<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Leakage of Information Through Technical Channels and a Set of Risk-Oriented Indicators of Its Security for Modern ITS</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Serhii Ivanchenko</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksii Gavrylenko</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Anatolii Holishevskyi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Vasyl Bondarenko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleh Rushchak</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yevhen Prokopenko</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>State Scientific and Research Institute of Cybersecurity Technologies and Information Protection</institution>
          ,
          <addr-line>Kyiv, 03142</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>State Service of Special Communication and Information Protection of Ukraine</institution>
          ,
          <addr-line>Kyiv, 03110</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>The Department of Information Technology Security, National Aviation University</institution>
          ,
          <addr-line>Kyiv, 03058</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The set of risk-oriented indicators that will characterize the protection of modern information and telecommunication systems from information leakage through technical channels has been substantiated. The set is a hierarchical structure and allows information security risk analysis.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Informational security</kwd>
        <kwd>security risk</kwd>
        <kwd>technical protection of information</kwd>
        <kwd>information leakage</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>1
1. Introduction</p>
      <p>One of the threats to information security,
which violates the confidentiality of
information, is its leakage through technical
channels formed during the operation of modern
information and telecommunications systems
(ITS) as a result of a number of undesirable
parasitic effects (Figure 1).</p>
      <p>Such effects are the side electromagnetic
radiation of information signals into the
environment, their guidance on extraneous
conductors and lines beyond the control of the
object, the infiltration of signals into the
grounding and power supply circuits, etc. [1 - 4].</p>
      <p>The peculiarity of this threat is that these
effects are a natural manifestation of the physical
environment where information is circulated.
Securing information from leakage is usually
associated with minimizing these manifestations
and localizing the effects, and therefore cannot
be done completely. This is a threat that can only
be protected by finding a compromise between
the attentiveness and value of information
resources and the costs of protecting them. It is
considered that the protection measure should
correspond to the value of the protected
information. Exceeding this measure over the
value of information is impractical.</p>
      <p>State information resources are public
information that requires its circulation in
cyberspace and involves the use of modern ITS,
which are constantly evolving and improving.
Thus, today the pace of development of
information and telecommunications technology
is such that due to its obsolescence, the
feasibility of replacing old tools with new ones
comes quite quickly after they enter the market.
This rather high rate does not allow the
implementation of proper provision, as was done
for the equipment of previous years, for which
this period was decades. With the development
of ITS, the speed of data processing increases,
the amount of memory increases, the range of
signals used expands, and new functionalities
appear that allow the introduction of new
technologies [5].</p>
      <p>Thus, modern ITS are software-controlled
systems, where they are controlled
automatically with minimal user involvement.
They independently choose routes for data
transmission, independently adjust the noise
immunity of channels, making redundant data,
independently repeat processing and
transmission sessions, independently without
notifying the user of the system perform backup
data and so on. All this significantly affects the
complexity of protection of information in ITS
from leakage through technical channels and
requires consideration when justifying the
conditions of safe use of cyberspace for
information circulation and ensuring protection
of information from leakage through technical
channels [6, 7].</p>
      <p>This threat is relevant to public information in
terms of information with limited access, which
includes classified, official and confidential
information. Accordingly, the secret information
with limited access is divided into state, banking,
professional secrets and the secret of the pre-trial
investigation and other secrets provided by law.
A separate category of information for which the
threat of leakage through technical channels may
be relevant is personal data. Its owners also have
the right to ensure confidentiality with any level
of protection. This distinction is made in the
legal field of the state, takes into account the
affiliation of information, their importance and
value, ensures the interests of man, society and
the state [5, 8].</p>
      <p>World experience shows that the main
indicator of safety is the risk, the permissible
limits of which are set by the owner, which in
the event of attacks or incidents may suffer
damage. Obviously, the risk depends on the
indicators of information security, which
require periodic monitoring and analysis, and
the required values for the indicators are from
the specified risks [9].</p>
      <p>Therefore, there is an urgent task to
substantiate the totality of risk-oriented
indicators that will characterize the protection
of ITS from information leakage through
technical channels and will allow the
assessment and analysis of information security
risk at the objects of information activities.
2. A set of risk-oriented indicators of
its security for modern ITS</p>
      <p>
        Let the information security risk be set
according to an international standard for
information security management, for example,
ISO/IEC 2700x or other standards. Security risk
quantifies the potential danger that leads to
losses, and can be represented as the product of
the probability of realization of the threat pr and
Price consequences of it [10]:
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
      </p>
      <p>In essence, risk is a general indicator of
quality that quantitatively characterizes the
degree or level of protection. If you set its
maximum allowable value Rmax.allow, It is
possible to implement a risk-oriented approach
to protect information, including from leakage
through technical channels. The convenience of
implementing this approach in relation to the
previous one, as it was done for the technology
of previous years, is that on the basis of
automated processing it allows to increase the
efficiency of analysis, adjustment and
management of information security.</p>
      <p>
        Obviously, the price of possible losses Price
and risk limits Rmax.allow, should be set by the
owner of information, information resources, as
an entity interested in the necessary degree of
protection and effective management of
information security of own resources [5]. The
maximum allowable probability of risk
pr.max.allow is a technological indicator that should
provide a protection system and can be found
from formula (
        <xref ref-type="bibr" rid="ref1">1</xref>
        ):
(
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
      </p>
      <p>The protection system will be effective if its
indicators reliably provide pr.max.allow and thus
this system is proven to guarantee information
security with a given risk.</p>
      <p>Let the limit of probability of risk pr.max.allow
be set – safety condition of information with
limited access, which must be fulfilled in
technical channels by means of technological
indicators within its calculated limits. These
indicators in their structured combination will
represent a system of risk-oriented indicators
that characterize the protection of ITS from
information leakage through technical channels.</p>
      <p>Security risk is a failure to meet its quality
requirements, and therefore for the leakage of
information through technical channels it can be
considered as a leakage risk. Its maximum
allowable value can be matched by such a
characteristic of the channel as bandwidth – the
maximum amount of information that can be
allowed to flow through the technical channel
of leakage [10].
where Cmax – is the maximum bandwidth of the
technical channel of leakage.</p>
      <p>The bandwidth of the channels is determined
by the interference of the medium of physical
media. Interference in the channel causes the
probability of error p, which limits the ability of
the channel to pass information. For discrete
symmetric binary channels, the bandwidth is
expressed by the formula:
where h (…) – is the entropy function:</p>
      <p>
        From formulas (
        <xref ref-type="bibr" rid="ref4">4</xref>
        ) and (
        <xref ref-type="bibr" rid="ref5">5</xref>
        ) you can find the
maximum allowable value for the probability of
error in the channel, which should provide
camouflage interference:
(
        <xref ref-type="bibr" rid="ref6">6</xref>
        )
      </p>
      <p>Errors in the channel are formed as a result
of incorrect reception of signals at the output of
the channel. They depend not only on the
properties of the environment of physical
media, where there are interference, but also on
the methods of processing information signals
at the reception, their decision schemes,
algorithms and so on.</p>
      <p>
        Thus, the following three situations can be
considered for information interception:
1. The attacker is quite interested in
obtaining information, has unlimited ability
to intercept it and monitors the source of
leakage continuously.
2. The attacker is quite interested in
obtaining information, but to intercept it has a
limited ability to observe the source of
leakage indefinitely.
(
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
(
        <xref ref-type="bibr" rid="ref4">4</xref>
        )
(
        <xref ref-type="bibr" rid="ref5">5</xref>
        )
3. The attacker is not very interested in
obtaining information, interception is carried
out in fragments, sporadically.
