V.I. Budzko1, V.G. Belenkov2
1,2 Federal Research Center «Computer Science» of the Russian Academy Sciences (Moscow, Russia)
1 vbudzko@ipiran.ru, 2 vbelenkov@ipiran.ru
The current stage of development of Russian society is characterized by digital transformation of all its spheres, including economy, science, healthcare, education, culture, etc. One of the areas of such transformation is the widespread use of data intensive domains systems (DID systems), technologies and systems of artificial intelligence (AI) and machine learning (ML). The increasingly widespread use of these systems, their functioning as part of global networks entails new risks of information security, which can negatively affect individuals, groups, organizations, sectors of the economy and society as a whole. Methods of ensuring cybersecurity considering the specifics of these systems and technologies require development. Methodological provisions of the approach to ensuring cybersecurity, reflecting the specifics of the use of AI technologies and systems in DID systems, are defined in the article on the basis of the current regulatory and methodological framework in the field of information security in the country. A general approach to ensuring cybersecurity of business process objects - processing nodes and the DID system as a whole is outlined. Problems and methods for ensuring their protection from these threats are identified. The article examines the problems of ensuring cybersecurity when using AI and ML technologies as part of DID systems to implement functional tasks and issues of using AI and ML technologies to protect against threats of information security breaches.
Budzko V.I., Belenkov V.G. The ensuring cybersecurity of data intensive domains systems using artificial intelligence technologies. Highly Available Systems. 2025. V. 21. № 1. P. 52−62. DOI: https://doi.org/ 10.18127/j20729472-202501-05 (in Russian)
- Budzko V.I., Korolev V.I., Belenkov V.G., Kejer P.A. Kiberbezopasnost` sistem, realizuyushhix intensivnoe ispol`zovanie danny`x. Ch. 1. Mesto kiberbezopasnosti v zashhite informacii. Sistemy` vy`sokoj dostupnosti. 2024. T. 20. № 1. S. 16–29. DOI: https://doi.org/10.18127/ j20729472-202401-02
- Budzko V.I., Medennikov V.I., Korolev V.I., Belenkov V.G., Kejer P.A. Osobennosti sistem s intensivny`m ispol`zovaniem danny`x kak ob``ektov obespecheniya bezopasnosti informacii na primere ASU agrotexnologicheskimi processami. Sistemy` vy`sokoj dostupnosti. 2024. T. 20. № 2. S. 28–39. DOI: https://doi.org/10.18127/j20729472-202402-02
- Budzko V.I., Korolev V.I., Belenkov V.G., Kejer P.A. Kiberbezopasnost` sistem, realizuyushhix intensivnoe ispol`zovanie danny`x. Bezopasnost` Raspredelennoj Sredy` sistemy`, realizuyushhej intensivnoe ispol`zovanie danny`x. Sistemy` vy`sokoj dostupnosti. 2024. T. 20. № 4. S. 15–23. DOI: https://doi.org/10.18127/j20729472-202404-02
- Budzko V.I., Korolev V.I., Belenkov V.G., Kejer P.A. Kiberbezopasnost` sistem, realizuyushhix intensivnoe ispol`zovanie danny`x. Bezopasnost` informacionnoj infrastruktury` oblasti s intensivny`m ispol`zovaniem danny`x. Sistemy` vy`sokoj dostupnosti. 2024. T. 20. № 3.
S. 5–18. DOI: https://doi.org/10.18127/j20729472-202403-01 - Proekt Koncepcii strategii kiberbezopasnosti Rossijskoj Federacii. P. II.3). URL: http://council.gov.ru/media/files/41d4b3dfbdb25cea8a73.pdf
- Markov A.S., Cirlov V.L. Rukovodyashhie ukazaniya po kiberbezopasnosti v kontekste ISO 27032. Voprosy` kiberbezopasnosti. 2014. № 1(2). S. 28. Abzacz 2 – URL: https://s3r.ru/wp-content/uploads/2014/03/iso27032.pdf
- GOST ISO/IEC 27032-2012. Informacionny`e texnologii. Metody` obespecheniya bezopasnosti. Rukovodyashhie ukazaniya po kiberbezopasnosti. P. 4.21.
- Kriticheskaya ocenka informacii. Metodicheskoe posobie. Bibliograficheskij centr. Gosudarstvennoe byudzhetnoe uchrezhdenie kul`tury` Ryazanskoj oblasti «Ryazanskaya oblastnaya universal`naya nauchnaya biblioteka imeni Gor`kogo». Ryazan`. 2020. 17 s. URL:https://info.rounb.ru/elbibl/rounb/bibliografy/2020/kriticheskaja-otsenka-kachestva-informatsiii.pdf
- Pileczkaya A.V. Iskusstvenny`j intellekt i bol`shie danny`e. Tekst: neposredstvenny`j. Molodoj ucheny`j. 2019. № 50(288). S. 20–22. URL: https://moluch.ru/archive/288/65241/ (data obrashheniya: 18.04.2025).
- Big Data i iskusstvenny`j intellekt: chto e`to? URL:https://dzen.ru/a/Z9coCIS0LXVz2rIM
- Budzko V.I., Belenkov V.G., Korolev V.I. E`lementy` konfidencial`nosti i perspektivy` ix ispol`zovaniya v sistemax, realizuyushhix intensivnoe ispol`zovanie danny`x. Sistemy` vy`sokoj dostupnosti. 2018. T. 14. № 4. S. 55–60. DOI: 10.18127/j20729472-201804-10
- Budzko V.I., Belenkov V.G., Korolev V.I. Osobennosti ispol`zovaniya markerov konfidencial`nosti v sistemax, realizuyushhix intensivnoe ispol`zovanie danny`x. Sistemy` vy`sokoj dostupnosti. 2019. T. 15. № 2. S. 57–66. DOI: 10.18127/j20729472-201902-06
- Budzko V.I., Belenkov V.G., Korolyov V.I., Mel`nikov D.A. Osobennosti obespecheniya informacionnoj bezopasnosti avtomatizirovanny`x sistem, ispol`zuyushhix texnologii nejronny`x setej. Sistemy` vy`sokoj dostupnosti. 2023. T. 19. № 3. S. 5–17. DOI: https:// doi.org/ 10.18127/j20729472-202303-01
- Budzko V.I., Mel`nikov D.A., Belenkov V.G. Sposoby` parirovaniya atak na avtomatizirovanny`e sistemy`, ispol`zuyushhix specificheskie dlya nejronny`x setej uyazvimosti. Sistemy` vy`sokoj dostupnosti. 2023. T. 19. № 4. S. 5–20 DOI: https://doi.org/10.18127/j20729472-202304-01

