulyanovsk branch of the Military Communications University; finished his post-graduate studies at the Military Communications Academy named after S. Budenny; lead programmer author of articles and inventions in the field of radioelectronic protection communications and information security as well as data transmission through wireless communications channels of infotelecommunication systems [e-mail: aksspb@mail.ru]A. Korsunsky

Processing of Impulse Broadband Signalsastaskof Detection/identification 27_10.pdf

The article deals with issues of multi-choice detection/identification of impulse broadband signals from the point of view of a task of hypothesis proof. The authors have got a mathematical description of output radioline statistics, which enables the implementation of discrimination algorithms for a signal (subscriber) set based on evaluation of maximum likelihood.

Multi-choice detection/identification, impulse broadband signals, functional of likelihood ratio.

2012_ 1

Sections: Telecommunications systems and computer networks

Subjects: Automated control systems, Electrical engineering and electronics.


Oleg Mikhailovich Lepeshkin, Military Communications Academy named after S. Budenny, Candidate of Engineering, Associate Professor; graduated from Stavropol Military Communications Institute; doctoral student at the Military Communications Academy named after S. Budenny; author of articles and inventions in the field of information security and development of methodology for operational security of sociotechnical systems on basis of radical environment in order to improve the security of information systems of public administration. [e-mail: lom@stavsu.ru]O. Lepeshkin,

Andrey Sergeevich Korsunsky, Federal Research-and-Production Center Open Joint-Stock Company 'Research-and-Production Association 'Mars', Candidate of Engineering; graduated from the Faculty of Radio-Communications of Ulyanovsk branch of the Military Communications University; finished his post-graduate studies at the Military Communications Academy named after S. Budenny; lead programmer at Federal Research-and-Production Center 'Research-and-Production Association 'Mars'; author of articles and inventions in the field of radioelectronic protection, communications and information security as well as data transmission through wireless communications channels of infotelecommunication systems. [e-mail: aksspb@mail.ru]A. Korsunsky

Structure Optimization for Software and Hardware Facilities in Computer-aided Control Systems 26_11.pdf

The article deals with a problem of the increase of the efficiency of the operation of a computer-aided control system under conditions of the use of infocommunication technologies due to the optimization of the structure of a software and hardware system in real time.

Computer-aided control system, infocommunication technologies, optimization.

2011_ 4

Sections: Telecommunications systems and computer networks

Subjects: Automated control systems, Information systems.


Andrey Sergeevich Korsunsky, Federal Research-and-Production Center Open Joint-Stock Company 'Research-and-Production Association 'Mars', Candidate of Engineering; graduated from the Faculty of Radio-Communications of Ulyanovsk branch of the Military Communications University; finished his post-graduate studies at the Military Communications Academy named after S. Budenny; lead programmer at Federal Research-and-Production Center 'Research-and-Production Association 'Mars'; author of articles and inventions in the field of radioelectronic protection, communications and information security as well as data transmission through wireless communications channels of infotelecommunication systems. [e-mail: aksspb@mail.ru]A. Korsunsky,

Vadim Georgievich Eryshov, Military Communications Academy named after S. Budenny, Candidate of Engineering; graduated from the Military Communications Academy named after S. Budenny; finished his doctoral studies at the Military Communications Academy; Associate Professor at the Chair 'Radioelectronic Protection, Communications and Information Security' of the Military Communications Academy; author of text-books, articles and inventions in the field of electromagnetic compatibility of military-purpose radioelectronic facilities, monitoring of communications and information security as well as that of information security against its leakage through technical channels. [e-mail: eryshov@mail.ru]V. Eryshov

Protection of Infotelecommunication Systems in Information and Psychological Warfare 26_12.pdf

The article deals with an approach to the protection of infotelecommunication systems in information and psychological warfare. The suggested approach contributes to anticipating system reconfiguration on basis of the analysis of enemy operations. The re-configuration results in the decrease of the efficiency of infotelecommunication system cracking by affecting sides and in the saving of required values of subscriber-service timeliness.

Infotelecommunication system, information and psychological warfare, information security, re-configuration, simulation.

2011_ 4

Sections: Telecommunications systems and computer networks

Subjects: Automated control systems.


