Igor Kotenko

Igor Kotenko
Verified
Igor verified their affiliation via an institutional email.
Verified
Igor verified their affiliation via an institutional email.
  • PhD, D.of S.
  • Chief Scientist at St. Petersburg Research Center of the Russian Academy of Sciences

About

556
Publications
70,137
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
4,710
Citations
Introduction
information security, including security policy management, access control, authentication, network security analysis, intrusion detection, firewalls, deception systems, malware protection, analysis of security protocols and systems, software protection against hacking and digital right management, modeling, simulation and visualization technologies for counteraction to cyber terrorism; artificial intelligence, including multi-agent frameworks and systems, agent-based modeling and simulation, soft and evolutionary computing, machine learning, data mining, data and information fusion; computer-based systems фтв telecommunications, including decision making and planning for telecommunication systems; big data; cyber-physical systems.
Current institution
Additional affiliations
March 2010 - present
St. Petersburg Institute for Informatics and Automation
Position
  • Head of Department
December 2001 - present
Russian Academy of Sciences
Position
  • Head of Department
April 2017 - present
ITMO University
Position
  • Head of Department

Publications

Publications (556)
Article
Full-text available
The Internet of Things (IoT) has revolutionised technology within intelligent urban environments; however, this has concurrently given rise to security and privacy risks, including the proliferation of various types of malware, which can lead to detrimental consequences. This paper presents a GAN-inspired approach for the classification of malware...
Article
Anomalies in the work of data center users can be caused by both Structured Query Language (SQL) injection attacks and user attempts to make unauthorized access to data. The paper explores various machine learning models to detect such anomalies. The peculiarity of the problem being solved is its focus on the university data centers, whose database...
Article
Full-text available
An approach to verification of functional and structural specifications implemented in custom integrated circuits based on invasive research methods is presented. The relevance of this research is determined by the necessity of verification of functional-structural specifications supplied by third-party implementers of hardware implementations of i...
Article
Anomalies in the work of data center users can be caused by both Structured Query Language (SQL) injection attacks and user attempts to make unauthorized access to data. The paper explores various machine learning models to detect such anomalies. The peculiarity of the problem being solved is its focus on the university data centers, whose database...
Article
Full-text available
Vision Transformers (ViTs) have garnered significant interest for analysing medical images in Internet of Medical Things (IoMT) systems due to their ability to capture global context. However, deploying ViTs in resource-constrained IoMT environments requires addressing the challenge of adapting these computationally intensive models to meet device...
Article
Full-text available
The growing complexity of cyber threats requires innovative machine learning techniques, and image-based malware classification opens up new possibilities. Meanwhile, existing research has largely overlooked the impact of noise and obfuscation techniques commonly employed by malware authors to evade detection, and there is a critical gap in using n...
Article
Full-text available
The utilization of machine learning (ML) techniques for intrusion detection systems (IDS) in cybersecurity has become increasingly prevalent, demonstrating substantial advancements and effectiveness. This survey systematically reviews the use of ML techniques in IDS for cybersecurity, highlighting both advancements and associated challenges. By exa...
Article
In industrial Internet of Things (IoT) systems, explaining anomalies plays a crucial role in identifying bottlenecks and optimizing processes. This paper proposes an approach to anomaly detection using an autoencoder and its explana-tion based on the SHAP method. The purpose of the anomaly explanation is to provide a set of data features in indus-t...
Conference Paper
The rapid proliferation of electric vehicles (EVs) necessitates advanced charging infrastructure, which is increasingly reliant on cloud-based technologies and the Internet of Things (IoT). However, these systems are vulnerable to cyber attacks that could have severe repercussions, including power grid failures. This paper addresses the security vu...
Chapter
The object of the study is a new methodological and practical approach to solving the problem of adaptive neural network filtering. A hybrid adaptive approach to the operational assessment of the security of critical resources is described, which combines traditional Kalman filtering methods with the capabilities of artificial neural networks with...
Article
