=Paper=
{{Paper
|id=Vol-3094/preface
|storemode=property
|title=None
|pdfUrl=https://ceur-ws.org/Vol-3094/preface.pdf
|volume=Vol-3094
}}
==None==
AISMA-2021 Preface
Preface
This volume contains the papers presented at the AISMA-2021: Interna-
tional Workshop on Advanced in Information Security Management and Appli-
cations held on October 1, 2021 in Stavropol, Krasnoyarsk and online.
The International Workshop on Advanced in Information Security Man-
agement and Applications aims at bringing together scientists with interests in
this field to present recent innovations, find topics of common interest and to
stimulate further development of new approaches that greatly make efficient the
work of an information security management.
Main topics include (but are not limited to): AI model training in infor-
mation security, Blockchain technologies, Cryptography and applications, In-
formation risk analysis and applications, Information security awareness and
applications, Information security in education, Information security in Inter-
net of Things, Machine learning in information security, Threat detection UAV
security control systems.
Submission of papers, review and preparation of proceeding was carried
out using a conference management system EasyChair. Research papers ap-
pearing in this volume were selected after a blind peer-reviewing by at least two
reviewers. The workshop attracted 67 contributions of which 19 papers were
accepted for presentation. Additionally, it included 2 invited talks given by
Mauro Conti, University of Padua, Italy ”Side and Covert Channels” and Elena
Basan, Southern Federal University, Taganrog, Russia ”Analysis of the Impact
of a GPS Spoofing Attack on a UAV”.
The workshop, was finally held in Stavropol, Krasnoyarsk and online due
to the COVID pandemic hitting all around the world during 2020-2021.
We would like to thank all the authors for their submissions, and our
Program Committee members and additional reviewers for their precious work.
October 1, 2021 Co-chairs of the conference:
Online Prof. Fabrizio d’Amore,
Stavropol, Krasnoyarsk, Russia Sapienza Università di Roma,
Rome, Italy
Prof. Maria Lapina
North-Caucasus Federal
University,
Stavropol, Russia
Prof. Vyacheslav Zolotarev
Reshetnev Siberian State
University of Science and
Technology,
Krasnoyarsk, Russia
AISMA-2021 Program Committee
Program Committee
Co-Chairs of the Program Committee:
• Fabrizio d’Amore, Sapienza - Università di Roma, Rome, Italy
• Maria Lapina, North-Caucasus Federal University, Stavropol, Russia
• Vyacheslav Zolotarev, Reshetnev Siberian State University of Science and
Technology, Krasnoyarsk, Russia
The members of the Program Committee:
• Ivan Azarov, North-Caucasus Federal University, Stavropol, Russia
• Anastasia Arkhipova, Novosibirsk State Technical University, Novosibirsk,
Russia
• Elena Basan, Southern Federal University, Taganrog, Russia
• Roman Voronkin, North-Caucasus Federal University, Stavropol, Russia
• Carlos Grilo, Polytechnic of Leiria, Leiria, Portugal
• Yevgenia Ishchukova, Southern Federal University, Taganrog, Russia
• Elena Maksimova, Russian Technological University, Moscow, Russia
• Ekaterina Maro, Southern Federal University, Taganrog, Russia
• Massimo Mecella, Sapienza - Università di Roma, Rome, Italy
• Evgeny Kostyuchenko, Tomsk State University of Control Systems and
Radioelectronics, Tomsk, Russia
• Dmitrii Orel, North-Caucasus Federal University, Stavropol, Russia
• Ekaterina Pakulova, Southern Federal University, Rostov-on-Don, Russia
• Denis Parfenov, Orenburg State University, Orenburg, Russia
• Nikolai Parotkin, Reshetnev Siberian State University of Science and
Technology, Krasnoyarsk, Russia
• Peter Peer, University of Ljubljana, Ljubljana, Slovenia
• Olga Peskova, Southern Federal University, Taganrog, Russia
• Vyacheslav Petrenko, North-Caucasus Federal University, Stavropol, Russia
• G S Prakasha, Christ University, Central Campus, India
