FUNCTIONAL MODEL OF THE PROCESS OF INFORMATION SECURITY THREATS IMPLEMENTATION USING COVERT STEGANOGRAPHIC CHANNELS BY AN EXTERNAL INTRUDER
The functional description of processes of information security threats implementation by hidden steganographic channels as a way of their realization by an external intruder in the absence of measures to counteract such threats is given. The article considers the mechanisms of information hiding an...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Joint Stock Company "Experimental Scientific and Production Association SPELS
2025-05-01
|
| Series: | Безопасность информационных технологий |
| Subjects: | |
| Online Access: | https://bit.spels.ru/index.php/bit/article/view/1777 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849471410185961472 |
|---|---|
| author | Oleg S. Avsentiev Vladislav V. Butov Kirill A. Tsyganov |
| author_facet | Oleg S. Avsentiev Vladislav V. Butov Kirill A. Tsyganov |
| author_sort | Oleg S. Avsentiev |
| collection | DOAJ |
| description | The functional description of processes of information security threats implementation by hidden steganographic channels as a way of their realization by an external intruder in the absence of measures to counteract such threats is given. The article considers the mechanisms of information hiding and transmitting by using steganography, which allow to bypass conventional information protection measures. The analysis of methods of information security threats implementation by steganographic channels for malware deployment, management and stealing sensitive information is carried out. A descriptive model and functional model of process of implementing threats in the absence of protection measures have been developed. These models can be used to develop analytical models for estimating the time required for the realization of the investigated information security threats, characterizing the dynamics of their implementation in the absence and applying protection measures. An indicator for assessing information security is proposed. It is shown that, while developing analytical models for calculating this indicator, necessary to consider the interrelation of parallel processes of information processing in information systems, threats to its security by hidden steganography channels and counteraction to the implementation of these threats using steganalysis. To develop these models, it is reasonable to use the apparatus of composite Petri-Markov networks. |
| format | Article |
| id | doaj-art-26c18be2c7864ea2ad2a5515b769f06d |
| institution | Kabale University |
| issn | 2074-7128 2074-7136 |
| language | English |
| publishDate | 2025-05-01 |
| publisher | Joint Stock Company "Experimental Scientific and Production Association SPELS |
| record_format | Article |
| series | Безопасность информационных технологий |
| spelling | doaj-art-26c18be2c7864ea2ad2a5515b769f06d2025-08-20T03:24:51ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362025-05-013228310110.26583/bit.2025.2.071458FUNCTIONAL MODEL OF THE PROCESS OF INFORMATION SECURITY THREATS IMPLEMENTATION USING COVERT STEGANOGRAPHIC CHANNELS BY AN EXTERNAL INTRUDEROleg S. Avsentiev0Vladislav V. Butov1Kirill A. Tsyganov2Voronezh Institute of the Ministry of the Interior of RussiaVoronezh Institute of the Ministry of the Interior of RussiaOrel Law Institute of the Ministry of the Interior of the Russian Federation named after V.V. LukyanovThe functional description of processes of information security threats implementation by hidden steganographic channels as a way of their realization by an external intruder in the absence of measures to counteract such threats is given. The article considers the mechanisms of information hiding and transmitting by using steganography, which allow to bypass conventional information protection measures. The analysis of methods of information security threats implementation by steganographic channels for malware deployment, management and stealing sensitive information is carried out. A descriptive model and functional model of process of implementing threats in the absence of protection measures have been developed. These models can be used to develop analytical models for estimating the time required for the realization of the investigated information security threats, characterizing the dynamics of their implementation in the absence and applying protection measures. An indicator for assessing information security is proposed. It is shown that, while developing analytical models for calculating this indicator, necessary to consider the interrelation of parallel processes of information processing in information systems, threats to its security by hidden steganography channels and counteraction to the implementation of these threats using steganalysis. To develop these models, it is reasonable to use the apparatus of composite Petri-Markov networks.https://bit.spels.ru/index.php/bit/article/view/1777steganography, steganalysis, hidden channel, information security threat, external intruder, functional model. |
| spellingShingle | Oleg S. Avsentiev Vladislav V. Butov Kirill A. Tsyganov FUNCTIONAL MODEL OF THE PROCESS OF INFORMATION SECURITY THREATS IMPLEMENTATION USING COVERT STEGANOGRAPHIC CHANNELS BY AN EXTERNAL INTRUDER Безопасность информационных технологий steganography, steganalysis, hidden channel, information security threat, external intruder, functional model. |
| title | FUNCTIONAL MODEL OF THE PROCESS OF INFORMATION SECURITY THREATS IMPLEMENTATION USING COVERT STEGANOGRAPHIC CHANNELS BY AN EXTERNAL INTRUDER |
| title_full | FUNCTIONAL MODEL OF THE PROCESS OF INFORMATION SECURITY THREATS IMPLEMENTATION USING COVERT STEGANOGRAPHIC CHANNELS BY AN EXTERNAL INTRUDER |
| title_fullStr | FUNCTIONAL MODEL OF THE PROCESS OF INFORMATION SECURITY THREATS IMPLEMENTATION USING COVERT STEGANOGRAPHIC CHANNELS BY AN EXTERNAL INTRUDER |
| title_full_unstemmed | FUNCTIONAL MODEL OF THE PROCESS OF INFORMATION SECURITY THREATS IMPLEMENTATION USING COVERT STEGANOGRAPHIC CHANNELS BY AN EXTERNAL INTRUDER |
| title_short | FUNCTIONAL MODEL OF THE PROCESS OF INFORMATION SECURITY THREATS IMPLEMENTATION USING COVERT STEGANOGRAPHIC CHANNELS BY AN EXTERNAL INTRUDER |
| title_sort | functional model of the process of information security threats implementation using covert steganographic channels by an external intruder |
| topic | steganography, steganalysis, hidden channel, information security threat, external intruder, functional model. |
| url | https://bit.spels.ru/index.php/bit/article/view/1777 |
| work_keys_str_mv | AT olegsavsentiev functionalmodeloftheprocessofinformationsecuritythreatsimplementationusingcovertsteganographicchannelsbyanexternalintruder AT vladislavvbutov functionalmodeloftheprocessofinformationsecuritythreatsimplementationusingcovertsteganographicchannelsbyanexternalintruder AT kirillatsyganov functionalmodeloftheprocessofinformationsecuritythreatsimplementationusingcovertsteganographicchannelsbyanexternalintruder |