Skip to main content
Log in

Hierarchical approach to analyzing security breaches in information systems

  • Published:
Automatic Control and Computer Sciences Aims and scope Submit manuscript

Abstract

This paper proposes a hierarchical approach to analyzing information security in modern information systems that consists of multilevel collection, analysis, and control of events. We have analyzed the mechanisms and peculiarities of how malware acts at each level of the information system, determined the features of the mechanisms of action of malware, its masking, and possible methods for detecting malware.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Kaspersky Security Bulletin 2015. https://securelist.com/files/2015/12/Kaspersky-Security-Bulletin-2015_ FINAL_EN.pdf.

  2. Kasslin, K. and Lumpur, K., Kernel malware: The attack from within. http://nicolascormier.com/documentation/security/kasslin_kernel_malware_paper.pdf.

  3. A Technical Breakdown of ModPOS. https://breakingmalware.com/malware/a-technical-breakdown-ofmodpos.

  4. Zhang, X., van Doorn, L., Jaeger, T., Perez, R., and Sailer, R., Secure coprocessor-based intrusion detection, Proc. of the Tenth ACM SIGOPS European Workshop, 2002.

    Google Scholar 

  5. Petroni, N. and Fraser, T., Copilot–a coprocessor-based kernel runtime integrity monitor, Proc. of the 13th Conference on USENIX Security Symposium, 2004.

    Google Scholar 

  6. VMware vShield Endpoint. http://www.vmware.com/content/dam/digitalmarketing/vmware/ru/pdf/VMwarevShield-Endpoint-Datasheet.pdf.

  7. Rutkowska, J., Subverting Vista Kernel for Fun and Profit. Presented at Black Hat USA, 2006. http://blackhat.com/presentations/bh-usa-06/BH-US-06-Rutkowska.pdf.

    Google Scholar 

  8. Embleton, S., Sparks, S., and Zou, C., SMM rootkits: A new breed of OS independent malware, Proc. of the 4th International Conference on Security and Privacy in Communication Networks, 2008.

    Google Scholar 

  9. Nohl, K., Kribler, S., and Lell, J., BadUSB–On accessories that turn evil, Presented at Black Hat USA, 2014. https://srlabs.de/wp-content/uploads/2014/07/SRLabs-BadUSB-BlackHat-v1.pdf.

    Google Scholar 

  10. King, S.T., Tucek, J., Cozzie, A., Grier, C., Jiang, W., and Zhou, Y., Designing and implementation malicious hardware, Proc. of the 1st USENIX Workshop on Large-scale Exploits and Emergent Threats, 2008.

    Google Scholar 

  11. Becker, G.T., Regazzoni, F., Paar, C., and Burleson, W.P., International Workshop on Cryptographic Hardware and Embedded Systems, Springer Berlin Heidelberg, 2013, pp. 197–214.

    Google Scholar 

  12. Zammit, D., Intel x86s hide another CPU that can take over your machine. https://boingboing.net/2016/06/15/intel-x86-processors-ship-with.html.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to E. Yu. Pavlenko.

Additional information

Original Russian Text © E.Yu. Pavlenko, A.V. Yarmak, D.A. Moskvin, 2017, published in Problemy Informatsionnoi Bezopasnosti, Komp’yuternye Sistemy.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pavlenko, E.Y., Yarmak, A.V. & Moskvin, D.A. Hierarchical approach to analyzing security breaches in information systems. Aut. Control Comp. Sci. 51, 829–834 (2017). https://doi.org/10.3103/S0146411617080144

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.3103/S0146411617080144

Keywords

Navigation