CONSTRUCTION CONCEPT AND ARCHITECTURE CRITICAL INFORMATION SEGMENTS OF THE REGIONAL INFOCOMMUNICATION NETWORK

Abstract

Today, in absolute terms, not a single branch of the state can do without modern high-tech communications that connect computing systems and remote databases. The use of new information and communication technologies as a means of resolving contradictions, as well as a means of implicit influence, is becoming a growing threat to the security of the community on the world stage. The presented work examines not only the stages of development, but also the main trends, approaches to the construction of digital information systems, as well as the characteristic threats to information security for them. The article also shows the actual place of critical information segments in the general context of the communication system of the Russian Federation. The first part of the work reveals the concept of a three-component construction of regional critical information segments. The main part focuses on the difference in technologies used to build critical information segments. The main part of the article is aimed at identifying the vulnerabilities of complex information structures and systems that use the architecture of multiservice communication systems. The analysis carried out by the authors allows us to classify the main threats to information security both for communication systems built according to classical circuit switching schemes, and for communication systems based on new technological principles, basically - packet switching. In general, the authors tell us that the idea of a standard and clearly defined traffic structure and user interaction procedures, regardless of their type, geographic distance or area of its application, together with digital transmission and switching methods, has a revolutionary role in the development of communication systems. Special attention should be paid to the classification of protocols presented by the authors, which allows to identify the weakest points in modern information systems, which should be paid attention to first of all: protocols that ensure the functioning of wireless networks, mail protocols, file exchange protocols, and others

