Conceptual foundations for the detection and identification of information technology objects

Authors

DOI:

https://doi.org/10.17308/sait/1995-5499/2023/3/64-74

Keywords:

identification, information technology object, information technology footprint, infosphere, cyberspace, model, detection

Abstract

The relevance of the study is due to the provision of the required level of information technology facilities in difficult conditions of the radioelectronic environment, as well as ensuring their successful identification. Known methods of detection and identification do not consider them as n-dimensional objects functioning in various interconnected spaces. The purpose of the work is to determine the directions for ensuring the required level of information technology objects’ detection and their subsequent identification, taking into account the peculiarities of their functioning in cyberspace. The problem is solved by the use of cybernetic intelligence tools in cooperation with electronic intelligence tools. The article discusses the prospects for the detection and identification of information technology objects, taking into account the formation of the 6th technological order within the framework of creating a system of all-encompassing sensors, the formation of mixed (hybrid) realities and the merging of real and virtual worlds (the implementation of the concepts of cyber meta-universes); describes the existing and promising methods of detection (optical; acoustic; infrared detection; radar and hydroacoustic); classification of identification methods (according to the method of constructing a mathematical model, according to the method of studying the object, according to the methods of operationality of obtaining a model, according to the type of mathematical model); classification of types of models used in identification systems; stages of formation of a model operator are presented: collection of informative values information about the object obtained from the studied environment; definition of a class of models; formation of a set of models; setting an evaluation criterion; selection of the most suitable model from a set of models; comparison of the most suitable model; the main sequence of actions for the identification procedure is determined. The materials of the article are of practical value for solving the problem of countering information technology objects in the organization of transport security, cybersecurity and protection of objects (reducing intelligence availability, increasing intelligence security and ensuring survivability) by expanding the theory of spatial search, taking into account the development of concepts of cyber meta-universes.

Author Biographies

  • Vladimir V. Mukhortov, Krasnodar Higher Military School

    Candidate of Technical Sciences, doctoral student, Krasnodar Higher Military School

  • Alexander P. Makhnev, Krasnodar Higher Military School

    an adjunct of the 1st year of study, Krasnodar Higher Military School

  • Evgeny S. Bitaev, Military Academy of Military Air Defense of the Armed Forces of the Russian Federation

    Candidate of Technical Sciences, doctoral student, Military Academy of Military Air Defense of the Armed Forces of the Russian Federation

References

Published

2023-10-26

Issue

Section

Information Security

How to Cite

Conceptual foundations for the detection and identification of information technology objects. (2023). Proceedings of Voronezh State University. Series: Systems Analysis and Information Technologies, 3, 64-74. https://doi.org/10.17308/sait/1995-5499/2023/3/64-74