350 rub
Journal Highly available systems №3 for 2024 г.
Article in number:
Cybersecurity of systems implementing data intensive domains. Security of the information infrastructure of the data intensive domains
Type of article: scientific article
DOI: 10.18127/j20729472-202403-01
UDC: 681.3
Authors:

V.I. Budzko1, V.G. Belenkov2, V.I. Korolev3, P.A. Keyer4

1–4 Federal Research Center «Computer Science» of the Russian Academy Sciences (Moscow, Russia)
3 Gubkin Russian State University of Oil and Gas (Moscow, Russia)
1 vbudzko@ipiran.ru, 2 vbelenkov@ipiran.ru,3 vkorolev@ipiran.ru, 4 pkeyer@ipiran.ru

Abstract:

The article considers the issues of ensuring the security of the information infrastructure (InIn) of the data-intensive domain (DID). The DID system and its Distributed Environment for data processing and analysis were considered as InIn. The issues of ensuring cybersecurity (ECS) of DID systems were considered as a component of the problems of ensuring information security (EIS) of these systems. The Distributed Environment was considered as the IT infrastructure of the application software and systems of the DID system. The issues of ensuring information security in DID were considered, including: a general approach to the EIS of the DID system and its Distributed Environment; features of the design and operation of the DID system and its Distributed Environment that have a significant impact on decisions to ensure its cybersecurity, using the example of an DID system using cloud technologies; specification (generalized description) of the subject area – EIS of InIn (DID system and its environment); data sources used for EIS of InIn; typical ontological annotations of the specifications of these sources.

Pages: 5-18
For citation

Budzko V.I., Belenkov V.G., Korolev V.I., Keyer P.A. Cybersecurity of systems implementing data intensive domains. Security of the information infrastructure of the data intensive domains. Highly Available Systems. 2024. V. 20. № 3. P. 5−18. DOI: https://doi.org/ 10.18127/j20729472-202403-01 (in Russian)

References
  1. Budzko V.I., Korolev V.I., Belenkov V.G., Kejer P.A. Kiberbezopasnost' sistem, realizuyushchih intensivnoe ispol'zovanie dannyh. Mesto kiberbezopasnosti v zashchite informacii // Sistemy vysokoj dostupnosti. 2024. T. 20. № 1. S. 16–29 DOI: https://doi.org/10.18127/j20729472-202401-02 (in Russian).
  2. Budzko V.I., Medennikov V.I., Korolev V.I., Belenkov V.G., Kejer P.A. Osobennosti sistem s intensivnym ispol'zovaniem dannyh kak ob"ektov obespecheniya bezopasnosti informacii na primere ASU agrotekhnologicheskimi processami // Sistemy vysokoj dostupnosti. 2024. T. 20. № 2. S. 28–39. DOI: https://doi.org/10.18127/j20729472-202402-02 (in Russian).
  3. Ankur Shukla, Basel Katt. Muhammad Mudassar Yamin. A quantitative framework for security assurance evaluation and selection of cloud services: a case study. International Journal of Information Security. 2023. P. 1621–1650. https://doi.org/10.1007/s10207-023-00709-8
  4. Hilary Finch1, Affia Abasi-Amefon, Jung, Woosub, Lucas Potter, Xavier-Lewis Palmer. Commentary on Healthcare and Disruptive Innovation // Proceedings of the 18th International Conference on Cyber Warfare and Security. 9–10 March 2023. Maryland. USA. P. 76–84.
  5. Klopper1 C.D., Eloff J.H.P. Fingerprinting Network Sessions for the Discovery of Cyber Threats. Proceedings of the 18th International Conference on Cyber Warfare and Security, 9–10 March 2023. Maryland, USA. P. 171–180.
  6. Nkata Sekonyaand Siphesihle Sithungu. The Impact of Edge Computing on the Indus-trial Internet of Things. Proceedings of the 18th International Conference on Cyber Warfare and Se-curity 9–10 March 2023. Maryland, USA. P. 359–368.
  7. Dalal N. Alharthi. Secure Cloud Migration Strategy (SCMS): A Safe Journey to the Cloud Proceedings of the 18th International Conference on Cyber Warfare and Security 9–10 March 2023. Maryland, USA. P. 1–6.
  8. Arapinis M., Mancini L.I., Ritter E., Ryan M.D. Analysis of privacy in mobile telephony systems. International Journal of Information Security 2017. P. 491–523. DOI 10.1007/s10207-016-0338-9.
  9. Hytonen E., Rajamaki Jy. Ruoslahti H. Managing Variable Cyber Envi-ronments with Organizational Foresight and Resilience Thinking. Proceedings of the 18th Interna-tional Conference on Cyber Warfare and Security 9–10 March 2023. Maryland. USA. P. 162–170.
  10. Chockalingam S., Maathuis C. An Ontology for Effective Security lncident Management. Proceedings of the 17th lnternational Conference оп lnformation Warfare and Security. 2022. Ulbany, New York. USA. P. 25–35.
  11. Smyrlis M., Floros E., Basdekis I., Prelipcean D.-B., Aris-teidis Sotiropoulos, Herve Debar, Zarras A., Spanoudakis G. RAMA: a risk assessment solution for healthcare organizations. International Journal of Information Security. 2024. P. 1821–1838 https://doi.org/10.1007/s10207-024-00820-4.
  12. Höglund J., Bouget S., Furuhed M., Preuß Mattsson J., Selander G., Raza Sh. AutoPKI: public key infrastructure for IoT with automated trust transfer. International Journal of Information Security. 2024. P. 1859–1875, https://doi.org/10.1007/s10207-024-00825-z.
  13. Karagiannis S., Ntantogian Ch., Magkos E., Tsohou A., Ribeiro L.L. Mastering data privacy: leveraging K-anonymity for robust health data sharing. International Journal of Information Security. 2024. P. 2189–2201. https://doi.org/10.1007/s10207-024-00838-8
  14. Stephen S., Alexander K., Potter L., Palmer X.-L. Implications of Cyberbiosecurity in Advanced Agriculture. Proceedings of the 18th International Conference on Cyber Warfare and Security, 9–10 March 2023. Maryland. USA. P. 387–393.
  15. Chowdhury N., Gkioulos V. A personalized learning theory-based cyber-security training exercise. International Journal of Information Security. 2023. P. 1531–1546. https://doi.org/10.1007/s10207-023-00704-z.
  16. Olivero M.A., Bertolino A., Dominguez-Mayo F.J., Escalona M.J., Matteucci I. A systematicmapping study on security for systems of systems. Interna-tional Journal of Information Security. 2024. P. 787–817. https://doi.org/10.1007/s10207-023-00757-0
  17. Celdrán A.H., Sánchez P.M.S., Castillo M.A., Bovet G., Pérez G.M., Stiller B. Intelligent and behavioral-based detection ofmalware in IoT spectrum sensors. International Journal of Information Security. 2023. P. 541–561, https://doi.org/10.1007/s10207-022-00602-w.
  18. Süren E., Heiding F., Olegård J., Lagerström R. PatrIoT: practical and agile threat research for IoT. International Journal of Information Security. 2023. P. 213–233. https://doi.org/10.1007/s10207-022-00633-3.
Date of receipt: 19.07.2024
Approved after review: 02.08.2024
Accepted for publication: 29.08.2024