Authors

References

1. Saenko I.B., Lauta O.S., Karpov M.A. Model' ugroz resursam ITKS kak klyuchevomu aktivu
kriticheski vazhnogo ob"ekta infrastruktury [Model of threats to ITCS resources as a key asset of a
critically important infrastructure object], Elektrosvyaz' [Telecommunication], 2021, No. 1, pp. 41.
2. Dement'ev V.E. Ugrozy infotelekommunikatsionnoy seti v usloviyakh informatsionnogo
protivoborstva [Threats to the infotelecommunication network in the context of information
warfare]. Saint Petersburg, 2015, 16 p.
3. Federal'nyy zakon "O bezopasnosti kriticheskoy informatsionnoy infrastruktury Rossiyskoy
Federatsii" ot 26.07.2017 N 187-FZ [Federal Law "On the Security of Critical Information Infrastructure
of the Russian Federation" dated 26.07.2017 N 187-FZ].
4. Federal'nyy zakon "Ob informatsii, informatsionnykh tekhnologiyakh i o zashchite
informatsii" ot 27.07.2006 N 149-FZ. Moskva, 2006. Moskva, 2017 [Federal Law "On Information,
Information Technologies and Information Protection" dated 27.07.2006 N 149-FZ.
Moscow, 2006. Moscow, 2017].
5. Red'kin Yu.V., Buzenkov I.I., Chernysheva E.M. Analiz konfiguratsiy besprovodnykh setey
sistem sbora dannykh i upravleniya [Analysis of configurations of wireless networks of data
collection and management systems], Informatsionnye tekhnologii. Radioelektronika.
Telekommunikatsii [Information technologies. Radio electronics. Telecommunications], 2020,
No. 8, pp. 357.
6. Berzin E.A. Optimal'noe raspredelenie resursov i elementy sinteza system [Optimal resource
allocation and elements of system synthesis]. Moscow: Sovetskoe radio, 1974, 303 p.
7. Rakhmanov A.A. Setetsentricheskie sistemy upravleniya: zakonomernye tendentsii,
problemnye voprosy i puti ikh resheniya [Network-centric management systems: natural
trends, problematic issues and ways to solve them], Voennaya mysl' [Military thought], 2010,
No. 10, pp. 41-50.
8. Buzenkov I.I., Red'kin Yu.V., Chernyshev V.M. Primenenie apparatno-programmnogo
kompleksa v sistemakh sbora i obrabotki telemetricheskoy informatsii [Application of hardware
and software complex in systems for collecting and processing telemetric information],
Komp'yuternye tekhnologii v inzhenernoy i issledovatel'skoy deyatel'nosti: Mater.
Vserossiyskoy nauchno-tekhnicheskoy konferentsii s mezhdunarodnym uchastiem.
Taganrogskiy gosudarstvennyy radiotekhnicheskiy universitet [Computer technologies in engineering
and research activities: Materials of the All-Russian Scientific and Technical Conference
with international participation. Taganrog State Radio Engineering University], 2000,
pp. 301-306.
9. Polkovnikova N.A., Buzenkov I.I. Razrabotka gibridnykh ekspertnykh sistem i intellektual'nykh
sistem podderzhki prinyatiya resheniy [Development of hybrid expert systems and intelligent
decision support systems]. Novorossiysk, 2018.
10. Red'kin Yu.V., Buzenkov I.I., Chernysheva E.M. Organizatsiya morskoy seti peredachi dannykh
s primeneniem mesh-tekhnologii [Organization of a marine data transmission network using
mesh technology], Informatsionnye resursy i sistemy v ekonomike, nauke i obrazovanii: Sb.
statey X Mezhdunarodnoy nauchno-prakticheskoy konferentsii [Information resources and systems
in economics, science and education: Collection of articles of the X International Scientific
and Practical Conference], ed. by A.P. Remontova. Penza, 2020, pp. 100-105.
11. GOST R 50922-2006. Zashchita informatsii. Osnovnye terminy i opredeleniya [GOST
R 50922-2006. Information protection. Basic terms and definitions].
12. Rad'ko N.M., Skobelev I.O. Risk-modeli informatsionno-telekommunikatsionnykh sistem pri
realizatsii ugroz udalennogo i neposredstvennogo dostupa [Risk models of information and
telecommunication systems in the implementation of threats of remote and direct access].
Moscow: RadioSoft, 2011, 229 p.
13. Kotsynyak M.A., Karpov M.A., Lauta O.S., Dement'ev V.E. Upravlenie sistemoy
obespecheniya bezopasnosti informatsionno-telekommunikatsionnoy set'yu na osnove
algoritmov funktsionirovaniya iskusstvennoy neyronnoy seti [Management of the information
and telecommunication network security system based on artificial neural network functioning
algorithms], Izvestiya Tul'skogo gosudarstvennogo universiteta. Tekhnicheskie nauki [Proceedings
of Tula State University. Technical sciences], 2020, No. 4, pp. 3-10.
14. Saati T. Prinyatie resheniy. Metod analiza ierarkhiy [Decision-making. Method of hierarchy
analysis]. M.: Radio i svyaz', 1993, 278 p.
15. Savin L.V. Setetsentrichnaya i setevaya voyna. Vvedenie v kontseptsiyu [Network-centric and
network warfare. Introduction to the concept]. Moscow: Evraziyskoe dvizhenie, 2011, 130 p.
16. Sedyakin N.M. Elementy teorii sluchaynykh impul'snykh potokov [Elements of the theory of
random pulse flows]. Moscow: Sovetskoe radio, 1965, 264 p.
17. Lauta O.S., Nechepurenko A.P., Murtazin I.R., Suetin A.I. Modeli intellektual'nykh
vozdeystviy [Models of intellectual impacts], Sb. «Informatsionnaya bezopasnost' regionov
Rossii» [Collection "Information security of Russian regions"], 2017, pp. 144-145.
18. Gudkov M.A., Gagarin Yu.A., Kribel' A.M., Solov'ev D.V. Primenenie metodov zakhvata i
analiza paketov, peredavaemykh po informatsionno-telekommunikatsionnym setyam, dlya
audita setevoy bezopasnosti setey [Application of methods for capturing and analyzing packets
transmitted over information and telecommunication networks for auditing network security of
networks], Sovremennye informatsionnye tekhnologii. Teoriya i praktika: Mater. IV
Vserossiyskoy nauchno-prakticheskoy konferentsii [Modern information technologies. Theory
and practice: Materials of the IV All-Russian Scientific and Practical Conference]. ed. by
T.O. Petrova, 2018, pp. 158-162.
19. Beskov A.V., Lauta O.S., Mamay A.V. Arkhitektura seti podvizhnoy radiosvyazi na osnove
etalonnoy modeli vzaimodeystviya otkrytykh sistem [Architecture of a mobile radio communication
network based on a reference model of interaction of open systems], Radiolokatsiya,
navigatsiya, svyaz': Sb. trudov XXV Mezhdunarodnoy nauchno-tekhnicheskoy konferentsii v 6-
ti t. Voronezhskiy gosudarstvennyy universitet, AO "Kontsern "Sozvezdie" [Radar, navigation,
communication: Proceedings of the XXV International Scientific and Technical Conference in
6 volumes. Voronezh State University, JSC Concern Constellation], 2019, pp. 173-182.
20. Murtazin I.R., Kotsynyak M.A., Lauta O.S. Funktsional'naya model' kompleksa
informatsionnogo vozdeystviya na besprovodnye seti peredachi dannykh [Functional model of
the complex of information impact on wireless data transmission networks], Aktual'nye
problemy zashchity i bezopasnosti: Tr. XXII Vserossiyskoy nauchno-prakticheskoy konferentsii
RARAN [Actual problems of protection and security: Proceedings of the XXII All-Russian
Scientific and Practical Conference RARAN], 2019, pp. 188-189.
21. Kotsynyak M.A., Karpov M.A. Metodika sinteza sistemy zashchity informatsionnotelekommunikatsionnoy
seti [Methodology of synthesis of the information and telecommunication
network protection system], Radiolokatsiya, navigatsiya, svyaz': Sb. trudov XXVI
Mezhdunarodnoy nauchno-tekhnicheskoy konferentsii: v 6 t. Voronezh, 2020 [Proceedings of
the XXVI International Scientific and Technical Conference: in 6 vols. Voronezh, 2020],
pp. 231-236.
22. Ivanov D.A., Karpov M.A., Kotsynyak M.A., Shimarov E.V. Model' vozdeystviya setevykh atak
na besprovodnye seti peredachi dannykh spetsial'nogo naznacheniya [A model of the impact of
network attacks on special-purpose wireless data transmission networks], Aktual'nye problemy
infotelekommunikatsiy v nauke i obrazovanii (APINO 2020). IX Mezhdunarodnaya nauchnotekhnicheskaya
i nauchno-metodicheskaya konferentsiya: Sb. nauchnykh statey
[fotelecommunications in science and education (APINO 2020). IX International Scientifictechnical
and scientific-methodical Conference: Collection of scientific articles]. Saint Petersburg,
2020, pp. 166-171.

Скачивания

Published:

2021-11-14

Issue:

Section:

SECTION V. DESIGN AUTOMATION AND NETWORK TECHNOLOGIES

Keywords:

Information and communication network, critical information segment, technology, multiservice communication network, telephony