Model and Method for Identification of Functional Security Profile Anatolii Davydenko1, Oleksandr Korchenko2, Olena Vysotska3, Ihor Ivanchenko4 1,2,4 National Aviation University, Liubomyra Huzara ave. 1, Kyiv, 03058, Ukraine 3 Pukhov Institute for modeling in energy engineering of NAS of Ukraine, General Naumov str. 15, Kyiv, 03164, Ukraine Abstract One of the key tasks during the state examination is the identification of the functional security profile. During the examination, the types of information that is processed and the risks of its loss, modification or disclosure are evaluated. For this, the functional security profile is being built. To solve the problem of identifying the functional security profile, it is necessary to: determine the levels of functional security services, implemented comprehensive information security systems of the object of examination; determination of the completeness and consistency of the profile; identification of the description of the functional security services in the source documents. The paper proposes a model of parameters for identifying the functional security profile in computer systems. A definition is given for the sets of criteria, their elements and levels. All this made it possible in a formal form to form the necessary set of quantities for the implementation of the identification of functional security profile in the computer systems. The development of these works is the development of a method for identifying functional security profile. This will automate the determination of the requirements of the regulatory document regarding the protection functions (security services) and guarantees, which will be done in subsequent articles. Keywords 1 comprehensive information security systems state examinations, functional security profile, information security criteria, computer systems. 1. Introduction implemented FSP examination object; determine completeness and consistency profile; FSS describe the One of the key tasks during the state examination identification in the original documents. To determine is to identify the functional security profile. During the completeness and consistency of rules to consider examination evaluated the types of information [1-8], construction of FSP (see [9]), and automation of this which is processed in the system and the risk of its process contacts with corresponding rules. loss, modification or disclosure. For this purpose, a For the decision of task proposed model functional security profile (FSP) is built which parameters for identifying the FSP in computer contains the lists of functional security service (FSS) system (CS) and FSP identification method. and levels that are needed to ensure an acceptable level of information security. 2. Determining the criteria set Exactly FSP is the key element of public examinations and its analysis on accordance to the normative document is one of major tasks. As it’s known [9], the criteria reflect For the decision of task of FSP authentication, it is methodological framework for determining necessary to carry out: determination of FSS levels, requirements of information security in of computer systems against unauthorized access, III International Scientific And Practical Conference “Information Security And Information Technologies”, September 13–19, 2021, Odesa, Ukraine EMAIL: davidenkoan@gmail.com (A. 1); icaocentre@nau.edu.ua (A. 2); lek_vys@ukr.net (A. 3); igor-p-l@ukr.net (A. 4) ORCID: 0000-0001-6466-1690 (A. 1); 0000-0003-3376-0631 (A. 2); 0000-0002-9543-1385 (A. 3); 0000-0003-3415-9039 (A. 4) ©️ 2021 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings (CEUR-WS.org) the creation of protected CS and protection  w   w  q  w  against unauthorized access, evaluation of МК =  МК q  =   МК q,e  =  q =1   q =1  e =1    information security in the CS and its suitability  w wq wq,e  for the treatment of critical information = МК q,e,y  =  q=1 e=1 y=1  (information that requires defense).  w  q w   Given the above, let’s form the set of all  =   МК q,e,1 ,МК q,e,2 ,...,МК q,e,wq,e  =   q =1  e =1  criteria for information security  w МК =   МК = МК1 , МК 2 ,.., МК w  , w q =1 q   q =1  МК q,1,1 ,МК q,1,2 ,...,МК q,1,wq,1 МК q,2,1 ,МК q,2,2 ,...,МК q,2,wq,2 , (5)   (1)  ..., МК q,wq ,1 ,МК q,wq ,2 ,...,МК q,wq ,wq,wq =  where МК  МК ( q = 1,w ) – q -th element of set q = МК МК  1,1,1  , 1,1,2 МК1,1,w1,1 , МК1,2,1 ,МК1,2,2 ,...,МК1,2,w1,2 ,..., ,..., of criteria МК, and w - its count.  