Preview

Herald of Dagestan State Technical University. Technical Sciences

Advanced search

ANALYSIS OF TYPICAL NETWORK ATTACKS ON AUTOMATED SYSTEMS OF INTERNAL AFFAIRS DEPARTMENTS

https://doi.org/10.21822/2073-6185-2020-47-1-72-85

Abstract

Abstract. Aim Important contemporary trends in the theory and functional practice of secure automated systems at informatisation facilities of internal affairs bodies include an increase in the number of threats realised through remote unauthorised access (network attacks) on confidential in-formation resources, as well as the increasing complexity of implementing mechanisms aimed at providing protection from such attacks. In order to increase the effectiveness of existing and prospective automated security systems at the informatisation facilities of internal affairs bodies, it is necessary to identify and analyse typical network attacks aimed at components and software comprising these systems.

Method. The method for solving this problem consists in a comprehensive analysis of the process of implementing network attacks on automated systems when they are used in secure mode in the informatisation facilities of internal affairs bodies.

Results. Based on the analysis of information held in the security threat database developed by the Russian Federal Service for Technical and Export Control (FSTEC), modern features and operations of secure automated systems on the informatisation facilities of bodies of internal affairs and the results of a survey of experts in the field of information protection of allocated in accordance with the classification typology, eight types of dan-gerous attacks on automated systems of the internal affairs bodies are described taking into account their sources, objects, effects and possible consequences of implementation.

Conclusion. The presented results are of use in further studies to conduct a quantitative assessment of the danger of typical attacks and for developing a private model of actual attacks for a specific automated system, taking into account their functional features in secure mode operations at the informatisation facility of the internal affairs body.

About the Authors

I. G. Drovnikova
Voronezh Institute of the Ministry of Internal Affairs of Russia
Russian Federation

Dr. Sci.(Technical), Assoc. Prof.

53 Patriotov St., Voronezh 394065



Е. S. Ovchinnikova
Voronezh Institute of the Ministry of Internal Affairs of Russia
Russian Federation

Adjunct

53 Patriotov St., Voronezh 394065



V. V. Konobeevsky
Voronezh Institute of the Ministry of Internal Affairs of Russia
Russian Federation

Cand. Dr. Sci.(Technical), Assoc. Prof.

53 Patriotov St., Voronezh 394065



References

1. Ob utverzhdenii Doktriny informatsionnoy bezopasnosti Rossiyskoy Federatsii: ukaz Prezidenta RF ot 05.12.2016 № 646 [Elektronnyy resurs]. — URL:http://publication.pravo.gov.ru/Document/ View/0001201612060002 (data obrashcheniya: 14.11.2019). [On approval of the Doctrine of Information Security of the Russian Federation: Decree of the President of the Russian Federation dated December 05, 2016 No. 646 [Electronic resource]. - URL: http: //publication.pravo.gov.ru/Document/ View / 0001201612060002 (accessed: 11/14/2019). (In Russ.)]

2. Ob utverzhdenii Kontseptsii obespecheniya informatsionnoy bezopasnosti organov vnutrennikh del Rossiyskoy Federatsii do 2020 goda: prikaz MVD Rossii ot 14.03.2012 № 169 [Elektronnyy resurs]. RL:http://policemagazine.ru/forum/showthread. php?t=3663 (data obrashcheniya: 27.11.2019) [On approval of the Concept of ensuring information security of the internal affairs bodies of the Russian Federation until 2020: Order of the Ministry of Internal Affairs of Russia dated 14.03.2012 No. 169 [Electronic re-source]. RL: http: //policemagazine.ru/forum/showthread. php? t = 3663 (accessed: 11/27/2019) (In Russ.)]

3. Butusov I.V. Methodology of Security Assessment Automated Systems as Objects Critical Information Infrastructure / I.V. Butusov, A.A. Romanov [Electronic resource]. - URL: fcyberrus.com/wp-content/uploads/ 2018/05 / 02-10-125-18_1. Butusov.pd (accessed: 11.28.2019).

4. Maximizing Uptime of Critical Systems in Commercial and Industrial Applications VAVR-8K4TVA_R1_EN.pdf [Elec-tronic resource]. - URL: https: //download.schneider-eletric. com / files? p_Doc_Ref = SPD_VAVR-8K4TVA_EN (Date ac-cessed: 12/04/2019).

