<!DOCTYPE article
PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20190208//EN"
       "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.4" xml:lang="en">
 <front>
  <journal-meta>
   <journal-id journal-id-type="publisher-id">Scientific and analytical journal «Vestnik Saint-Petersburg university of State fire service of EMERCOM of Russia»</journal-id>
   <journal-title-group>
    <journal-title xml:lang="en">Scientific and analytical journal «Vestnik Saint-Petersburg university of State fire service of EMERCOM of Russia»</journal-title>
    <trans-title-group xml:lang="ru">
     <trans-title>Научно-аналитический журнал &quot;Вестник Санкт-Петербургского университета ГПС МЧС России&quot;</trans-title>
    </trans-title-group>
   </journal-title-group>
   <issn publication-format="online">2218-130X</issn>
  </journal-meta>
  <article-meta>
   <article-id pub-id-type="publisher-id">68342</article-id>
   <article-categories>
    <subj-group subj-group-type="toc-heading" xml:lang="ru">
     <subject>МАТЕМАТИЧЕСКОЕ МОДЕЛИРОВАНИЕ, КОМПЬЮТЕРНЫЕ ТЕХНОЛОГИИ В ТЕОРИИ УПРАВЛЕНИЯ СЛОЖНЫМИ ПРОЦЕССАМИ</subject>
    </subj-group>
    <subj-group subj-group-type="toc-heading" xml:lang="en">
     <subject>MATHEMATIC MODELING, COMPUTER TECHNOLOGIES IN THE THEORY OF COMPLEX PROCESSES MANAGEMENT</subject>
    </subj-group>
    <subj-group>
     <subject>МАТЕМАТИЧЕСКОЕ МОДЕЛИРОВАНИЕ, КОМПЬЮТЕРНЫЕ ТЕХНОЛОГИИ В ТЕОРИИ УПРАВЛЕНИЯ СЛОЖНЫМИ ПРОЦЕССАМИ</subject>
    </subj-group>
   </article-categories>
   <title-group>
    <article-title xml:lang="en">ADVANCED METHODS OF ANALYSIS OF INFORMATION FLOWS IN THE SPHERE OF SECURITY OF THE AUTOMATED SYSTEMS OF EMERCOM OF RUSSIA (INFORMATION-ANALYTICAL REVIEW - PART 1)</article-title>
    <trans-title-group xml:lang="ru">
     <trans-title>ПЕРСПЕКТИВНЫЕ МЕТОДЫ АНАЛИЗА ИНФОРМАЦИОННЫХ ПОТОКОВ В СФЕРЕ БЕЗОПАСНОСТИ АВТОМАТИЗИРОВАННЫХ СИСТЕМ МЧС РОССИИ (ИНФОРМАЦИОННО-АНАЛИТИЧЕСКИЙ ОБЗОР - ЧАСТЬ 1)</trans-title>
    </trans-title-group>
   </title-group>
   <contrib-group content-type="authors">
    <contrib contrib-type="author">
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Артамонов</surname>
       <given-names>А С</given-names>
      </name>
      <name xml:lang="en">
       <surname>Artamonov</surname>
       <given-names>A S</given-names>
      </name>
     </name-alternatives>
     <xref ref-type="aff" rid="aff-1"/>
    </contrib>
    <contrib contrib-type="author">
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Иванов</surname>
       <given-names>А Ю</given-names>
      </name>
      <name xml:lang="en">
       <surname>Ivanov</surname>
       <given-names>A Yu</given-names>
      </name>
     </name-alternatives>
     <xref ref-type="aff" rid="aff-2"/>
    </contrib>
   </contrib-group>
   <aff-alternatives id="aff-1">
    <aff>
     <institution xml:lang="ru">Санкт-Петербургский университет ГПС МЧС России</institution>
     <country>ru</country>
    </aff>
    <aff>
     <institution xml:lang="en">Bioclimate Company Ltd, Novosibirsk</institution>
     <country>ru</country>
    </aff>
   </aff-alternatives>
   <aff-alternatives id="aff-2">
    <aff>
     <institution xml:lang="ru">Санкт-Петербургский университет ГПС МЧС России</institution>
     <country>ru</country>
    </aff>
    <aff>
     <institution xml:lang="en">Saint-Petersburg university of State fire service of EMERCOM of Russia</institution>
     <country>ru</country>
    </aff>
   </aff-alternatives>
   <pub-date publication-format="print" date-type="pub" iso-8601-date="2016-12-25T14:01:20+03:00">
    <day>25</day>
    <month>12</month>
    <year>2016</year>
   </pub-date>
   <pub-date publication-format="electronic" date-type="pub" iso-8601-date="2016-12-25T14:01:20+03:00">
    <day>25</day>
    <month>12</month>
    <year>2016</year>
   </pub-date>
   <volume>2016</volume>
   <issue>4</issue>
   <fpage>85</fpage>
   <lpage>94</lpage>
   <history>
    <date date-type="received" iso-8601-date="2016-12-12T14:01:20+03:00">
     <day>12</day>
     <month>12</month>
     <year>2016</year>
    </date>
    <date date-type="accepted" iso-8601-date="2016-12-20T14:01:20+03:00">
     <day>20</day>
     <month>12</month>
     <year>2016</year>
    </date>
   </history>
   <self-uri xlink:href="https://journals.igps.ru/en/nauka/article/68342/view">https://journals.igps.ru/en/nauka/article/68342/view</self-uri>
   <abstract xml:lang="ru">
    <p>Обоснована целесообразность использования новых подходов к обеспечению информационной безопасности автоматизированных систем МЧС России. Исследованы возможности применения перспективных методов обработки данных о деструктивных информационных воздействиях на указанные системы и противодействии им.</p>