МК МК МК  ,МК МК МК  , 1,w1 ,1 , 1,w1 ,2 ,..., 1,w1 ,w1,w 2,1,1 , 2,1,2 ,..., 2,1,w 2,1 МК МК МК  , , МК МК МК  , 1 , ,..., ... , ,..., 2,2,1 2,2,2 2,2,w 2,2 2,w 2 ,1 2,w 2 ,2 2,w 2 ,w 2,w ..., МК МК 2 3. Determining of element of the МК  ,МК МК МК  , , ,..., , ,...,  w,1,1 w,1,2 w,1,w w,1 w,2,1 w,2,2 w,2,w w,2 criteria set  , МК w,w w ,1 ,МК w,w w ,2 ,...,МК w,w w ,w w,w w ... . Next, on the basis of (1) we define the elements of the МК q -th set of criteria 5. Formation of the method of identification of FSP  w q   e =1   МК q =  МК q,e  = МК q,1 , МК q,2 ,.., МК q,wq ,  Step 1. Formation of the primary set of (2) functional security services. As previously described, the levels of the where МК q,e  МК q ( e = 1,w q ) – e -th element elements of the sets of criteria are determined by МК q - th set of criteria, and wq its count. МКq,e,y where y = 1,w q,e – y -th level of МК -th q,e Thus, (1) with respect to (2) we present in the element of МК q - th set criteria аnd w q,e its following form: maximum level. Thus, we define the primary set  w   w  q  w  (PS) of functional security services (FSS) as the МК =  МК q  =   МК q,e  =  q =1   q =1  e =1  union of elements of sets of criteria defined by the  = МК1,1 , МК1,2 ,..., МК1,w1 ,  (3) expert: k  ПМ p =  ПМ p,f  = ПМ p,1 ,ПМ p,2 ...,ПМ p,k  , (6) МК , МК ,..., МК  ,..., 2,1 2,2 2,w 2  f =1  МК , МК ,..., МК . w,1 w,2 w,w w where k - the number of primary projects [2] identified by the expert. Step 2. Formation of secondary sets of 4. Determination of levels of elements functional security services. of the set criteria Next, we form an FSSSS, which consists elements of a set of criteria МК , that have levels Next, on the basis of (3) we define the level of that characterize the FSS according to [9]. In turn, the FFP function is intended to display from a set each element МК q,e - th element МК q - th set of PS into one or more elements of the set МК by criteria. means of which can form a set of all possible  wq,e  functions from the elements, ПМ f , f = 1,k . We  y =1   МК q,e =  МК q,e,y  = МК q,e,1 , МК q,e,2 ,.., МК q,e,w q,e ,  define the number of SS of the FSS: k  k  (4) ВМ p =  ВМ p,f  =  ФВП(ПМ p,f )  =  f =1   f =1  where МК q,e, y  МК q,e ( y = 1,w q,e ) – y -th level = ВМ p,1 , ВМ p,2 ,..., ВМ p,k  = МК q,e -th element МК q - th set criteria and w q,e = ФВП(ПМ p,1 ), ФВП(ПМ p,2 ),..., ФВП(ПМ p,k ) , its maximum level. (7) Thus, (3) with respect to (4) has the form: where k − respectively, the number of secondary functional security services of the project and As a result, I have developed a system that mapping from the set of PS to one or more elements analyzes the input documents for the presence of a of the МК set of the project. FSP and its identification by the formal Step 3. Formation of a basic FSP. characteristics of the [9]. The Basic Functional Security Profile (FSP), In case of errors, corrects FSP. The system is given the expertise and facility requirements to implemented on the .NET platform in C# ensure the safe flow of information, consists of a programming language using the Microsoft Visual set of primary (PS) and secondary (SS) FSS. Let Studio development environment. us define the FSP: The implementation of a software module for  k  k  identifying a functional security profile is intended БЗp =  ФВП(ПМ p,f )  ,  ВМ p,f  = to assist the expert in identifying the FSP in a  f =1   f =1  Microsoft Word document, and to assist the expert  = ФВП (ПМ p,1 ), ФВП (ПМ p,2 ),.., ФВП (ПМ p,k ) , in the analysis of the FSP. The main purpose of this ВМ , ВМ ,.., ВМ  , p,1 p,2 p,k software module is to assist the expert in the creation of the FSP and to control compliance with the where БЗ p − basic functional profile of protection conditions set out in the regulatory document [9], of the project. namely: determination of integrity control; Step 4. Forming a set of order by element takeovers by the highest FSS of lower ones; indices МК q,e,y checking the correlation of the FSS. Using (6), taking into account [9], we form a The software module is written in C# set of order by indices: programming language in VisualStudio 2005. In БЗІПМЕ = МК1,1,4 , МК1,2,4 , МК1,3,2 , МК 2,1,4 , МК 2,2,4 , the written code technology used MSOffice'sCOMInterop, namely МК 2,3,2 , МК 2,4,3 , МК 3,1,3 , МК 3,2,3 , МК 3,3,3 ,МК 3,4,3 , Microsoft.Office.Interop.Word library and basic МК 4,1,5 , МК 4,2,2 , МК 4,3,2 , МК 4,4,3 , МК 4,5,3 , МК 4,6,2 , libraries of programming language C#. МК 4,8,1 , МК 4,9,1 = КД-4, КА-4, КО-1, КК-2, КВ-4, ЦД-4, ЦА-4, ЦО-2,ЦВ-3, ДР-3, ДС-3, ДЗ-3, ДВ-3, НР-5, НИ-2, НК-2, НО-3, НЦ-3,НТ-2, НА-1, НП-1, НВ-2, НА-1, НП-1} Step 5. Minimizing the basic FSP Using (7) taking into account [9] we minimize the basic FPP by the highest y-th index:  w  w q  w q,e   БЗmin p =   VМК q,e,y  =  q =1  e =1  y =1    wq     w =   МК q,e,1 ,МК q,e,2 ,...,  МК q,e,wq,e  =  q =1  e =1   w =  q =1  МК q,1,1  ,МК q,1,2  ,...,  МК q,1,wq,1  Figure 1: Program interface МК q,2,1  ,МК q,2,2  ,...,  МК q,2,wq,2 ,...,  The interface of the program module (Fig. 1) is a  МК  МК  МК  = q,w q ,1 , q,w q ,2 ,...,  q,w q ,w q,w window application, which is implemented in the form of a GUI program, in which there are the = МК  МК  МК q , 1,1,1 , 1,1,2 ,...,  1,1,w1,1 following controls: a window box type "Listbox" МК  МК  МК  , , , ,...,  ... (8) search for a functional security profile; buttons: "Find", "Stop", "Clear"; the right part of the screen  МК  МК  МК  , 1,2,1 1,2,2 1,2,w1,2 1,w1 ,1 , 1,w1 ,2 ,...,  1,w1 ,w1,w has a window of type "ListView", which displays МК  МК  МК  , 1 2,1,1 , 2,1,2 ,...,  2,1,w 2,1 the paragraph number where the FPP was found and МК  МК  МК  , , ,...,  ..., the security profile found; three buttons to search for compliance of the FPP with the terms of the  МК  МК  МК  ,..., 2,2,1 2,2,2 2,2,w 2,2 2,w 2 ,1 , 2,w 2 ,2 , ...,  2,w 2 ,w 2,w regulatory document [9]; two textboxes of type МК  МК  МК  , 2 w,1,1 , w,1,2 ,...,  w,1,w w,1 "TextBox" in one of which the total number of МК  МК  МК  , , , ,...,  ... paragraphs of the document is displayed, and in the  , w,2,1 w,2,2 w,2,w w,2 other field the current paragraph when processing  МК w,w w ,1  ,МК w,w w ,2  ,...,  МК w,w w ,w w,w w the document; a «statusStrip» type window with three positions: "Pending", "Search started", "Search is complete"; two window boxes of the type processing of documents was: Technical task - 17 "СheckedBox" in one of which there is a possibility sec; Explanatory note to the technical project - 43 to deselect or select the search of the FSP, and in the seconds; Act of inspection - 7 sec .; Information other field there is an opportunity to go to the Security Policy - 12 sec. The program was run on specified part of the FSP search text; window menu a workstation with the following specifications: type "menuStrip", which contains two tabs: "File", Intel Core i5-4670 CPU with 3.4 GHz; RAM - 8 "Help". GB. Microsoft Word is a specialized hierarchical, The volume of the document is 8635 words. COM-oriented data warehouse - Structured The average speed of reading in Ukrainian in an Storage. A document can contain different types adult is within 150-200 words per minute [10], of data: structured text, graphics, mathematical according to experimental studies, the average expressions, organizational charts, etc. The speed is 201 words per minute (with scatter of concept of structured repository is an integral part values from 60 to 378) with an average percentage of the modern programming paradigm based on of mastering 52 words per minute. Table 1 the Component Object Model (COM). In fact, summarizes the time required for the expert to structured storage is the technology of combining process the standard inputs of the CISS objects (files) of objects with different nature and examination. It is only 43 minutes to read the properties into one logical unit of storage. COM “Terms of Reference”. Analysis time depends on technology offers the standard implementation of the experience of the expert and can not be less the concept of structured storage in the form of a than reading time. Therefore, the acceleration of compound file (Compound File): a file system processing will be at about fifteen thousand inside the file. The COM repository is a percent. hierarchical structure of collections of objects of two types: Storage and Stream, to which Table 1 