Finite Capabilities of Cybersecurity Technologies

  • Sergei Petrenko


In November 1988, the first computer security response center, CERT (Computer Emergency Response Team), was established at Carnegie Mellon University in Pittsburgh, Pennsylvania, USA. At present, around 300 CERT/CSIRT centers around the world have been established at various commercial, state, and educational organizations. These centers’ relevance owes to the necessity for timely and high-quality delivery of professional services to diverse state and commercial organizations for the prevention, detection, and response to cybersecurity incidents. This chapter will give the evolutionary development of CERTs from local to global solutions, implying the construction of an extensive national network of such centers while simultaneously clarifying the peculiarities of creating a promising “cloud” center for responding to security incidents within the national state program “Information-Oriented Society (2011–2020).”


  1. 1.
    Petrenko, A.S., Petrenko, S.A.: Super-productive monitoring centers for security threats. Part 1. Protect. Inf. Inside. 2(74), 29–36 (2017)Google Scholar
  2. 2.
    Petrenko, A.S., Bugaev, I.A., Petrenko, S.A.: Master data management system SOPKA. Inf. Protect. Inside. 5(71), 37–43 (2016)Google Scholar
  3. 3.
    Petrenko, A.S., Petrenko, S.A.: Large data technologies (BigData) in the field of information security. Inf. Protect. Inside. 4(70), 82–88 (2016)Google Scholar
  4. 4.
    Portnoy, L., et al.: Intrusion detection with unlabeled data using clustering. ACM Workshop on Data Mining Applied to Security (2001)Google Scholar
  5. 5.
    Petrenko, A.S., Petrenko, S.A.: Designing of corporate segment SOPKA. Protect. Inf. Inside. 6(72), 48–50 (2016)Google Scholar
  6. 6.
    Petrenko, S.A., Asadullin, A.Y., Petrenko, A.S.: Evolution of the von Neumann architecture. Protect. Inf. Inside. 2(74), 18–28 (2017)Google Scholar
  7. 7.
    Abramov, S.M.: History of development and implementation of a series of Russian supercomputers with cluster architecture. In: History of Domestic Electronic Computers. 2nd edn, Rev. and additional; color. Ill.: Publishing house “Capital Encyclopedia”, Moscow (2016)Google Scholar
  8. 8.
    Active Engagement, Modern Defence. Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organisation adopted by Heads of State and Government in Lisbon. November 19, 2010 [Electronic resource]. Access mode:
  9. 9.
    Advances in the field of information and telecommunications in the context of international security. Report of the First Committee. Document A/66/407 dated November 10, 2011 [Electronic resource]. Access mode:
  10. 10.
    Agreement between the governments of the member states of the Shanghai Cooperation Organization on cooperation in the field of international information security from June 16, 2009, Yekaterinburg. Appendix 1. [Electronic resource]. Access mode:
  11. 11.
    Almgren, M.: Consolidation and evaluation of IDS taxonomies. In: Proceedings of the Eight Nordic Workshop on Secure IT Systems, NordSec 2003Google Scholar
  12. 12.
    Barabanov, A.V., Markov, A.S., Tsirlov, V.L.: Methodological framework for analysis and synthesis of a set of secure software development controls. J. Theor. Appl. Info. Technol. 88(1), 77–88 (2016)Google Scholar
  13. 13.
    Barabanov, A., Lavrov, A., Markov, A., Polotnyanschikov, I., Tsirlov, V.: The study into cross-site request forgery attacks within the framework of analysis of software vulnerabilities. In: Preliminary proceedings of the 11th Spring/Summer Young Researchers’ Colloquium on Software Engineering (Innopolis, Republic of Tatarstan, Russian Federation, June 5–7, 2017), pp. 105–109. SYRCoSE, ISP RASGoogle Scholar
  14. 14.
    Biryukov, D.N.: Cognitive-functional memory specification for simulation of purposeful behavior of cyber systems. Proc. SPIIRAS. 3(40), 55–76 (2015)CrossRefGoogle Scholar