      </p>
      <p>Obviously, the second situation takes into
account the real possibilities of interception,
and therefore should be the most common in
relation to other situations. However, here,
when assessing security, it is necessary to have
specific data about the receiver and its
capabilities. Obviously, this is a challenge. It is
also obvious that if the receiver is changed to a
more efficient one, the information may become
less secure and may not leak through the
technical channel of leakage.</p>
      <p>The third situation indicates that the owner
has overestimated the importance (value) of his
information or the information is narrow and
interesting only to a limited group of attackers
and of little interest to everyone else. In this
case, the protection system requires a review,
otherwise its use will be associated with
excessive spending.</p>
      <p>The first situation takes into account the
potential for interception and is somewhat
idealized in terms of reception. This situation
has the least chance of prevalence. However, it
is most in demand for justification of security. It
is the best for interception and the worst in
terms of protection, while covering the second
and third situations, which mainly occur in
practice. Its main disadvantage is that
reasonable protection in the first situation for
the other two acts with a margin and causes
overspending. However, in order to ensure
proper reliability of protection, it is necessary to
sacrifice somewhere.</p>
      <p>Let the first situation underlie the justification
of information security. Interception is carried
out constantly and in the best way. We find a
condition for the environment in which, given
the given security risk, interception will become
impossible. At the same time we will consider
that if in technical channel of leakage
interception is not carried out and the receiver is
absent, the channel all the same will take place
with a certain representation of the receiver as if
this receiver is present (Figure 1).</p>
      <p>Assuming that Gaussian normally distributed
white noise with a spectral density of N0 acts as
an interference in the medium and interception
is carried out using an ideal receiver, the
required maximum allowable signal-to-noise
ratio can be found as
where P – is the power of the difference signal:</p>
      <p>
        It is obvious that finding the signal-to-noise
ratio δ from relations (
        <xref ref-type="bibr" rid="ref12">12</xref>
        ) and (
        <xref ref-type="bibr" rid="ref13">13</xref>
        ) is much
more difficult than from (
        <xref ref-type="bibr" rid="ref7">7</xref>
        ). However, with the
help of modern computer technology and
technology, this is possible in real time.
      </p>
      <p>In case of imbalance of signs the graphic
dependence on Figure 2 in quadrant III. This</p>
      <p>
        In the case of imbalance of information signs,
which can sometimes occur in modern ITS, for
example, the number of logical "1" exceeds the
logical "0" or conversely, the ratio for find the
desired signal-to-noise ratio (
        <xref ref-type="bibr" rid="ref7">7</xref>
        ) will be
somewhat complicated. The error probabilities
will be determined on average by all information
signs xr. For binary systems [4, 9, 10 - 13]:
p = p(x0)p(y1 / x0) + p(x1)p(y0 / x1),
(
        <xref ref-type="bibr" rid="ref11">11</xref>
        )
where p(x0) and p(x1) – probabilities of
information signs x0 and x1, for example, logical
"0" and "1";
      </p>
      <p>p(y1/x0) and p(y0/x1) – conditional
probabilities of transitions in the channel of input
information signs x0 and x1 to the output signs y1
and y0 accordingly:
and
s(t) – difference signal:</p>
      <p>
        s(t) = s1(t) – s0(t),
s0(t) and s1(t) – implementation of logical «0» and «1»,
T – pulse duration,
F-1(…) – inverse function to the Laplace function:
(
        <xref ref-type="bibr" rid="ref7">7</xref>
        )
(
        <xref ref-type="bibr" rid="ref8">8</xref>
        )
(
        <xref ref-type="bibr" rid="ref9">9</xref>
        )
(
        <xref ref-type="bibr" rid="ref10">10</xref>
        )
(
        <xref ref-type="bibr" rid="ref12">12</xref>
        )
(
        <xref ref-type="bibr" rid="ref13">13</xref>
        )
shows that with a fixed signal-to-noise ratio and
with an increase in the predominance of some
probabilities in the distribution of the source over
others, the probability of error and protection of
information from leakage will decrease. In this
case, according to relations (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ) and (
        <xref ref-type="bibr" rid="ref4">4</xref>
        ), the
channel bandwidth and security risk will increase.
