- System of analysis of bit sequences
- Biometrical systems of access control by the dynamics of subconscious movements
- Laboratory of network attacks analysis
- Procurement of mandatory access control in the modern informational systems
- System of voice identification of a user
- Multichannel voice processing
- Automatic recognition of hard copy
- Stegoanalysis of multimedia data which is composed secret message
- Research and development the models, methods and means of intrusion detection
- Research and development of high-precision methods and means of stegoanalysis
- Development of the methods and models of biometrical cryptosystems on the base of voice password
- Development of the methods, algorithms and means of automated diagnosis of the software vulnerabilities
- Development and research of the methods and means of the hidden keyboard monitoring of operators of automated information systems of the state, bank and financial structures.
System of analysis of bit sequences. Analysis of the bit sequences is a topical task in the research of unfamiliar data formats, protocols without any prior information. Usage of mathematical methods, statistical, spectral and large-scale analysis and artificial neural networks permits us to increase the work effectiveness of an operator.
The system of analysis of bit sequence was developed on the department. It permits:
- Localize the borders in the bit sequence;
- Single out the service field in the binary files and headers in the dumps of the protocols;
- Classify unknown bit sequence by data format.
Biometrical systems of access control by the dynamics of subconscious movements. Biometrical systems of access control are very widespread in the modern information technologies. They are based on the usage of biometrical characteristics of a person. The dynamic biometrical systems of access control (DBSAC) make special group of these systems. They realize the identification of a person by his subconscious movements.
The research and development in this area are made on the department. They use handwritten and keyboard script as identifiers. These elaborations and researches are the following:
- Elaboration and research of the methods of preliminary processing of biometrical data;
- Elaboration and research of the methods of biometrical data representation;
- Elaboration and research of the methods of biometrical data classification, including the geometric and parametric methods, and also the methods which are based on the usage of the artificial neural networks;
- Elaboration of the password-keyboard DBSAC;
- Elaboration of the password-handwritten DBSAC;
- Elaboration of the systems of the hidden monitoring of automated system operators which provide the hidden uninterrupted authentication of operators, detect the malicious users, control psychophysical condition of operators and so on;
- Elaboration of the biometrical crypto systems which support the generation of the private cryptographic key using the biometrical data of a user.
Laboratory of the network attacks analysis. Laboratory of the network attacks analysis was established in 2003 for the activity coordination of the department staff. The main tasks of the laboratory are:
- elaboration of the new technologies of detection of network attacks;
- elaboration of the software for generation of information impact with specified characteristics;
- development of the methodological recommendations for elaboration and effectiveness test of the attacks detection system of host and network level and firewalls;
- elaboration of new detection technology of abnormal behavior of users on the basis of behavior profiles control with the help of artificial neural networks;
- elaboration of technology of isolation and locking of malicious program.
Procurement of mandatory access control in the modern informational systems. We suggest the mechanism of adoption of mandatory access to the data. In this mechanism the setting of mandatory rights of users is realized by the system of verificatory centers. As a result user gets the digital certificate. Protected information system consists of the following subsystems:
- existent systems;
- verificatory center;
- access dispatcher.
Access dispatcher is an intermediate level between users and the system. It provides the realization of the mandatory model of access by analyzing and modifying the queries of the users.
The result of the elaboration is adoption of the subsystem of mandatory access to the geographic information system “Integration”, where the access isolation is realized on the different level of presentation of cartographic information. Besides that the authentication and traffic encryption were also developed.