   </abstract>
   <trans-abstract xml:lang="en">
    <p>In the article the expedience of the use of new approaches to information security of the automated systems of EMERCOM of Russia. Researched the possibilities of application of the promising methods for processing data about destructive information influences on these systems and counteract them.</p>
   </trans-abstract>
   <kwd-group xml:lang="ru">
    <kwd>системный подход</kwd>
    <kwd>аналитика больших данных</kwd>
    <kwd>поведенческий анализ</kwd>
    <kwd>экспертный анализ сетевой активности</kwd>
    <kwd>когнитивная аналитика</kwd>
   </kwd-group>
   <kwd-group xml:lang="en">
    <kwd>systemic approach</kwd>
    <kwd>big data analytics</kwd>
    <kwd>behavioral analysis</kwd>
    <kwd>expert analysis of the network activity</kwd>
    <kwd>cognitive intelligence</kwd>
   </kwd-group>
  </article-meta>
 </front>
 <body>
  <p></p>
 </body>
 <back>
  <ref-list>
   <ref id="B1">
    <label>1.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Фабиано Валлеси. Цифровая атака. URL: http://pbwm.ru/articles/ tsifrovaya-ataka (дата обращения: 23.11.2015).</mixed-citation>
     <mixed-citation xml:lang="en">Fabiano Vallesi. Cifrovaya ataka. URL: http://pbwm.ru/articles/ tsifrovaya-ataka (data obrascheniya: 23.11.2015).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B2">
    <label>2.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Jon Oltsik, Analytics-based approach to cyber security. May, 2015. URL: https://www. splunk.com/content/dam/splunk2/pdfs/white-papers/esg-solution-showcase-splunk-may-2015.pdf. (дата обращения: 23.11.2015).</mixed-citation>
     <mixed-citation xml:lang="en">Jon Oltsik, Analytics-based approach to cyber security. May, 2015. URL: https://www. splunk.com/content/dam/splunk2/pdfs/white-papers/esg-solution-showcase-splunk-may-2015.pdf. (data obrascheniya: 23.11.2015).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B3">
    <label>3.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Reuters: Российские хакеры похитили личные данные 272 млн. пользователей. URL: https://aftershock.news/?q=node/395028. (дата обращения: 04.05.2016).</mixed-citation>
     <mixed-citation xml:lang="en">Reuters: Rossiyskie hakery pohitili lichnye dannye 272 mln. pol'zovateley. URL: https://aftershock.news/?q=node/395028. (data obrascheniya: 04.05.2016).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B4">
    <label>4.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Research: Thwarting sophisticated cyberattacks demand better grasp of big data with more proactive analytics. SAS Global Forum, Dallas, Apr. 27. 2015.</mixed-citation>
     <mixed-citation xml:lang="en">Research: Thwarting sophisticated cyberattacks demand better grasp of big data with more proactive analytics. SAS Global Forum, Dallas, Apr. 27. 2015.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B5">
    <label>5.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Сбербанк оценил потери экономики от кибератак в 600 миллиардов рублей. URL: https://lenta.ru/news/2016/06/10/cyberattack/.(дата обращения: 10.06.2016).</mixed-citation>
     <mixed-citation xml:lang="en">Sberbank ocenil poteri ekonomiki ot kiberatak v 600 milliardov rubley. URL: https://lenta.ru/news/2016/06/10/cyberattack/.(data obrascheniya: 10.06.2016).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B6">
    <label>6.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">McAfee. An Intel Company. Экономические последствия киберпреступности и кибершпионажа. Центр стратегических и международных исследований (CSIS): отчет. 2013.</mixed-citation>
     <mixed-citation xml:lang="en">McAfee. An Intel Company. Ekonomicheskie posledstviya kiberprestupnosti i kibershpionazha. Centr strategicheskih i mezhdunarodnyh issledovaniy (CSIS): otchet. 2013.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B7">
    <label>7.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Big Data and Predictive analytic: on the cyber security front line. IDC white paper, February, 2015, IDC #254290.</mixed-citation>
     <mixed-citation xml:lang="en">Big Data and Predictive analytic: on the cyber security front line. IDC white paper, February, 2015, IDC #254290.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B8">
    <label>8.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">The Global Risks Report 2016 11th Edition. - World Economic Forum. URL: http://www3.weforum.org/docs/Media/TheGlobalRisksReport2016.pdf. (дата обращения: 10.06.2016).</mixed-citation>
     <mixed-citation xml:lang="en">The Global Risks Report 2016 11th Edition. - World Economic Forum. URL: http://www3.weforum.org/docs/Media/TheGlobalRisksReport2016.pdf. (data obrascheniya: 10.06.2016).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B9">
    <label>9.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Доктрина информационной безопасности Российской Федерации: проект. Совет Безопасности Рос. Федерации. URL: http://www.scrf.gov.ru/ documents/6/135.html. (дата обращения: 10.06.2016).</mixed-citation>
     <mixed-citation xml:lang="en">Doktrina informacionnoy bezopasnosti Rossiyskoy Federacii: proekt. Sovet Bezopasnosti Ros. Federacii. URL: http://www.scrf.gov.ru/ documents/6/135.html. (data obrascheniya: 10.06.2016).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B10">
    <label>10.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Кибервойна только набирает обороты - НАТО вступает в игру. InfoResist. URL: https://inforesist.org/kibervoyna-tolko-nabiraet-oborotyi-nato-vstupaet-v-igru/ (дата обращения: 09.07.2016).</mixed-citation>
     <mixed-citation xml:lang="en">Kibervoyna tol'ko nabiraet oboroty - NATO vstupaet v igru. InfoResist. URL: https://inforesist.org/kibervoyna-tolko-nabiraet-oborotyi-nato-vstupaet-v-igru/ (data obrascheniya: 09.07.2016).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B11">
    <label>11.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">SAS: Trends in combating cyber crime Tips and technology for defending your network. URL: http://www.risktech-forum.com/home/search?keywords=cybercrime. (дата обращения: 09.07.2016).</mixed-citation>
     <mixed-citation xml:lang="en">SAS: Trends in combating cyber crime Tips and technology for defending your network. URL: http://www.risktech-forum.com/home/search?keywords=cybercrime. (data obrascheniya: 09.07.2016).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B12">
    <label>12.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Эшби У.Р. Введение в кибернетику. М.: «Иностранная литература», 1959.</mixed-citation>
     <mixed-citation xml:lang="en">Eshbi U.R. Vvedenie v kibernetiku. M.: «Inostrannaya literatura», 1959.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B13">
    <label>13.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">The business model for information security. URL: https://www.isaca.org/ knowledge-center/bmis/documents/introtobmis.pdf. (дата обращения: 09.07.2016).</mixed-citation>
     <mixed-citation xml:lang="en">The business model for information security. URL: https://www.isaca.org/ knowledge-center/bmis/documents/introtobmis.pdf. (data obrascheniya: 09.07.2016).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B14">
    <label>14.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Cloud Security Alliance (CSA). Big data analytics for security intelligence. URL: https://downloads.cloudsecurityalliance.org/initiatives/bdwg/Big_Data_Analytics_for_Security_Intelligence.pdf. (дата обращения: 09.07.2016).</mixed-citation>
     <mixed-citation xml:lang="en">Cloud Security Alliance (CSA). Big data analytics for security intelligence. URL: https://downloads.cloudsecurityalliance.org/initiatives/bdwg/Big_Data_Analytics_for_Security_Intelligence.pdf. (data obrascheniya: 09.07.2016).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B15">
    <label>15.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">A Case Study In Security Big Data Analysis. 3/9/2012. URL: http://www.darkreading.com/monitoring/a-case-study-in-security-big-data-analys/232602339. (дата обращения: 09.07.2016).</mixed-citation>
     <mixed-citation xml:lang="en">A Case Study In Security Big Data Analysis. 3/9/2012. URL: http://www.darkreading.com/monitoring/a-case-study-in-security-big-data-analys/232602339. (data obrascheniya: 09.07.2016).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B16">
    <label>16.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Bill Franks. Taming the Big Data Tidal Wave. Finding opportunities in huge data Streams with advanced analytics. John Wiley &amp; Sons, Inc. 2012. 304 p.</mixed-citation>
     <mixed-citation xml:lang="en">Bill Franks. Taming the Big Data Tidal Wave. Finding opportunities in huge data Streams with advanced analytics. John Wiley &amp; Sons, Inc. 2012. 304 p.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B17">
    <label>17.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Big Data Now, Current Perspectives from O’Reilly Media, 2014 Edition.</mixed-citation>
     <mixed-citation xml:lang="en">Big Data Now, Current Perspectives from O’Reilly Media, 2014 Edition.</mixed-citation>
    </citation-alternatives>
   </ref>
  </ref-list>
 </back>
</article>