      </p>
      <p>Thus, if the owner of the information wants
to secure his information with the maximum
allowable risk Rmax.allow then the required
signalto-noise ratio can be established using a set of
the following indicators:
1. the probability of security risk – pr ;
2. bandwidth of technical channel of
leakage – С ;
3. the probability of error in the technical
channel of leakage – p;
4. signal / noise ratio at the input of the
receiver of the interception means – .</p>
      <p>
        These indicators can be used as mandatory for
the calculation of each ITS in order to ensure the
leakage of information through the technical
channel of leakage. Relationships (
        <xref ref-type="bibr" rid="ref2">2</xref>
        ), (
        <xref ref-type="bibr" rid="ref3">3</xref>
        ), (
        <xref ref-type="bibr" rid="ref6">6</xref>
        )
and (
        <xref ref-type="bibr" rid="ref7">7</xref>
        ) establish a relationship between the
maximum allowable values of these indicators,
which can be used to create an appropriate
calculation methodological apparatus.
      </p>
      <p>The principle of calculation can be
represented by graphs arranged by quanrants, as
shown on Figure 2.</p>
      <p>On the axis of risks R (axis of ordinates of the
first quantum), the value of admissible monetary
losses Rmax.allow. The admissibility of these losses
is established by the subject to whom the
information belongs, who also manages the
security of the object as a whole and its risks.</p>
      <p>With the help of the graph is the maximum
allowable value of the probability of risk
pr max.allow., which is matched by the bandwidth of
the channel Cmax.allow.. Using the graph of the
second quadrant on Cmax.allow. – is the maximum
allowable probability of error in the channel
pmax.allow. and using the graph of the third
quadrant – the required maximum allowable
value of the signal-to-noise ratio δmax.allow.
Execution of the received relation δmax.allow. at the
input of the receiver interception in the technical
channel of leakage, will ensure a given security
risk Rmax.allow..</p>
      <p>These indicators represent a certain
hierarchical structure, where the indicators of
the lower levels ensure the implementation of
the indicators of the upper levels of the
hierarchy.
media and processing their values during the
work of object of information activity allow
automation of their control, analysis and
adjustment, and risk management – information
security management in general.
  p  C  pr  R ,
(14)
and the established restrictions of indicators of
the top levels create conditions for finding of
admissible limits of indicators of the lower
levels of hierarchy.</p>
      <p>Rmax.allow.  pr max.allow.  C max.allow. 
 pmax.allow.   max.allow..
(15)</p>
      <p>A special convenience of using the proposed
set of indicators is that they allow the use to
protect information from leakage of technical
channel of leakage not only the traditional
method of noise, but also other methods, such
as methods of random coding, randomization
and more.</p>
      <p>Indicators of information security with the
use of modern means of receiving physical</p>
    </sec>
    <sec id="sec-2">
      <title>3. Conclusions</title>
      <p>The set of risk-oriented indicators of
information security from leakage through
technical channels for modern ITS is
substantiated. This set represent a certain
hierarchical structure, where the main risk or
probability of risk is a common indicator of
information security for all types of
information. The other three indicators of
technical channel leakage capacity, its
probability of error and signal-to-noise ratio at
the reception are related to the provision of a
given risk on the types of information in their
technological processing, circulation in
technical means and circulation in the physical
environment. Risk is a measure of information
security at the object of information activity at
the general upper level of the hierarchy, at the
lower, physical level – the signal-to-noise ratio.
The indicators of the lower levels ensure the
implementation of the indicators of the upper
levels of the hierarchy, and the maximum
admissibility of the indicators of the upper
levels determines the degree of admissibility of
the indicators of the lower levels of the
hierarchy.</p>
      <p>The set of reasonable risk-oriented security
indicators take into account the imbalance of
signs and allow their automated control,
analysis, adjustment and management of
information security. The obtained
relationships that establish a relationship
between indicators can be implemented by real
means, in real time.</p>
    </sec>
    <sec id="sec-3">
      <title>4. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Lenkov</surname>
            ,
            <given-names>S.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Peregudov</surname>
            ,
            <given-names>D.А.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Horoshko</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>А</surname>
          </string-name>
          .:
          <article-title>Methods and means of information protection</article-title>
          .