Vadim Georgievich Eryshov, Military Communications Academy named after S. Budenny, Candidate of Engineering; graduated from the Military Communications Academy named after S. Budenny; finished his doctoral studies at the Military Communications Academy; Associate Professor at the Chair Radio-Electronics Protection, Security of Communications and Information of the Military Communications Academy; author of text-books, articles and inventions in the field of electromagnetic compatibility of militarypurpose radio-electronics facilities, monitoring of communications and information security as well as monitoring of information security against its leakage through technical channels. [e-mail: eryshov@mail.ru]V. Eryshov,

Andrey Sergeevich Korsunky, FRPC OJSC RPA Mars, Candidate of Engineering; graduated from the Faculty of Radio-Communications at Ulyanovsk branch of the Military Communications University; finished his post-graduate studies at the Military Communications Academy named after S. Budenny; lead programmer at FRPC OJSC RPA Mars; author of articles and inventions in the field of radio-electronics protection, communications and information security. [e-mail: aksspb@mail.ru]A. Korsunky,

Andrey Petrovich Vashchenko, General Staff of the Armed Forces of the Russian Federation, graduated from Ulyanovsk Higher Military Communications Command College, the Military Communications Academy named after S. Budenny; senior officer at a department of the 8th Agency of the General Staff of the Armed Forces of the Russian Federation; author of articles in the field of communications and information security as well as in the field of control of processes of data transfer via communications channels of computer-aided information systems. [e-mail: VAP-1973-06-11@yandex.ru]A. Vashchenko

A Method of the Creation of Intelligence-resistant Communications System 25_10.pdf

The article deals with a method for the creation of an intelligence-resistance communications system which contributes to the increase of the protection level for military-purpose communications systems by ensuring the least contrast for the space of disclosure attributes due to uniform change of their information values.

Intelligence resistance, communications system, information security, disclosure attributes, information value, technical intelligence, common network of electrical communications.

2011_ 3

Sections: Information-protection methods and systems, information security

Subjects: Automated control systems, Information systems.


Andrey Alexanderovich Ermolenko, Saint-Petersburg Institute of Informatics and Automation of the Russian Academy of Sciences, Candidate of Engineering; graduated from the Faculty of Computer Engineering of the Naval Radio-Electronics Academy named after A. Popov, the Faculty of Radio-Electronics of the Naval Academy; senior staff scientist of the Institution of the Russian Academy of Sciences of Saint-Petersburg Institute of Informatics and Automation of the Russian Academy of Sciences; author of publications in the field of information technologies and information security. [e-mail: ermolenko@mail.ru]A. Ermolenko,

Andrey Sergeevich Korsunky, FRPC OJSC RPA Mars, Candidate of Engineering; graduated from the Faculty of Radio-Communications at Ulyanovsk branch at the Military Communications University; finished his post-graduate studies at the Military Communications Academy named after S. Budenny; lead programmer at FRPC OJSC RPA Mars; author of articles and inventions in the field of radio-electronics protection, communications and information security. [e-mail: aksspb@mail.ru]A. Korsunky,

Tatiana Nikolaevna Maslennikova, FRPC OJSC RPA Mars, Candidate of Engineering; graduated from the Faculty of Radio-Engineering of Ulyanovsk Polytechnic Institute; head of a research-and-development laboratory at FRPC OJSC RPA Mars; author of papers and publications in the field of information support of special-purpose computer-aided systems. [e-mail: mars@mv.ru]T. Maslennikova

Problems of Information Security During the Change to Network-centric Principles of Control of Forces 25_11.pdf

The article deals with some aspects of information security, which can occur during the change to network-centric principles of control of troops (forces).

Information security, information protection, network-centric principles of control of forces.

2011_ 3

Sections: Information-protection methods and systems, information security

Subjects: Automated control systems, Information systems.