• Fernando da Silva, Polytechnic of Leiria, Leiria, Portugal
• Marina Zhukova, Reshetnev Siberian State University of Science and
Technology, Krasnoyarsk, Russia
AISMA-2021 Table of Contents
Table of Contents
Invited Talk
Analysis of The Impact of a GPS Spoofing Attack on a UAV . . . . . . . . . . . . . . 6-16
Elena Basan, Maria Lapina, Oleg Makarevich and Massimo Mecella
Research Papers
Implementation of Behavioral Indicators in Threat Detection and User
Behavior Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-24
Yegor Anashkin and Marina Zhukova
Multisociometrical Readiness Characteristics in Information Security
Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25-34
Anastasiya Arkhipova
Development and Testing of The Information Security Protocol in the
Medical Cloud Platform . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35-40
Liudmila Babenko, Evgenia Ishchukova, Dmitriy Alekseev and
Alexander Shumilin
Analysis of Attacks on Robotic Operation System . . . . . . . . . . . . . . . . . . . . . . . . . 41-48
Elena Basan, Oleg Khabarov, Nikita Sushkin, Oleg Makarevich and
Ivan Azarov
Factors affecting Data-Privacy Protection and Promotion of Safe Digital
Usage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .49-58
Rituparna Chakraborty, G S Prakasha and C K Sripavithra
Development of Algorithms for Increasing the Information Secrecy of the
Satellite Communication System Based on the Use of Authentication
Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59-64
Nikita Chistousov, Igor Kalmykov, Aleksandr Olenev and Natalya
Kalmykova
A Online Discoverability of Exposed Industrial Control Systems . . . . . . . . . . . 65-79
Fabrizio d’Amore, Paolo Forte and Antonio Pisano
Adversary Profiling and Activity Emulation in the Process of
Development and Evaluation of Information Security Threat
Countermeasures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80-86
Anna Golushko and Vadim Zhukov
Model of a Secure Virtual Environment for Managing Information
Exchange in Scientific and Educational Organizations . . . . . . . . . . . . . . . . . . . . . 87-94
Sergey Lazarev and Konstantin Rubtsov
AISMA-2021 Table of Contents
On the Impact of Computer Vision Algorithms on Sport Training
Automation: Proof of Concept for Shadow Boxing Virtual Instructor . . . . . . 95-107
Ilya Makarov and Stanislav Petrov
Synthesis of Models for Ensuring Information Security of Subjects of
Critical Information Infrastructure Under Destructive Influences . . . . . . . . . . 108-117
Elena Maksimova, Maria Lapina and Vitalii Lapin
Results of Live Response Inquiry vs. Memory Image Analysis . . . . . . . . . . . . . 118-126
Maksim Ogur, Alexey Dmitrienko and Mikhail Kotlov
Management System Based on PSIM and SIEM Systems . . . . . . . . . . . . . . . . . . 127-136
Dmitrii Orel and Tatiana Guseva
Mathematical Support for the Assessment and Regulation of the
Successful Implementation of Virus Attacks on Information Networks . . . . . 137-142
Alexander Ostapenko, Evgeniya Shvartskopf, Vladimir Pitolin, Oleg
Makarov, Nikolay Tikhomirov and Yuri Pasternak
Universal Quantum Gate as a Tool for Modeling Quantum Cryptanalysis
Algorithms on a Quantum Circuit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143-150
Aleksei Petrenko, Sergei Petrenko and Viktoriya Taran
Expert System for Modeling Threats and Protecting Premises from
Information Leaks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151-156
Marina Rudenko, Evgenia Zhevago and Andrei Rudenko
Reward Shaping for Deep Reinforcement Learning in VizDoom . . . . . . . . . . . . 157-169
Vitalii Sopov and Ilya Makarov
Intelligent Sensor of Information and Technical Impact (ITI) on the
Network Subsystem of a Man-Made Facility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170-175
Yuri Sosnovskij, Victor Milyukov and Veronika Ilyina
Phishing Attacks Digital Trace Analysis for Security Awareness . . . . . . . . . . . 176-181
Vyacheslav Zolotarev, Elena Zolotareva and Vladimir Mawla