Baranov V.V., Kotsynyak M.A., Ivanov D.A. The Technique of Forecasting the Structure of Targeted Cyber Attack on Information Telecommunication Networks

THE TECHNIQUE OF FORECASTING THE STRUCTURE OF TARGETED CYBER ATTACK ON INFORMATION TELECOMMUNICATION NETWORKS

Vladimir Vitalyevich Baranov

Candidate of Military Sciences, Associate Professor,

Head of Department of Information Security,

Platov South-Russian State Polytechnic University

This email address is being protected from spambots. You need JavaScript enabled to view it.

Prosveshcheniya St., 132, 346428 Novocherkassk, Russian Federation

Mikhail Antonovich Kotsynyak

Doctor of Military Sciences, Professor,

Military Academy of the Signal Corps named after S.M. Budenny

This email address is being protected from spambots. You need JavaScript enabled to view it.

Prosp. Tikhoretskiy, 6, 194064 Saint Petersburg, Russian Federation

Denis Aleksandrovich Ivanov

Candidate of Sciences (Engineering), Lecturer,

Military Academy of the Signal Corps named after S.M. Budenny

This email address is being protected from spambots. You need JavaScript enabled to view it.

Prosp. Tikhoretskiy, 6, 194064 Saint Petersburg, Russian Federation

Abstract. The main trend in recent years is the shift of emphasis from mass attacks to targeted (target) attacks, which are the actions of the enemy of a particular state or non-state structure in advance. The target attack is always built under the object of influence, being a thoughtful operation, not a simple technical action. Target cyber attack on the element of information and telecommunication network is implemented in the form of a set of activities aimed at studying the information system and software. This allows for revealing weaknesses in the structure of the information and telecommunication network. The authors develop the technique of hidden introduction and bypass of standard means of information protection, fix the infrastructure, distribute the harmful action. Under the impact of a targeted cyber attack, it is difficult to choose the methods and means of protecting the information and telecommunication network, as their resource is limited. One of the ways to resolve this contradiction is a differentiated approach to the protection of information and telecommunication network, which is to choose the most relevant for the current situation areas of protection. The article deals with the problem of targeted attacks proliferation and describes the principle of their realization. The authors also substantiate the need of working out the methodology for estimating the impact of targeted cyber attacks by the enemy on information and telecommunications networks as well as their key elements. The special attention is paid to the purpose and structure of this methodology. The authors describe the stages of targeted cyber attack and its application areas.

Key words: attack, targeted attack, targeted cyber attack, information and telecommunications network, technique for estimating the impact, intruder, assignment matrix

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Attachments:
Download this file (2_Baranov i dr.pdf) 2_Baranov i dr.pdf
URL: https://ti.jvolsu.com/index.php/en/component/attachments/download/565
558 DownloadsUpdate this file (2_Baranov i dr.pdf)