FUNCTIONAL MODEL OF THE PROCESS OF INFORMATION SECURITY THREATS IMPLEMENTATION USING COVERT STEGANOGRAPHIC CHANNELS BY AN EXTERNAL INTRUDER

The functional description of processes of information security threats implementation by hidden steganographic channels as a way of their realization by an external intruder in the absence of measures to counteract such threats is given. The article considers the mechanisms of information hiding an...

Full description

Saved in:
Bibliographic Details
Main Authors: Oleg S. Avsentiev, Vladislav V. Butov, Kirill A. Tsyganov
Format: Article
Language:English
Published: Joint Stock Company "Experimental Scientific and Production Association SPELS 2025-05-01
Series:Безопасность информационных технологий
Subjects:
Online Access:https://bit.spels.ru/index.php/bit/article/view/1777
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849471410185961472
author Oleg S. Avsentiev
Vladislav V. Butov
Kirill A. Tsyganov
author_facet Oleg S. Avsentiev
Vladislav V. Butov
Kirill A. Tsyganov
author_sort Oleg S. Avsentiev
collection DOAJ
description The functional description of processes of information security threats implementation by hidden steganographic channels as a way of their realization by an external intruder in the absence of measures to counteract such threats is given. The article considers the mechanisms of information hiding and transmitting by using steganography, which allow to bypass conventional information protection measures. The analysis of methods of information security threats implementation by steganographic channels for malware deployment, management and stealing sensitive information is carried out. A descriptive model and functional model of process of implementing threats in the absence of protection measures have been developed. These models can be used to develop analytical models for estimating the time required for the realization of the investigated information security threats, characterizing the dynamics of their implementation in the absence and applying protection measures. An indicator for assessing information security is proposed. It is shown that, while developing analytical models for calculating this indicator, necessary to consider the interrelation of parallel processes of information processing in information systems, threats to its security by hidden steganography channels and counteraction to the implementation of these threats using steganalysis. To develop these models, it is reasonable to use the apparatus of composite Petri-Markov networks.
format Article
id doaj-art-26c18be2c7864ea2ad2a5515b769f06d
institution Kabale University
issn 2074-7128
2074-7136
language English
publishDate 2025-05-01
publisher Joint Stock Company "Experimental Scientific and Production Association SPELS
record_format Article
series Безопасность информационных технологий
spelling doaj-art-26c18be2c7864ea2ad2a5515b769f06d2025-08-20T03:24:51ZengJoint Stock Company "Experimental Scientific and Production Association SPELSБезопасность информационных технологий2074-71282074-71362025-05-013228310110.26583/bit.2025.2.071458FUNCTIONAL MODEL OF THE PROCESS OF INFORMATION SECURITY THREATS IMPLEMENTATION USING COVERT STEGANOGRAPHIC CHANNELS BY AN EXTERNAL INTRUDEROleg S. Avsentiev0Vladislav V. Butov1Kirill A. Tsyganov2Voronezh Institute of the Ministry of the Interior of RussiaVoronezh Institute of the Ministry of the Interior of RussiaOrel Law Institute of the Ministry of the Interior of the Russian Federation named after V.V. LukyanovThe functional description of processes of information security threats implementation by hidden steganographic channels as a way of their realization by an external intruder in the absence of measures to counteract such threats is given. The article considers the mechanisms of information hiding and transmitting by using steganography, which allow to bypass conventional information protection measures. The analysis of methods of information security threats implementation by steganographic channels for malware deployment, management and stealing sensitive information is carried out. A descriptive model and functional model of process of implementing threats in the absence of protection measures have been developed. These models can be used to develop analytical models for estimating the time required for the realization of the investigated information security threats, characterizing the dynamics of their implementation in the absence and applying protection measures. An indicator for assessing information security is proposed. It is shown that, while developing analytical models for calculating this indicator, necessary to consider the interrelation of parallel processes of information processing in information systems, threats to its security by hidden steganography channels and counteraction to the implementation of these threats using steganalysis. To develop these models, it is reasonable to use the apparatus of composite Petri-Markov networks.https://bit.spels.ru/index.php/bit/article/view/1777steganography, steganalysis, hidden channel, information security threat, external intruder, functional model.
spellingShingle Oleg S. Avsentiev
Vladislav V. Butov
Kirill A. Tsyganov
FUNCTIONAL MODEL OF THE PROCESS OF INFORMATION SECURITY THREATS IMPLEMENTATION USING COVERT STEGANOGRAPHIC CHANNELS BY AN EXTERNAL INTRUDER
Безопасность информационных технологий
steganography, steganalysis, hidden channel, information security threat, external intruder, functional model.
title FUNCTIONAL MODEL OF THE PROCESS OF INFORMATION SECURITY THREATS IMPLEMENTATION USING COVERT STEGANOGRAPHIC CHANNELS BY AN EXTERNAL INTRUDER
title_full FUNCTIONAL MODEL OF THE PROCESS OF INFORMATION SECURITY THREATS IMPLEMENTATION USING COVERT STEGANOGRAPHIC CHANNELS BY AN EXTERNAL INTRUDER
title_fullStr FUNCTIONAL MODEL OF THE PROCESS OF INFORMATION SECURITY THREATS IMPLEMENTATION USING COVERT STEGANOGRAPHIC CHANNELS BY AN EXTERNAL INTRUDER
title_full_unstemmed FUNCTIONAL MODEL OF THE PROCESS OF INFORMATION SECURITY THREATS IMPLEMENTATION USING COVERT STEGANOGRAPHIC CHANNELS BY AN EXTERNAL INTRUDER
title_short FUNCTIONAL MODEL OF THE PROCESS OF INFORMATION SECURITY THREATS IMPLEMENTATION USING COVERT STEGANOGRAPHIC CHANNELS BY AN EXTERNAL INTRUDER
title_sort functional model of the process of information security threats implementation using covert steganographic channels by an external intruder
topic steganography, steganalysis, hidden channel, information security threat, external intruder, functional model.
url https://bit.spels.ru/index.php/bit/article/view/1777
work_keys_str_mv AT olegsavsentiev functionalmodeloftheprocessofinformationsecuritythreatsimplementationusingcovertsteganographicchannelsbyanexternalintruder
AT vladislavvbutov functionalmodeloftheprocessofinformationsecuritythreatsimplementationusingcovertsteganographicchannelsbyanexternalintruder
AT kirillatsyganov functionalmodeloftheprocessofinformationsecuritythreatsimplementationusingcovertsteganographicchannelsbyanexternalintruder