  15. 15.
    Biryukov, D.N., Lomako, A.G.: Denotational semantics of knowledge contexts in ontological modeling of the subject areas of conflict. Proc. SPIIRAS. 5(42), 155–179 (2015)Google Scholar
  16. 16.
    Biryukov, D.N., Glukhov, A.P., Pilkevich, S.V., Sabirov, T.R.: Approach to the processing of knowledge in the memory of an intellectual system. Natur. Tech. Sci. 11, 455–466 (2015)Google Scholar
  17. 17.
    Biryukov, D.N., Lomako, A.G.: Approach to the construction of information security systems capable of synthesizing scenarios of anticipatory behavior in the information conflict. Protect. Inf. Inside. 6(60), 42–50 (2014)Google Scholar
  18. 18.
    Biryukov, D.N., Lomako, A.G.: The formalization of semantics for representation of knowledge about the behavior of conflicting parties: materials of the 22nd scientific-practical conference “Methods and technical means of information security”, pp. 8–11. Publishing house of Polytechnic University, St. Petersburg (2013)Google Scholar
  19. 19.
    Biryukov, D.N., Lomako, A.G., Petrenko, S.A.: Generating scenarios for preventing cyber-attacks. Protect. Inf. Inside. 4(76) (2017)Google Scholar
  20. 20.
    Biryukov, D.N., Lomako, A.G., Rostovtsev, Y.G.: The appearance of anticipatory systems to prevent the risks of cyber threat realization. Proc. SPIIRAS. 2(39), 5–25 (2015)CrossRefGoogle Scholar
  21. 21.
    Biryukov, D.N., Lomako, A.G., Sabirov, T.R.: Multilevel Modeling of Pre-Emptive Behavior Scenarios. Problems of Information Security. Computer systems, vol. 4, pp. 41–50. Publishing house of Polytechnic University, St. Petersburg (2014)Google Scholar
  22. 22.
    Biryukov, D.N., Rostovtsev, Y.G.: Approach to constructing a consistent theory of synthesis of scenarios of anticipatory behavior in a conflict. Proc. SPIIRAS. 1(38), 94–111 (2015)CrossRefGoogle Scholar
  23. 23.
    Biryukov, D.N., Lomako, A.G.: Approach to Building a Cyber Threat Prevention System. Problems of Information Security. Computer systems, vol. 2, pp. 13–19. Publishing house of Polytechnic University, St. Petersburg (2013)Google Scholar
  24. 24.
    Bocharov, V.A., Markin, V.I.: Fundamentals of Logic. Moscow State University, Moscow (2008)Google Scholar
  25. 25.
    Kotenko, I.V.: Intellectual mechanisms of cybersecurity management. Proceedings of ISA RAS. Risk Manag. Safety, 41, 74–103 (2009)Google Scholar
  26. 26.
    Mamaev, M.A, Petrenko, S.A.: Technologies of Information Protection on the Internet, 848 p. Publishing house “Peter”, St. Petersburg (2002)Google Scholar
  27. 27.
    Markov, A.S., Tsirlov, V.L., Barabanov, A.V.: Methods for Assessing the Discrepancy Between Information Protection Means; [ed. A. S. Markov], 192 p. Radio and communication, Moscow (2012)Google Scholar
  28. 28.
    Markov, A.S.: Chronicles of cyberwar and the greatest redistribution of wealth in history. Quest. Cybersecurity. 1(14), 68–74 (2016)CrossRefGoogle Scholar
  29. 29.
    Petrenko, A.A., Petrenko, S.A.: Cyber units: methodical recommendations of ENISA. Quest. Cybersecurity. 3(11), 2–14 (2015)Google Scholar
  30. 30.
    Petrenko, A.A., Petrenko, S.A.: Intranet Security Audit (Information Technologies for Engineers), 416 p. DMK Press, Moscow (2002)Google Scholar
  31. 31.
    Petrenko, A.A., Petrenko, S.A.: Research and Development Agency DARPA in the field of cybersecurity. Quest. Cybersecurity. 4(12), 2–22 (2015)Google Scholar
  32. 32.
    Petrenko, A.A., Petrenko, S.A.: The way to increase the stability of LTE-network in the conditions of destructive cyber-attacks. Quest. Cybersecurity. 2(10), 36–42 (2015)Google Scholar
  33. 33.
    Petrenko, A.S., Petrenko, S.A.: Super-productive monitoring centers for security threats. Part 2. Protect. Inf. Inside. 3(75), 48–57 (2017)Google Scholar
  34. 34.
    Petrenko, A.S., Petrenko, S.A.: The first interstate cyber-training of the CIS countries: “Cyber-Antiterror2016”. Inf. