CURRENT PROBLEMS OF RADIOMONITORING IN THE SYSTEM OF ACTIONS TO ENSURE INFORMATION SECURITY

  • А.V. Dyakov Southern Federal University
  • К.Е. Rumyantsev Southern Federal University
Keywords: Information security, radiocontrol, radiomonitoring, intrusion detection systems, wireless networks, Wi-Fi, WIDS, WIPS

Abstract

Wireless data transmission networks generate threats that cannot be protected against by means
traditional for wired networks, because in this case it is impossible to provide equivalent security of wired
networks due to the physical properties of the communication channel. The purpose of the article is to
determine the actual problems that exist in ensuring information security (IS) in wireless segments of data
networks. To achieve this goal, a selection of threats potentially realizable in wireless networks has been
made from the information security threat bank of FSTEC of Russia. It is established that the realization of
such threats can lead to a full set of violations of the state of IS, namely: violation of confidentiality, integrity
and availability of information. The existing practical ways of providing IS in wireless segments of
networks are considered. The analysis of these methods pointed out the technical possibility of creating an
additional boundary in the system of echeloned information protection. In turn, this provides the potential
to detect vulnerabilities and intrusions at the link layer of network communication both in local networks
of enterprises and in large-scale public networks. In accordance with the goal, aspects of building such a
defense frontier are grouped, related to control of the link layer of network interaction of wireless devices,
reduction of frequency-territorial clusters and legal support. The review of publications reveals a gap
between the existing approaches to radio monitoring and IS provision, and also reveals poor development
of the direction related to research in the field of detection and prevention of wireless intrusions. The obtained
result indicates the need to revise the existing concept of radio monitoring and develop appropriate
organizational and technical measures for its integration into the system of measures to ensure IS, which
should help to solve the problem of timely detection and prevention of intrusions into wireless segments of
data networks, as well as the identification of vulnerable elements of the infrastructure of these networks.