Alexey Sergeevich Markov, Research-and-Production Association Eshelon, JSC, Candidate of Engineering, Associate Professor at the Chair Information Security at Bauman Moscow State Technical University, CISSP, SBCI; Director General of Research-and-Production Association Eshelon, JSC; interested in testing and certifying of software as per requirements of information security, software reliability. [e-mail: mail@npo-echelon.ru]A. Markov,

Valentin Leonidovich Tsirlov, Research-and-Production Association Eshelon, JSC, Candidate of Engineering, Associate Professor at the Chair Information Security at Bauman Moscow State Technical University, CISSP, AMBCI; Executing Chief Manager of Research-and-Production Association Eshelon, JSC; interested in audit of security and formal verification of software and computer-aided systems, control of information security. [e-mail: mail@npo-echelon.ru]V. Tsirlov,

Sergey Anatolyevich Smolin, FRPC OJSC RPA Mars, Graduated from the Faculty of Mechanics and Mathematics at Ulyanovsk State University; head of a research laboratory at FRPC OJSC RPA Mars; author of articles in certification in the field of information security. [e-mail: mars@mv.ru]S. Smolin,

Andrey Sergeevich Korsunky, FRPC OJSC RPA Mars, Candidate of Engineering, graduated from the Faculty of Radio-Communications at Ulyanovsk branch of the Military Communications University, finished his post-graduate studies at the Military Communications Academy named after S. Budenny; lead programmer of FRPC OJSC RPA Mars; author of articles and inventions in the field of radio-electronics protection, communications and information security. [e-mail: aksspb@mail.ru]A. Korsunky

Modern Methods of Certification Tests of Software Codes Without Source Codes 24_13.pdf

The article researches features of state-of-the-art systems of software development from the point of view of audit of security and certification tests of software without source codes. It also shows possible detection of vulnerability, bookmarks and errors as well as development of certification-test reports for the programming environments JVM (Java) and .NET (C#).

Software, vulnerability, not declared capabilities, certification, information security, security audit.

2011_ 2

Sections: Telecommunications systems and computer networks

Subjects: Information systems.


Vadim Georgievich Eryshov, Military Communications Academy named after S. Budenny, Candidate of Engineering, graduated from and finished his doctoral studies at the Military Communications Academy named after S. Budenny; Associate Professor of the Chair Radio-Electronics Protection, Security of Communications and Information at the Military Communications Academy; author of textbooks, articles and inventions in the field of electromagnetic compatibility of military-purpose radio-electronics facilities, monitoring of communications and information security as well as monitoring of information security against its leakage through technical channels. [e-mail: eryshov@mail.ru]V. Eryshov,

Andrey Sergeevich Korsunky, FRPC OJSC RPA Mars, Candidate of Engineering, graduated from the Faculty of Radio-Communications at Ulyanovsk branch of the Military Communications University, finished his post-graduate studies at the Military Communications Academy named after S. Budenny; lead programmer of FRPC OJSC RPA Mars; author of articles and inventions in the field of radio-electronics protection, communications and information security. [e-mail: aksspb@mail.ru.]A. Korsunky,

Sergey Anatolyevich Smolin, FRPC OJSC RPA Mars, Graduated from the Faculty of Mechanics and Mathematics at Ulyanovsk State University; head of a research laboratory at FRPC OJSC RPA Mars; author of articles in certification in the field of information security. [e-mail: mars@mv.ru]S. Smolin

Certification of Systems, Facilities of Communications, Information Security and Software As Per Information-security Requirements 24_14.pdf

The article researches a certification process as per requirements of information security in order to detect probability and time dependences of events and states of the process. It reveals the got dependences which can be used for the estimation of effectiveness of the operation of existing systems in certification, and development of improvement suggestions.

Certification, markovian processes, information security, certification-process model.

2011_ 2

Sections: Telecommunications systems and computer networks

Subjects: Information systems.


Yury Ivanovich Starodubtsev, Military Communications Academy named after S. Budenny, Doctor of Military Sciences, Professor, graduated from the Kemerovo Command Communications Academy, the Military Communications Academy named after S. Budenny; Honoured Scientist of the Russian Federation, Academician of the Russian Academy of Military Sciences, Academy of Security and Legal Order, the Russian Academy of Natural Sciences, Academy Arctic of Sciences; honorary worker in higher vocational education; holds the Chair Radio-Electronics Protection, Security of Communications and Information at the Military Communications Academy named after S. Budenny; author of monographs, text-books, articles and inventions in the field of protection of information resources of military-communications systems and C2 systems under information-war conditions. [e-mail: vas@mail.ru]Y. Starodubtsev,