5. Xin Z. Research on effectiveness evaluation of the mission-critical system / Z. Xin, M. Shaojie, Z. Fang // Proceedings of 2013 2nd International Conference on Measurement, Information and Control. 2013 . pp. 869-873(In Russ.)]

6. Metody i sredstva evolyutsionnogo i strukturnogo modelirovaniya pri obosnovanii trebovaniy k programmnym sistemam zashchity informatsii: monografiya / Zmeyev A.A. [i dr.]; pod red. Ye.A. Rogozina. — Voronezh: Voronezhskiy institut MVD Rossii, 2015. 92 s. [Methods and tools of evolutionary and structural modeling when substantiating requirements for software information pro-tection systems: monograph / Zmeev A.A. [and etc.]; under the editorship of E.A. Rogozin. - Voronezh: Voronezh Institute of the Ministry of Internal Affairs of Russia, 2015. 92 p. (In Russ.)]

7. YAzov YU.K. Zashchita informatsii v informatsionnykh sistemakh ot nesanktsionirovannogo dostupa / YU.K. YAzov, S.V. Solov'yev. Voronezh: Kvarta, 2015. 440 s [Yazov Yu.K. Information security in information systems from unauthorized access / Yu.K. Yazov, S.V. Soloviev. - Voronezh: Quarta, 2015. 440 p. (In Russ.)]

8. GOSTR ISO/MEK 15408-2-2013. Informatsionnaya tekhnologiya. Metody i sredstva obespecheniya bezopasnosti. Kriterii otsenki bezopasnosti informatsionnykh tekhnologiy. CH. 2: Funktsional'nyye komponenty bezopasnosti [Elektronnyy resurs]. — URL:http://docs.cntd. ru/document/1200105710 (data obrashcheniya 18.11.2019). [GOSTR ISO / IEC 15408-2-2013. Information technology. Security methods and tools. Criteria for assessing the security of information technology. Part 2: Functional com-ponents of security [Electronic resource]. - URL: http: //docs.cntd. com / document / 1200105710 (accessed 11/18/2019) (In Russ.)]

9. GOST R 51583-2014. Natsional'nyy standart Rossiyskoy Federatsii. Zashchita informatsii. Poryadok sozdaniya avtomatiziro-vannykh sistem v zashchishchennom ispolnenii [Elektronnyy resurs]. URL:http://docs.cntd.ru/document/1200108858 (data obrash-cheniya: 21.11.2019). [GOST R 51583-2014. National standard of the Russian Federation. Protection of information. The pro-cedure for creating automated systems in a protected version [Electronic resource]. URL: http: //docs.cntd.ru/document/1200108858 (accessed date: 11/21/2019) (In Russ.)]

10. .FSTEK RF. Rukovodyashchiy dokument. Avtomatizirovannyye sistemy. Zashchita ot nesanktsionirovannogo dostupa k informatsii. Klassifikatsiya avtomatizirovannykh sistem i trebovaniya po zashchite informatsii [Elektronnyy resurs]. — URL:https://fstec.ru/ tekhnicheskaya-zashchita-informatsii/dokumenty/114-spetsialnye-normativnye-dokumenty/384-rukovodyashchij-dokument-reshenie-predsedatelya-gostekhkomissii-rossii-ot-30-marta-1992-g (data obrashcheniya 24.11.2019). [FSTEC of the Russian Federation. Guidance document. Automated systems. Protection against unauthorized access to information. Classification of automated systems and information protection requirements [Electronic resource]. - URL: https: //fstec.ru/ tekhnicheskaya-zashchita-informatsii / dokumenty / 114-spetsialnye-normativnye-dokumenty / 384-rukovodyashchij-dokument-reshenie-predsedatelya-gostekhkomissii-rossii-ot-30-mart (date of treatment 11.24.2019) (In Russ.)]

11. FSTEK RF. Rukovodyashchiy dokument. Kontseptsiya zashchity sredstv vychislitel'noy tekhniki i avtomatizirovannykh sistem ot nesanktsionirovannogo dostupa k informatsii.[Elektronnyy resurs]. URL:http://fstec.ru/component/attachments/download/299 (data obrashcheniya: 18.11.2019). [FSTEC of the Russian Federation. Guidance document. The concept of protecting computer equipment and automated systems from unauthorized access to information. [Electronic resource]. URL: http: //fstec.ru/component/attachments/download/299 (accessed: 11/18/2019) (In Russ.)]

12. FSTEK RF. Rukovodyashchiy dokument. Sredstva vychislitel'noy tekhniki. Zashchita ot nesanktsionirovannogo dostupa k infor-matsii. Pokazateli zashchishchennosti ot nesanktsionirovannogo dostupa k informatsii [Elektronnyy resurs]. — URL: http://fstec.ru/tekhnicheskaya-zashchita-informatsii/dokumenty/114-spetsialnye-normativnye-dokumenty/383-rukovodyashchij-dokument-reshenie-predsedatelya-gostekhkomissii-rossii-ot-25-iyulya-1997-g (data obrashcheniya: 24.11.2019). FSTEC of the Rus-sian Federation. Guidance document. Computer facilities. Protection against unauthorized access to information. Indicators of security against unauthorized access to information [Electronic resource]. - URL: http://fstec.ru/tekhnicheskaya-zashchita-informatsii/dokumenty/114-spetsialnye-normativnye-dokumenty/383-rukovodyashchij-dokument-reshenie-predsedatelya-gostekhkomissii-rossii-ot-25-iyuly (Date of treatment: 11.24.2019) (In Russ.)]

13. FSTEK Rossii. Metodicheskiy dokument. Bazovaya model' ugroz bezopasnosti personal'nykh dannykh pri ikh obrabotke v infor-matsionnykh sistemakh personal'nykh dannykh (vypiska), 2008 god [Elektronnyy resurs]. URL:https://fstec.ru/component/attachments/ download/289 (data obrashcheniya: 24.11.2019). [FSTEC of Russia. Methodical doc-ument. The basic model of personal data security threats during their processing in personal data information systems (extract), 2008 [Electronic resource]. URL: https: //fstec.ru/component/attachments/ download / 289 (accessed: 11.24.2019 (In Russ.)]

14. GOST R 50922-2006. Zashchita informatsii. Osnovnyye terminy i opredeleniya [Elektronnyy resurs]. URL:http://docs.cntd.ru/ doc-ument/1200058320 (data obrashcheniya: 27.11.2019). [GOST R 50922-2006. Protection of information. Basic terms and defini-tions [Electronic resource]. URL: http: //docs.cntd.ru/ document / 1200058320 (accessed: 11/27/2019) (In Russ.)]

15. Rukovodyashchiy dokument Gosudarstvennoy tekhnicheskoy komissii ot 30 iyunya 1992 goda. Zashchita ot nesanktsionirovannogo dostupa k informatsii. Terminy i opredeleniya. [Elektronnyy resurs]. URL: https://fstec.ru/component/attachments/download/298 (da-ta obrashcheniya: 13.12.2019). [Guidance document of the State Technical Commission of June 30, 1992. Protection against un-authorized access to information. Terms and Definitions. [Electronic resource]. URL: https://fstec.ru/component/attachments/download/298 (accessed: 12/13/2019) (In Russ.)]

16. Rukovodyashchiy dokument Gosudarstvennoy tekhnicheskoy komissii pri Prezidente Rossiyskoy Federatsii ot 30 marta 1992 goda. Avtomatizirovannyye sistemy. Zashchita ot nesanktsionirovannogo dostupa k informatsii. Klassifikatsiya avtomatizirovannykh sistem i trebovaniya po zashchite informatsii [Elektronnyy resurs]. — URL:http://files.stroyinf.ru/Data2/1/4293809/4293809157.htm (data obrashcheniya: 24.11.2019). [The governing document of the State Technical Commission under the President of the Russian Federation of March 30, 1992. Automated systems. Protection against unauthorized access to information. Classification of au-tomated systems and information protection requirements [Electronic resource]. - URL: http: //files.stroyinf.ru/Data2/1/4293809/4293809157.htm (accessed: 11.24.2019) (In Russ.)]

17. Rad'ko N.M. Proniknoveniya v operatsionnuyu sredu komp'yutera: modeli zloumyshlennogo udalennogo dostupa / N.M. Rad'ko, YU.K. YAzov, N.N. Korneyeva. — Voronezh: Voronezh. gosud. tekhnich. un-t, 2013. — 265 s. [Radko N.M. Penetration into the computer’s operating environment: malicious remote access models / N.M. Radko, Yu.K. Yazov, N.N. Korneeva. - Voronezh: Voronezh. gos. tech. Univ., 2013. 265 p. (In Russ.)]