directories and files correspond in the traditional Time required to process documents file system. This approach can significantly Document The total Minimum reduce the storage costs in a single file of objects Name number of Read Time of different nature. words (min) The implementation of the program includes methods of regular expressions: comparison of Terms of 8635 43 strings; suffix tree; approximating patterns; Reference patterns with which multiple choices can be made, Explanatory 22641 113 partial patterns. It is shown that technologies that note to combine the properties of approximating patterns technical and patterns by which multiple choice can be made, project solve the problems of FSP analysis and can be used Inspection Act 2235 11 to build a system. Information 5206 26 Testing of the program module was carried out Security Policy in the process of the state examination of the CISS Grid site. The work of the software module Let’s consider software features. Software resulted in the fulfillment of the tasks for the Components: search of the FSP and analysis of the FSP for 1. Knowledge base; compliance with the three conditions. 2. User interface; Performance analysis using the software module 3. Software module "Meaning constants"; showed a multiple increase in the speed of 4. Software module "FSP Identification"; document processing in the absence of errors, 5. Software module “Determination of FSP"; namely - the software module eliminated the Meaning Constants module. The module repetition of the FSS, performed a check of should ensure that semantic constants are integrity and completeness. The analysis of extracted from the input documents by forming a execution with the help of the program showed set of defined constants in the knowledge base and many increase of speed of processing of the inserting these constants into the output document document at 100% absence of errors, namely, the templates by a defined algorithm. program excluded inclusion in the FPP of the The Subsystem of Meaning Constants module same type of services, performed the check of performs the following functions: integrity and completeness. Approximate time of • selection of semantic constants from input of moving toward its goal. The transformation in documents; the control system can be either one-to-one and • formation of knowledge base of semantic then it is called isomorphic, or only unambiguous, constants; in one direction. In this case, the transformation is • Completing source document templates. called homomorphic. The “black” box is a Module « FSP Determination» ensures that the complex homomorphic model of a cybernetic FSP complies with the three criteria of RD STPI system in which diversity is respected. It is only 2.5.004-99 [9]. The subsystem "Determination of then a satisfactory system model when it contains FSP" ensures the following functions: such an amount of information that reflects the The FSP is obliged to include the control of the diversity of the system. It can be assumed that the integrity of the STPI: greater the number of perturbations acting on the • the connection of the FSP to each other inputs of the system model, the greater the variety according to the RD STPI 2.5.004-99; the regulator should have. Currently, two types of • if the service has any too FSS or more, then "black" boxes are known. The first type includes FSP can include only one functional security any “black” box, which can be considered as an service. automaton, called finite or infinite. The behavior FSP Identification Module of such "black" boxes is known. The second type The module should ensure the formal includes such "black" boxes, whose behavior can compliance of the PSP with the format of the FSS be observed only in the experiment. In this case, a description, as well as give the expert, in an hypothesis is expressed explicitly or implicitly interactive mode, the possibility to analyze the FSP about the predictability of the behavior of the in accordance with the normative document of the black box in a probabilistic sense. Without a RD STPI 2.5.004-99. preliminary hypothesis, any generalization is The subsystem "Determination of FSP" must impossible, or, as they say, it is impossible to draw ensure the following functions: an inductive conclusion based on experiments • check the description of the FSP; with the black box. To designate the model of the • provide the expert with the opportunity to “black” box, N. Wiener proposed the concept of a receive extended information about the service in “white” box. The “white” box consists of known an interactive mode at events of type mouse focus. components, that is, known X, Y, δ, λ. Its contents According to testing methods, one can are specially selected to implement the same classify, for example, as black box testing or dependence of the output on the input as the behavioral testing - a strategy (method) for testing corresponding "black" box. In the process of the functional behavior of an object (program, research and generalizations, hypotheses and system) from the point of view of the outside establishing patterns, it becomes necessary to world, in which knowledge about the internal adjust the organization of the “white” box and structure of the tested object is not used. Strategy change models. In this regard, when modeling, the refers to systematic methods for selecting and researcher must necessarily repeatedly refer to the creating tests for a test suite. The behavioral test scheme of relations “black” - “white” box. strategy is based on technical requirements and Creating a mathematical description of a black their specifications [2,11,12]. The "black box" box is a kind of art. In some cases, it is possible to refers to the object of study, the internal structure form an algorithm in accordance with which the of which is unknown. The concept of a “black “black” box responds to an arbitrary input signal. box” was proposed by Ashby, William Ross. In The main methods of testing a black box are: − cybernetics, it allows you to study the behavior of equivalent partition; − analysis of boundary systems, that is, their reactions to a variety of values; − analysis of cause and effect external influences and at the same time abstract relationships; − assumption of error. A tester with from their internal structure. Manipulating only extensive experience seeks out errors without any with inputs and outputs, it is possible to conduct methods, but at the same time, he unconsciously certain studies. In practice, the question always uses the method of assuming an error. This arises of how the black box homomorphism method is largely based on intuition. The main reflects the adequacy of its studied model, that is, idea of the method is to make a list that lists how fully the basic properties of the original are possible errors and situations in which these errors reflected in the model. The description of any could occur. Then, based on the list, tests are control system in time is characterized by a compiled.It’s possible that it’s more correct to talk picture of the sequence of its states in the process about different degrees of transparency, and [1] About information: Law of Ukraine of maybe even generally about different colors of the October 2, 1992 No. 2657-XII, ed. Law No. box, rather than testing using the black method 2938 – VI of 13.01.2011. OVR, № 32, Art. and the white box method. The only important 313 (2011.) (in Ukrainian). thing is what information we take into account [2] Zegzhda D.P., Ivashko A.M.: Fundamentals when designing tests. Either we use information of security of information systems. Textbook about the internal structure of the program, or we manual for universities, p.451 (2000). (in do not use it. The following CISS components Russian) were subject to testing: [3] Korchenko O.G, Davydenko A.M, Shaban 1) OS protection and administration tools; M.R.: Model of parameters for identification 2) security features (security services) of middleware; of functional protection profile in computer 3) means of increasing accessibility; systems. Security of Information. vol. 25, 4) organizational measures to protect information, No.2, pp. 122-126 (2019). (in Ukrainian). software and hardware; DOI: https://doi.org/10.18372/2225- 5) documentation on CISS according to the list 5036.25.13844 defined by the requirements of TR. [4] Vysotska O., Davydenko A.: Keystroke The purpose of the CISS tests are: Pattern Authentication of Computer Systems - verification of the implementation and Users as One of the Steps