|

Sonified Web Applications Defense Control System Architecture Against the Computer Attacks

Authors: Vishnevskiy A.S. Published: 02.10.2024
Published in issue: #3(148)/2024  
DOI:

 
Category: Informatics, Computer Engineering and Control | Chapter: Methods and Systems of Information Protection, Information Security  
Keywords: information security tools, computer attack detection, sound interfaces, computer typhlotechnologies, voice control

Abstract

The increased need to protect Internet resources and shortage of personnel in the information security industry are making it urgent to create professional tools to identify computer attacks that could be used by persons not familiar with this area. The paper considers the developed auxiliary software for the visually impaired people that allows them to control the process of identifying computer attacks by the ear. It describes architecture of a web application collecting data on the spread of potentially malicious files, network attacks, and infected emails. Accumulated signs of the intruders' actions are voiced in the administrative panel adapted for working by ear using speech synthesis and implemented sonification methods. Navigation through the user interface is carried out using the input and voice control keyboard. The proposed software solution is based on the web technologies making it possible to use it both on the desktop computers and on the mobile devices. The developed technology could be introduced, among other things, to reduce visual load on the information security specialists with healthy vision, as well as in situations, where visual display is unavailable

The work was supported by the grant IB MTUCI 2023 under the Agreement no. 40469 09/23-K on implementation of the scientific project dated July 11, 2023 no. 09/23-K

Please cite this article in English as:

Vishnevskiy A.S. Sonified web applications defense control system architecture against the computer attacks. Herald of the Bauman Moscow State Technical University, Series Instrument Engineering, 2024, no. 3 (148), pp. 136--147 (in Russ.). EDN: ZNJWMF

References

[1] Bratusin A.R., Skoblikov R.V., Kashin O.V. The need for training in the universities of the interior ministry and law enforcement agencies of the Russian Federation experts in the field of information security. Problemy sovremennogo pedagogicheskogo obrazovaniya, 2019, no. 63-4, pp. 27--31 (in Russ.). EDN: SZCBSQ

[2] Nebrenchin S.M. Topical issues of strengthening Russia’s information security in connection with the special military operation in Ukraine. Rossiya: tendentsii i perspektivy razvitiya, 2023, no. 18-1, pp. 211--216 (in Russ.). EDN: PPGIKF

[3] Alifanova L.I., Korableva O.V. To the question about the specific of education of persons with paropsiss. Russian Journal of Education and Psychology, 2016, no. 3-2, pp. 328--338 (in Russ.).

[4] Bobko R.A., Chepinskiy S.A. Multiline Braille display construction model. Nauchno-tekhnicheskiy vestnik informatsionnykh tekhnologiy, mekhaniki i optiki [Scientific and Technical Journal of Information Technologies, Mechanics and Optics], 2020, vol. 20, no. 5, pp. 761--766 (in Russ.). DOI: https://doi.org/10.17586/2226-1494-2020-20-5-761-766

[5] Babikova E.V. Interfaces for communicating with local residents, blind and visually impaired users. Kultura i tekhnologii [Culture and Technology], 2021, vol. 6, no. 4, pp. 215--224 (in Russ.). DOI: https://doi.org/10.17586/2587-800X-2021-6-4-215-224

[6] Gorbunova I.B., Morozov S.A. Music computer technologies in teaching visually impaired students of colleges and higher educational institutions in Russia. Mir nauki, kultury, obrazovaniya [The World of Science, Culture and Education], 2019, no. 5, pp. 308--316 (in Russ.). DOI: https://doi.org/10.24411/1991-5497-2019-00126

[7] Morozov S.A. [Specifics of the organization of software and hardware complex for training students with visual disabilities in music and computer technologies]. Regionalnaya informatika i informatsionnaya bezopasnost. Sb. tr. Sankt-Peterburgskoy Mezhdunar. konf. Vyp. 8 [Regional Informatics and Information Security. Proc. St. Petersburg Int. Conf. Iss. 8]. St. Petersburg, SPOISU Publ., 2020, pp. 401--405 (in Russ.).

[8] Trinadtsatko A.A. Tiflo-information technologies in the life of blind and visually impaired people. Sotsialno-gumanitarnye znaniya, 2023, no. 5, pp. 42--46 (in Russ.). EDN: QTHVVQ

[9] Potluri V., Vaithilingam P., Iyengar S., et al. CodeTalk: improving programming environment accessibility for visually impaired developers. CHI’18, 2018, paper 618. DOI: https://doi.org/10.1145/3173574.3174192

[10] Schanzer E., Bahram S., Krishnamurthi S. Accessible AST-based programming for visually-impaired programmers. SIGCSE’19, 2019, pp. 773--779. DOI: https://doi.org/10.1145/3287324.3287499

[11] Talukder S. Tools and techniques for malware detection and analysis. arXiv:2002.06819. DOI: https://doi.org/10.48550/arXiv.2002.06819

[12] Ilic S.T., Gnjatovic M.J., Popovic B.M., et al. A pilot comparative analysis of the Cuckoo and Drakvuf sandboxes: an end-user perspective. Military Technical Courier, 2022, vol. 70, no. 2, pp. 372--392. DOI: https://doi.org/10.5937/vojtehg70-36196

[13] Lockett A. Assessing the effectiveness of YARA rules for signature-based malware detection and classification. arXiv:2111.13910. DOI: https://doi.org/10.48550/arXiv.2111.13910

[14] Axon L., Happa J., Goldsmith M., et al. Hearing attacks in network data: an effectiveness study. Comput. Secur., 2019, vol. 83, pp. 367--388. DOI: https://doi.org/10.1016/j.cose.2019.03.004

[15] Polaczyk J., Croft K., Cai Y. Compositional sonification of cybersecurity data in a baroque style. In: Advances in artificial intelligence, software and systems engineering. New York, Springer, 2021, pp. 304--312. DOI: https://doi.org/10.1007/978-3-030-80624-8_38

[16] Falk C., Dykstra J. Sonification with music for cybersecurity situational awareness. ICAD, 2019, pp. 50--55.

[17] Su I., Hattwick I., Southworth C., et al. Interactive exploration of a hierarchical spider web structure with sound. J. Multimodal User Interfaces, 2022, vol. 16, no. 1, pp. 71--85. DOI: https://doi.org/10.1007/s12193-021-00375-x

[18] Vishnevskiy A.S., Klyucharev P.G. [The sound user interface of honeypot]. Sb. tr. 10-y Mezhdunar. nauch.-tekh. konf. "Bezopasnye informatsionnye tekhnologii" [Secure Information Technology. Proc. 10th Int. Sc.-Pract. Conf.]. Moscow, BMSTU Publ., 2019 (in Russ.). EDN: AIIUIQ

[19] Vishnevskiy A.S. [Sound code implementation for sonification of malware behaviors]. Mater. 10-y Mezhdunar. nauch.-prakt. konf. "Voennaya bezopasnost Rossii: Vzglyad v budushchee". T. 1 [Military Security of Russia: A Look into the Future. Proc. 10th Int. Sc.-Pract. Conf. Vol. 1]. Moscow, BMSTU Publ., 2023, pp. 207--213 (in Russ.).EDN: DQIKYB

[20] Vishnevskiy A.S. [Analysis of music semantics by accompanying text for sonification of network anomalies]. Sb. tr. III Vseros. nauch. shkoly-seminara "Sovremennye tendentsii razvitiya metodov i tekhnologiy zashchity informatsii" [Proc. III Russ. Sc. School-Seminar Modern Trends in Development of Methods and Technologies of Information Protection]. Moscow, MTUSI Publ., 2023, p. 332 (in Russ.).