Популярность контейнерных систем привлекает внимание многих исследователей в областиинформационных технологий. Технология контейнеризации позволяет сократить расходы вычис-лительных ресурсов при разворачивании и поддержке сложных инфраструктурных решений.Обеспечение безопасности контейнерных систем и контейнеризации в целом, а также примене-ние зло...
Article
The Internet of Things is a pivotal constituent of the contemporary technological revolution and has experienced expeditious expansion in recent times. The proliferation of Internet of Things devices has led to enhanced convenience and automation. However, the extensive deployment of Internet of Things devices has also engendered concerns regarding...
Preprint
Full-text available
Accurate real-time prediction of formation pressure and kick detection is crucial for drilling operations, as it can significantly improve decision-making and the cost-effectiveness of the process. Data-driven models have gained popularity for automating drilling operations by predicting formation pressure and detecting kicks. However, the current...
Article
Nowadays, people spend a lot of time in the information space, communicating within various social platforms. Content of those platforms can influence people’s feelings and personalities, which is especially relevant for young people. In this research, we made an attempt to prove this hypothesis. For the experiment, we selected the VKontakte social...
Article
Assessing and prioritizing programs that exploit software vulnerabilities and are used to carry out cyberattacks on a computer system (exploits) is crucial for effectively responding to cyberattacks. This paper presents a method for au-tomatically assessing exploits, where a model is trained to classify exploits using deep learning methods during t...
Article
The object of the research is a new methodological approach to information granulation and fuzzy granular calculations, as a mathematical and methodological tool for improving the reliability of assessing the level of information security of the Smart City infrastructure. The proposed approach is one of the options for the practical application of...
Conference Paper
The Internet of Things (IoT) has revolutionised technology in intelligent urban environments. Meanwhile, security and privacy risks have emerged, including the presence of various malware, resulting in detrimental consequences. Generative attack networks (GAN) can not only build superior representations for complex and multi-dimensional data but al...
Article
To develop safer smart city solutions, it is crucial to investigate new technologies for malware analysis and detection to enhance existing malware prevention systems. Deep learning (DL) techniques have surpassed conventional machine learning as the dominant method for network security; therefore, it is crucial for researchers to utilise DL techniq...
Conference Paper
Full-text available
This article discusses the problem of ensuring security in container systems, which is due to the rapid growth in the use of containerization technologies and microservice architectures in modern high-load computing systems. The increasing number of threats and vulnerabilities to microservice systems undermines the credibility of such systems and c...
Article
As a system allowing intra-network devices to automatically communicate over the Internet, the Internet of Things (IoT) faces increasing popularity in modern applications and security threats – particularly network intrusions that target both networks and devices. A major threat is network attacks that attempt to obtain unauthorised access and dama...
Conference Paper
Smart Cities, the modern digital urban landscapes, are primarily facilitated by the Internet of Things (IoT) infrastructures for information communication. Despite Smart Cities' benefits, risks revolving around data privacy and security within the IoT sphere raise concern. Particularly, malware attacks significantly threaten IoT systems, demanding...
Conference Paper
The number of cyber-attacks is growing every year, and the attacks themselves are becoming more complex. Multi-step attacks are a separate category. Their peculiarity is that they are performed in several stages, are often aimed at many nodes and affect many devices. Thanks to deep learning models, it became possible to automatically deliver the co...
Presentation
Full-text available
This paper proposes a Multi-Task Learning (MTL) classifier-based Intrusion Detection System (IDS) for IoT network environments. It compares the effectiveness and generalizability of both hard and soft parameter sharing MTL models against a single task learning model. A hybrid resampling method is introduced, combining a random undersampler with an...
Chapter
There exists a global challenge related to the boosting number of elderly suffering from chronic diseases like Dementia (EWD). Hence, there is a drastic need for cost-effective disruptive technologies that enable and guarantee the quality of life for EWD via implementing telehealth. The purpose of this paper is to propose a telehealth system based...
Conference Paper
The rapid expansion of the Internet of Things (IoT) has led to the need for robust security mechanisms to protect IoT networks and devices against various attacks. In this paper, we propose a novel hybrid intrusion detection solution that harnesses the power of multi-task learning (MTL) to enhance intrusion detection performance. We introduce a MTL...
Conference Paper
Among all cybersecurity techniques, intrusion detection systems are the first and effective defense line for network and system. However, to develop an accurate, robust intrusion detection system with decent generalizability, challenges like limited labeled data, balancing between detection rates and false alarms need to be overcome. We propose an...
Chapter
The intrusion detection techniques remain essential for network security, especially for the Internet of Things (IoT) environment, where there are crucial network systems and voluminous intra-network devices with vulnerabilities and the need for protection. Despite the existence of many deep learning-based approaches for effective and efficient int...
Chapter
Security monitoring of cyber-physical systems, in particular in important areas such as industry, energy, medicine and others, should be continuous. Information about the security state of the system is typically logged as security events. Due to the increasing complexity and variability of attacks, security analysts spend a lot of time and effort...
Chapter
The object of the study is a new methodological approach to solving the problem of interval analysis of the security for information and telecommunication resources of critically important infrastructures. This approach is one of the options for the practical application of the theory of interval averages (interval calculations). The analysis of th...
Article
The object of research is a new methodological approach to adaptive neural network filtering as a mathematical tool for improving the accuracy and efficiency of evaluating some properties of complex technical systems. This approach is one of the options for the practical application of adaptive (hybrid) filtering methods. The analysis of the featur...
Article
Full-text available
This paper solves the problem of modeling the scheme for developing software systems, which can be used in building solutions for secure energy networks. A development scheme is proposed in a set of representations through which each program of the software complex passes, namely the following representations: idea, conceptual model, architecture,...
Conference Paper
The size of Internet of Things (IoT) networks, the physical devices connected to them, and the volume of data processed have grown exponentially over the past decade. Meanwhile, the confidentiality of data processed by IoT and vulnerabilities of intra-network devices also make security the most crucial issue. While many deep learning-based intrusio...
Article
Full-text available
Currently, the methods and means of human–machine interaction and visualization as its integral part are being increasingly developed. In various fields of scientific knowledge and technology, there is a need to find and select the most effective visualization models for various types of data, as well as to develop automation tools for the process...
Article
Full-text available
The article proposes an approach to ensuring the functioning of Software-Defined Networks (SDN) in cyber attack conditions based on the analytical modeling of cyber attacks using the method of topological transformation of stochastic networks. Unlike other well-known approaches, the proposed approach combines the SDN resilience assessment based on...
Article
Full-text available
The notion of the attacker profile is often used in risk analysis tasks such as cyber attack forecasting, security incident investigations and security decision support. The attacker profile is a set of attributes characterising an attacker and their behaviour. This paper analyzes the research in the area of attacker modelling and presents the anal...
Article
Full-text available
Cyberattacks on cyber-physical systems (CPS) can lead to severe consequences, and therefore it is extremely important to detect them at early stages. However, there are several challenges to be solved in this area; they include an ability of the security system to detect previously unknown attacks. This problem could be solved with the system behav...
Article
Full-text available
This work solves the problem of identification of the machine code architecture in cyberphysical devices. A basic systematization of the Executable and Linkable Format and Portable Executable formats of programs, as well as the analysis mechanisms used and the goals achieved, is made. An ontological model of the subject area is constructed, introdu...
Article
Full-text available
Information systems need to process a large amount of event monitoring data. The process of finding the relationships between events is called correlation, which creates a context between independent events and previously collected information in real time and normalizes it for subsequent processing. In cybersecurity, events can determine the steps...
Article
The purpose of the article: conducting a system analysis of the requirements for the subsystem for preventing computer attacks on critical information infrastructure in order to substantiate the directions for further improved scientific and methodological apparatus for the full functioning of the subsystem for preventing computer attacks. Research...
Article
The purpose of the article: analysis of the problem of ensuring timely authorized access to the resources of the electronic information and educational environment of universities of federal executive authorities and identification of possible directions for its solution. Research methods: system analysis of the problem of ensuring access of offici...
Article
SDN technology in the near future will allow to introduce aspects of the openness of the code of the network component of the cloud infrastructure, which is considered the most favorable basis for the development and implementation of a wide range of applications. It is based on the implementation of network devices and their functions not in separ...
Preprint
As a system allowing intra-network devices to automatically communicate with each other through the internet, the Internet of Things (IoT) faces both increasing popularity in modern applications and security threats, especially network intrusions to networks and devices within. One major threat is network attacks that attempt to obtain unauthorized...
Chapter
Modern information systems generate a lot of events. Analysis of the events allows detecting malicious activity within the system. There are a lot of event correlation techniques intended for the detection of cyber security incidents and different types of cyber attacks, as well as there are a lot of techniques for multi-step attack modeling. At th...
Article
Full-text available
Журнал "Вопросы кибербезопасности" / Cybersecurity issues journal / RU: / Цель статьи: устранение противоречия, состоящего в существующей потребности в наборе простых и понятных показателей защищенности информации и персональных данных для пользователей устройств интернета вещей и их производителей, и отсутствием такого набора, объединяющего взаимо...
Article
Full-text available
In modern data transmission networks, in order to constantly monitor network traffic and detect abnormal activity in it, as well as identify and classify cyber attacks, it is necessary to take into account a large number of factors and parameters, including possible network routes, data delay times, packet losses and new traffic properties that dif...
Chapter
At present, IoT networks have penetrated almost all spheres of life in modern society. They have a fairly wide arsenal of various network devices and also have a fairly developed and branched structure. However, the high dynamics of the behavior of IoT networks, coupled with the large volumes of information processed in them and the transmitted tra...
Chapter
The rapid growth of tasks solved with the help of machine learning leads to an increase in the importance of artificial intelligence systems (AISs). These systems are gradually being integrated into the business structure and widely used in various applications. The data sets and trained models used in AISs are of great interest to competitors, and...
Chapter
Full-text available
In this paper, we propose an approach for anomaly and attack detection based on the analysis of kernel logs obtained with enhanced Berkley Packet Filter (eBPF). Based on the logs we generate white and blacklists in form of rules for detection, that in comparison with machine learning models can be interpreted and adjected by specialist. In paper we...
Article
Full-text available
The article discusses an approach to the construction and operation of a proactive system for protecting smart power grids against cyberattacks on service data transfer protocols. It is based on a combination of computational intelligence methods: identifying anomalies in network traffic by evaluating its self-similarity, detecting and classifying...
Preprint
Full-text available
Information systems need to process a large amount of event monitoring data. The process of finding the relationships between events is called correlation, which creates a context between independent events and previously collected information in real time and normalizes it for subsequent processing. In cybersecurity, events can determine the steps...
Article
Full-text available
The specificity of the water treatment field, associated with water transmission, distribution and accounting, as well as the need to use automation and intelligent tools for various information solutions and security tools, have resulted in the development of integrated approaches and practical solutions regarding various aspects of the functionin...
Article
Full-text available
Asset inventory is one of the essential steps in cyber security analysis and management. It is required for security risk identification. Current information systems are large-scale, heterogeneous, and dynamic. This complicates manual inventory of the assets as it requires a lot of time and human resources. At the same time, an asset inventory shou...
Article
Full-text available
Nowadays, the whole driver monitoring system can be placed inside the vehicle driver’s smartphone, which introduces new security and privacy risks to the system. Because of the nature of the modern transportation systems, the consequences of the security issues in such systems can be crucial, leading to threat to human life and health. Moreover, de...

Network

Cited By