of Multifactor sufficiency of organizational measures of Authentication. In: Hu Z., Petoukhov S., protection given in the documentation; Dychka I., He M. (eds). Advances in - verification of compliance with the Computer Science for Engineering and requirements of section 10 “Criteria of Education II. ICCSEEA 2019. Advances in guarantees” RD STPI 2.5-004-99 for the level of Intelligent Systems and Computing, vol. 938, guarantees of the correct implementation of the pp. 356-368 (2019). DOI: G2 security functions in relation to the CIS https://doi.org/10.1007/978-3-030-16621- architecture, CIS development environment, CIS 2_33 development sequence, CIS functioning [5] Kazmirchuk, S., Ilyenko A., Ilyenko S.: environment, documentation and tests of CIS. Digital signature authentication scheme Verification of compliance with the conditions with message recovery based on the use of for the implementation of information security elliptic curves In: Hu Z., Petoukhov S., services is carried out in accordance with the FSP: Dychka I., He M. (eds). Advances in 3.КЦД = {КА-2, КД-2, КВ-1, ЦА-1 , ЦД-1, Computer Science for Engineering and ЦВ-1, ДС-1, ДЗ-2, ДВ-1, НР-2, НИ-2, НК-1, Education II. ICCSEEA 2019. Advances in НО-1, НЦ-2, НТ-2, НВ-1} Intelligent Systems and Computing, vol. 938, pp. 279–288 (2019). DOI: https://doi.org/10.1007/978-3-030-16621-2_26 6. Conclusion [6] Lakhno V., Kazmirchuk S., Kovalenko Y., Myrutenko L., Zhmurko T.: Design of The paper offers a model of parameters which adaptive system of detection of cyber- due to the theoretical and multiple representation attacks, based on the model of logical of certain sets of criteria for information security, procedures and the coverage matrices of their elements and corresponding levels, allowed features. Eastern-European Journal of to formally form the necessary set of values for Enterprise Technologies, vol. 3, Issue 9 (81), the implementation of the identification of FSP in pp. 30–38 (2016). DOI: the CS. In addition, a method for identifying the https://doi.org/10.15587/1729- FSP was developed which made it possible to 4061.2016.71769 automate the process of determining requirements [7] Oleg Barabash, Oleksandr Laptiev, Valentyn [9] for security features (security services) and Sobchuk, Ivanna Salanda, Yulia Melnychuk, guarantees. As a result, a software module was Valerii Lishchyna. Comprehensive Methods created that eliminates the repetition of the FSS, of Evaluation of Distance Learning System performed integrity and completeness checks. Functioning. International Journal of Computer Network and Information Security 7. References (IJCNIS). Vol. 13, No. 3, Jun. 2021. рр.62- 71, DOI: 10.5815/ijcnis.2021.03.06. [8] Serhii Yevseiev, Oleksandr Laptiev, Sergii Lazarenko, Anna Korchenko, Іryna Manzhul. Modeling the protection of personal data from trust and the amount of information on social networks. Number 1 (2021), «EUREKA: Physics and Engineering» pp.24–31. DOI:10.21303/2461-4262.2021.001615 [9] Korchenko, A., Breslavskyi, V., Yevseiev, S., ...Sievierinov, O., Tkachuk, S. Development of a Method for Constructing Linguistic Standards for Multi-Criteria Assessment of Honeypot Efficiency.Eastern- European Journal of Enterprise Technologiesthis link is disabled, 2021, 1(2(109)), pp. 14–23 [10] Serhii Yevseiev, Roman Korolyov, Andrii Tkachov, Oleksandr Laptiev, Ivan Opirskyy, Olha Soloviova. Modification of the algorithm (OFM) S-box, which provides increasing crypto resistance in the post- quantum period. International Journal of Advanced Trends in Computer Science and Engineering (IJATCSE) Volume 9. No. 5, September-Oktober 2020, pp 8725-8729. DOI: 10.30534/ijatcse/2020/261952020. [11] RD STPI 2.5-004-99 Criteria for evaluation of information security in computer systems against unauthorized access, approved by the Order of the Department of Special Telecommunication Systems and Information Protection of the Security Service of Ukraine dated April 28, 1999, No. 22. (in Ukrainian). [12] Korchenko O.G., Davydenko A.M., Shaban M.R.: A decomposition model for the representation of semantic constants and variables for the implementation of expertise in the field of STPI. Information Security, vol. 21, No.2, pp. 88-96 (2019). (in Ukrainian). DOI: https://doi.org/ 10.18372/2410-7840.21.13766