18. YAzov YU.K. Organizatsiya zashchity informatsii v informatsionnykh sistemakh ot nesanktsionirovannogo dostupa: monografiya / YU.K. YAzov, S.V. Solov'yev. — Voronezh: Kvarta, 2018. — 588 s. [Yazov Yu.K. Organization of information protection in in-formation systems from unauthorized access: monograph / Yu.K. Yazov, S.V. Soloviev. Voronezh: Quart, 2018. 588 p. (In Russ.)]

19. Kresimir S. The information systems' security level assessment model based on an ontology and evidential reasoning approach / S. Kresimir, O. Hrvoje, G. Marin // Computers & Security. — 2015. — P. 100-112.

20. Klaic А. Conceptual Modeling of Information Systems within the Information Security Policies / A. Klaic, M. Golub // Journal of Economics / Business and Management. — 2013. — vol. 1. — Issue 4. — pp. 371–376.

21. Method to Evaluate Software Protection Based on Attack Modeling / H. Wang [et ol.] // 2013 IEEE 10th International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Compu-ting Year. 2013. рр. 837-844.

22. Effectiveness Evaluation on Cyberspace Security Defense System / L. Yun [et ol.] // International Conference on Network and Infor-mation Systems for Computers (IEEE Conference Publications). 2015. рр. 576-579. 23.

23. Primeneniye novykh informatsionnykh tekhnologiy pri razrabotke trenazhernykh kompleksov v interesakh Vooruzhen-nykh sil Ros-siyskoy Federatsii: monografiya / Makhinov D.V. [i dr.] — Voronezh: VUNTS VVS «VVA» im. professora N.Ye. Zhukovskogo i YU.A. Gagarina, 2016. 200 s. [The use of new information technologies in the development of training complexes in the interests of the Armed forces of the Russian Federation: monograph / Makhinov DV [and others] - Voronezh: VUNC Air Force "VVA" them. professors N.E. Zhukovsky and Yu.A. Gagarina, 2016.200 s. (In Russ.)]

24. Metody i sredstva otsenki zashchishchennosti avtomatizirovannykh sistem organov vnutrennikh del: monografiya [Elektronnyy resurs] / Drovnikova I.G. [i dr.]. Voronezh: Voronezh. in-t MVD Rossii, 2017. 88 s. [Methods and means of assessing the security of automated systems of internal affairs bodies: monograph [Electronic resource] / Drovnikova I.G. [and etc.]. Voronezh: Voronezh. In-stitute of the Ministry of Internal Affairs of Russia, 2017. 88 p. (In Russ.)]

25. Popov A.D. Modeli i algoritmy otsenki effektivnosti sistem zashchity informatsii ot nesanktsionirovannogo dostupa s uchetom ikh vremennykh kharakteristik v avtomatizirovannykh sistemakh organov vnutrennikh del: dis. ... kand. tekhn. nauk: 05.13.19 / Popov Anton Dmitriyevich. Voronezh, 2018. 163 s. [Popov A.D. Models and algorithms for evaluating the effectiveness of information pro-tection systems against unauthorized access, taking into account their time characteristics in automated systems of internal affairs bod-ies: dis. ... cand. tech. Sciences: 05.13.19 / Popov Anton Dmitrievich. Voronezh, 2018.163 p. (In Russ.)]

26. Popov A.D. Klassifikatsiya ugroz informatsionnoy bezopasnosti v avtomatizirovannykh informatsionnykh sistemakh / Ye.A. Rogozin, A.D. Popov, D.I. Korobkin // Pribory i sistemy. Upravleniye, kontrol', diagnostika. — 2017. № 7. S. 22–26. [Popov A.D. Classification of threats to information security in automated information systems / E.A. Rogozin, A.D. Popov, D.I. Korobkin // De-vices and systems. Management, control, diagnostics. 2017. No. 7. рр. 22–26. (In Russ.)]


Review

For citations:


Drovnikova I.G., Ovchinnikova Е.S., Konobeevsky V.V. ANALYSIS OF TYPICAL NETWORK ATTACKS ON AUTOMATED SYSTEMS OF INTERNAL AFFAIRS DEPARTMENTS. Herald of Dagestan State Technical University. Technical Sciences. 2020;47(1):72-85. (In Russ.) https://doi.org/10.21822/2073-6185-2020-47-1-72-85

Views: 867


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2073-6185 (Print)
ISSN 2542-095X (Online)