Conceptual foundations for the detection and identification of information technology objects

Keywords: identification, information technology object, information technology footprint, infosphere, cyberspace, model, detection

Abstract

The relevance of the study is due to the provision of the required level of information technology facilities in difficult conditions of the radioelectronic environment, as well as ensuring their successful identification. Known methods of detection and identification do not consider them as n-dimensional objects functioning in various interconnected spaces. The purpose of the work is to determine the directions for ensuring the required level of information technology objects’ detection and their subsequent identification, taking into account the peculiarities of their functioning in cyberspace. The problem is solved by the use of cybernetic intelligence tools in cooperation with electronic intelligence tools. The article discusses the prospects for the detection and identification of information technology objects, taking into account the formation of the 6th technological order within the framework of creating a system of all-encompassing sensors, the formation of mixed (hybrid) realities and the merging of real and virtual worlds (the implementation of the concepts of cyber meta-universes); describes the existing and promising methods of detection (optical; acoustic; infrared detection; radar and hydroacoustic); classification of identification methods (according to the method of constructing a mathematical model, according to the method of studying the object, according to the methods of operationality of obtaining a model, according to the type of mathematical model); classification of types of models used in identification systems; stages of formation of a model operator are presented: collection of informative values information about the object obtained from the studied environment; definition of a class of models; formation of a set of models; setting an evaluation criterion; selection of the most suitable model from a set of models; comparison of the most suitable model; the main sequence of actions for the identification procedure is determined. The materials of the article are of practical value for solving the problem of countering information technology objects in the organization of transport security, cybersecurity and protection of objects (reducing intelligence availability, increasing intelligence security and ensuring survivability) by expanding the theory of spatial search, taking into account the development of concepts of cyber meta-universes.

Downloads

Download data is not yet available.

Author Biographies

Vladimir V. Mukhortov, Krasnodar Higher Military School

Candidate of Technical Sciences, doctoral student, Krasnodar Higher Military School

Alexander P. Makhnev, Krasnodar Higher Military School

an adjunct of the 1st year of study, Krasnodar Higher Military School

Evgeny S. Bitaev, Military Academy of Military Air Defense of the Armed Forces of the Russian Federation

Candidate of Technical Sciences, doctoral student, Military Academy of Military Air Defense of the Armed Forces of the Russian Federation

References

1. Artemov M. L., Borisov V. I., Makoviy V. A. and Lichenko M. P. (2021) Automated control systems, radio communications and radio-electronic warfare. Fundamentals of theory and principles of construction. Moscow : Radio Engineering Publishing House. 553 p.
2. Ponkin I. V. (2022) Military analytics. Military application of artificial intelligence and numbers. Moscow : Buki Vedi. 106 p.
3. Mukhortov V. V. and Korolev I. D. (2022) The solution of the problem of detection and identification of n-dimensional information and technical objects by using cybernetic space. Information Bulletin of the Don. № 6 (90). P. 168–190.
4. Mukhortov V. V. and Nefediev Yu.V. (2020) Method of assessing the survivability of information and technical objects in relation to software and hardware impacts. Engineering Bulletin of the Don. № 4 (64). URL
5. Mukhortov V. V. and Korolev I. D. (2022) Modern scientific and methodological approaches to the detection and identification of information and technical objects, prospects for their detection and identification in the infosphere. Information systems and technologies. № 2 (130). P. 100–106.
6. Raibman N. S. (1970) What is identification? Moscow : Nauka. 118 p.
7. Mukhortov V. V. and Korolev I. D. (2022) Prospects for the development of cyber intelligence. Engineering Bulletin of the Don. 6 (90). P. 147–158.
8. Tsypkin Ya. Z. (1984) Fundamentals of the information theory of identification. Moscow : Nauka. 320 p.
9. Deich A. M. (1979) Methods of identification of dynamic objects. Moscow : “Energy”. 240 p.
10. Diligenskaya A. N. (2009) Identification of management objects. Textbook. Samara. 136 p.
11. Petukhov O. A., Morozov A. V. and Petukhova E. O. (2008) Modeling: system, simulation, analytical. St. Petersburg : “North-Western State Correspondence Technical University”. 288 p.
12. Konovalov V. I. (2010) Identification and diagnostics of systems. Tomsk : Tomsk Polytechnic University. 163 p. 13. Maksimova N. N. (2019) Mathematical modeling. Blagoveshchensk : “Amur State University”. 88 p.
Published
2023-10-26
How to Cite
Mukhortov, V. V., Makhnev, A. P., & Bitaev, E. S. (2023). Conceptual foundations for the detection and identification of information technology objects. Proceedings of Voronezh State University. Series: Systems Analysis and Information Technologies, (3), 64-74. https://doi.org/10.17308/sait/1995-5499/2023/3/64-74
Section
Information Security