Vadim Georgievich Eryshov, Military Communications Academy named after S. Budenny, Candidate of Engineering, graduated from the Military Communications Academy named after S. Budenny, finished his doctoral studies at the Military Communications Academy; Associate Professor of the Chair Radio-Electronics Protection, Security of Communications and Information at the Military Communications Academy; author of text-books, articles and inventions in the field of electromagnetic compatibility of military-purpose radio-electronics facilities, monitoring of communications and information security as well as monitoring of information security against leakage through technical channels. [e-mail: eryshov@mail.ru]V. Eryshov,

Andrey Sergeevich Korsunsky, FRPC OJSC RPA Mars, Candidate of Engineering, graduated from the Faculty of Radio-Communications at the Ulyanovsk branch of the Military Communications University, finished his post-graduate studies at the Military Communications Academy named after S. Budenny; lead programmer of FRPC OJSC 'RPA 'Mars'; author of articles and inventions in the field of radio-electronics protection, communications and information security. [e-mail: aksspb@mail.ru]A. Korsunky

Model for Process of Information-security Monitoring in Information and Telecommunication Systems 23_8.pdf

The article studies an aspect of information opposition - monitoring of information security in information and telecommunications systems, and deals with a model of information security in information and telecommunication systems on basis of the Markovian-process theory.

Monitoring of information security, information and telecommunication system, markovian processes.

2011_ 1

Sections: Information-protection methods and systems. information security

Subjects: Automated control systems, Mathematical modeling.


Andrey Sergeevich Korsunsky, [e-mail: mars@mv.ru ]A. Korsunsky

Model of Operational Process for Computer-aided System of Radio Intelligence and Radio Countermeasures on Basis of Method of Topological Transformation of Stochastic Networks 22_14.pdf

The article considers aspects of information opposition, namely: radio intelligence and radio countermeasures of radioemission sources. It also considers an approach to a procedures of operation of computer-aided system of radio intelligence and radio countermeasures on basis of a method of topological transformation of stochastic networks.

Method of topological transformation of stochastic networks, radio intelligence, radio-emission source, radio countermeasures.

2010_ 4

Sections: Telecommunicatin systems and computer networks

Subjects: Automated control systems, Architecture of ship's system.


Andrey Sergeevich Korsunsky, [e-mail: mars@mv.ru]A. Korsunsky,

Olga Vasilievna Sheykina, [e-mail: mars@mv.ru] O. Sheykina

Authentication of Correspondents in Umts-netwoks When Using Gold and Kasami Pseudorandom Sequences. 20_6.pdf

The article investigates a way of authentication of correspondent calls in networks of mobile radio 3Gcommunications (UMTS). It also deals with an approach to correspon-dent-authentication procedure using Gold and Kasami sequences.

Authentication, information security, pseudorandom sequences, noise immunity, protection against false-data entry.

2010_ 2

Sections: Theoretical issues of automation of command and control processes

Subjects: Mathematical modeling.


Sergey Anatolyevich Smolin, [e-mail: mars@mv.ru]S. Smolin,

Andrey Sergeevich Korsunsky, [e-mail: mars@mv.ru]A. Korsunsky

About Certification in the Information-security Field 19_4.pdf

The article investigates a issues of certification in the field of information security. It deals with an approach to certification procedure in the field of information security, contributing to reasoning of quantitative factors of certification-system efficiency.

Certification, attestation, information security.

2010_ 1

Sections: Theoretical issues of automation of command and control processes

Subjects: Automated control systems.


Andrey Sergeevich Korsunsky[e-mail: mars@mv.ru] A. Korsunsky

Analysis of Subscriber Terminal Authentication Protocols in Mobile Radio Networks 18_3.pdf

The actual article presents studies in ensuring authenticity and availability of data and services in existing and future-proof mobile radio networks. It also shows that some ad-vanced technologies are considerably vulnerable in case of information attack from the point of view of information and information resource availability.

Authentication, information security, mobile radio networks.

2009_ 4

Sections: Theoretical issues of automation of command and control processes

Subjects: Automated control systems.


© FRPC JSC 'RPA 'Mars', 2009-2018 The web-site runs on Joomla!