          <source>Tom І. Unauthorized receipt of information. Ariy: Kyiv</source>
          (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Buzov</surname>
            <given-names>G.А.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalinin</surname>
            <given-names>S.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kondratev А</surname>
          </string-name>
          .V.
          <article-title>Protection of information from leaks through technical channels</article-title>
          , Goryachaya liniya: Moskva,
          <string-name>
            <surname>Telecom</surname>
          </string-name>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Kuhn</surname>
            <given-names>G.</given-names>
          </string-name>
          <article-title>Compromising emanations: eavesdropping risks of computer displays</article-title>
          .
          <source>This technical report is based on a dissertation</source>
          submitted
          <article-title>June 2002 by the author for the degree of Doctor of Philosophy to</article-title>
          the University of Cambridge, Wolfson College, (
          <year>2002</year>
          ) http://www.cl.cam.ас.uk/techreports.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Ivanchenko</surname>
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Puchkov</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rushak</surname>
            <given-names>O.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Holishevskyi</surname>
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Leakage by technical channels for modern information and telecommunication systems</article-title>
          .
          <source>International scientific-practical conference: "Information technologies and computer modeling"</source>
          ,
          <source>Ivano-Frankivsk</source>
          , pp.
          <fpage>179</fpage>
          -
          <lpage>183</lpage>
          (
          <year>2019</year>
          ) ISBN 978-617-7468-37-9.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <source>[5] Decree Law of Ukraine "On Information"</source>
          (
          <year>1992</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <source>[6] Law of Ukraine "On Basic Principles of Cyber Security of Ukraine"</source>
          (
          <year>2017</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <article-title>[7] Decree of the President of Ukraine №392 / 2020 On the Decision of the National Security and Defense Council of Ukraine of September 14, 2020 "On the National Security Strategy of Ukraine"</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <source>[8] Law of Ukraine "On Personal Data Protection"</source>
          (
          <year>2010</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <article-title>[9] Information technology</article-title>
          .
          <source>Security techniques. Information security management systems. Requirements [ISO/IEC</source>
          <volume>27001</volume>
          :
          <year>2013</year>
          ].
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Ivanchenko</surname>
            ,
            <given-names>S.О.</given-names>
          </string-name>
          :
          <article-title>Justification safety risk information about its security from leaking by technical channels. Scientific and technical digest "Legal, regulatory and metrological support of information security in Ukraine", NTUU "KPI" SRC "Tezis"</article-title>
          : Kyiv, №
          <volume>1</volume>
          (
          <issue>31</issue>
          ), pp.
          <fpage>9</fpage>
          -
          <lpage>13</lpage>
          (
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Fink</surname>
            <given-names>L. М.</given-names>
          </string-name>
          :
          <article-title>The theory of transfer of discrete messages [2-d edition], Sov</article-title>
          . Radio: Moskva, (
          <year>1970</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Bronshtein</surname>
            ,
            <given-names>Y.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Semendiaev</surname>
            ,
            <given-names>K.A.:</given-names>
          </string-name>
          <article-title>Handbook on mathematics for engineers and students of high schools</article-title>
          .
          <source>Nauka: Moskva</source>
          , Ch. ed.
          <source>Phys-Math. Lit</source>
          . (
          <year>1986</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Ivanovsky</surname>
            ,
            <given-names>R.I.</given-names>
          </string-name>
          :
          <article-title>Theory of probability and mathematical statistics</article-title>
          . BHV:
          <string-name>
            <surname>Petersburg</surname>
          </string-name>
          (
          <year>2008</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>