References

1. Merrit M., Pollino D. Bezopasnost' besprovodnykh setey [Security of wireless networks], transl. from
engl. by Semenova A.V. Moscow: Kompaniya AyTi; DMK Press, 2004, 288 p.
2. Bank dannykh ugroz bezopasnosti informatsii [Information security threats data bank], FSTEK Rossii
[FSTEC of Russia]. Available at: https://bdu.fstec.ru/threat (data obrashcheniya: 27 January 2024).
3. Metodicheskiy dokument «Metodika otsenki ugroz bezopasnosti informatsii» (utv. Federal'noy
sluzhboy po tekhnicheskomu i eksportnomu kontrolyu 5 fevralya 2021 g.) [Methodological document
«Methodology for Assessing Information Security Threats» (approved by the Federal Service for
Technical and Export Control on February 5, 2021)].
4. Golembiovskaya O.M., Rytov M.Yu., Shinakov K.E., Gorlov A.P., Gubskov Yu.A., Golembiovskiy
M.M., Kondrashova E.V. Etapy formirovaniya modeli ugroz i modeli narushitelya informatsionnoy
bezopasnosti s uchetom izmeneniy zakonodatel'stva Rossiyskoy Federatsii [Stages of formation of the
threat model and the model of the information security intruder taking into account changes in the legislation
of the Russian Federation]. 2nd ed. Saratov: Vuzovskoe obrazovanie, 2024, 265 p.
5. Golembiovskaya O.M., Rytov M.Yu., Shinakov K.E., Golembiovskiy M.M., Kondrashova E.V.
Formalizatsiya podkhoda k opredeleniyu stepeni ushcherba i potentsiala narushitelya [Formalization
of the approach to determining the degree of damage and potential of the intruder]. 2nd ed. Saratov:
Vuzovskoe obrazovanie, 2024, 75 p.
6. Poltavtseva M.A., Lavrova D.S. Vysokoproizvoditel'nye sistemy obnaruzheniya vtorzheniy: ucheb.
posobie [High-performance intrusion detection systems: a textbook]. 2nd ed. Moscow; Vologda: Infra-
Inzheneriya, 2023, 152 c. ISBN 978-5-9729-1213-1.
7. Shelukhin O.I., Rudnev A.N., Savelov A.V. Sistemy obnaruzheniya vtorzheniy v komp'yuternye seti:
ucheb. posobie [Intrusion detection systems in computer networks: a textbook]. Moscow: Moskovskiy
tekhnicheskiy universitet svyazi i informatiki, 2013, 88 p.
8. Basynya E.A. Setevaya informatsionnaya bezopasnost': uchebnik [Network information security: textbook].
Moscow: Natsional'nyy issledovatel'skiy yadernyy universitet «MIFI», 2023, 224 p. ISBN 978-
5-7262-2949-2.
9. Tanenbaum E., Fimster N., Uezeroll D. Komp'yuternye seti [Computer Networks]. 6th ed. –Saint Petersburg.:
Piter, 2023, 992 p.
10. Rembovskiy A.M., Ashikhmin A.V., Koz'min V.A. Radiomonitoring: zadachi, metody, sredstva [Radio
monitoring: tasks, methods, means]. 3rd ed. Moscow: Goryachaya liniya – Telekom, 2012, 640 p.
11. Slobodyanyuk P.V., Blagodarnyy V.G. Radiomonitoring. Vchera, segodnya, zavtra (Teoriya i praktika
postroeniya sistemy radiomonitoringa) [Radiomonitoring. Yesterday, today, tomorrow (Theory and
practice of building a radio monitoring system)]. Priluki: OOO «Izdatel'stvo «Aip- Poligraf», 2010,
296 p.
12. Zakharov A.V., Krivtsun A.V. Imitatsiya burnoy deyatel'nosti, ili kakim ne dolzhen byt' radiokontrol' v
XXI veke [Imitation of stormy activity, or what should not be radio monitoring in the XXI century],
Informatsionno-metodicheskiy zhurnal «Zashchita informatsii. Insayd» [Information-methodical journal
"Information Protection. Inside"], 2017, No. 1.
13. Manelis V.B., Sladkikh V.A., Koz'min V.A., Bizyukov P.E. Adresnoe pelengovanie bazovykh stantsiy
GSM, UMTS, LTE setey sotovoy svyazi [Address direction finding of GSM, UMTS, LTE base stations
of cellular communication networks], Sistemy upravleniya, svyazi i bezopasnosti [Control,
Communication and Security Systems], 2021, No. 2.
14. Karsh A., Simonov D. Kazhdyy inspektor zhelaet znat'. Prichiny vozniknoveniya radio-pomekh [Every
inspector wants to know. Causes of radio interference], Radiochastotnyy spektr [Radio Frequency
Spectrum], 2013, No. 10, pp. 38-42.
15. Prikaz Roskomnadzora ot 02.02.2010 №78 «Ob utverzhdenii Instruktsii po poisku i obnaruzheniyu
istochnikov radiopomekh» [Order of Roskomnadzor from 02.02.2010 № 78 "On approval of the Instruction
on search and detection of radio interference sources"].
16. Kurkov A., Pulin A. Lovis', RES, bol'shoe i malen'koe. Radiokontrol' setey besprovodnogo dostupa ne
dremlet [Catch, RPS, big and small. Radio control of wireless access networks does not slumber],
Radiochastotnyy spektr [Radio Frequency Spectrum], 2013, No. 12, pp. 34-37.
17. Kodeks Rossiyskoy Federatsii ob administrativnykh pravonarusheniyakh ot 30.12.2001 №195-FZ
(red. ot 25.12.2023) [Code of the Russian Federation on Administrative Offenses of 30.12.2001
№195-FL (ed. of 25.12.2023)].
18. Bikshanov P. Maskirovochnaya SHBD-set'. Kak vladel'tsy nerazreshennykh besprovodnykh RES
skryvayut svoi ustroystva [Masking SHBD network. How owners of unauthorized wireless RPS hide
their devices], Radiochastotnyy spektr [Radio Frequency Spectrum], 2017, No. 8, pp. 44-46.
19. Postanovlenie Pravitel'stva Rossiyskoy Federatsii ot 31.12.2021 № 2607 «Ob utverzhdenii Pravil
okazaniya telematicheskikh uslug svyazi» [Resolution of the Government of the Russian Federation
No. 2607 dated 31.12.2021 "On Approval of the Rules for the Provision of Telematic Communication
Services"].
20. Zharov A.A. Publichnyy Wi-Fi vykhodit iz teni [Public Wi-Fi comes out of the shadows],
Radiochastotnyy spektr [Radio Frequency Spectrum], 2016, No. 10, pp. 15-16.
21. Postanovlenie Pravitel'stva RF ot 14 maya 2014 g. № 434 «O radiochastotnoy sluzhbe» [Resolution of
the Government of the Russian Federation of May 14, 2014, No. 434 "On Radio Frequency Service"].
22. Federal'nyy zakon ot 27.07.2006 № 149-FZ «Ob informatsii, informatsionnykh tekhnologiyakh i o
zashchite informatsii» [Federal Law No. 149-FL dated 27.07.2006 "On Information, Information
Technologies and Information Protection"].
Published
2024-05-28
Section
SECTION I. CONTROL SYSTEMS AND MODELING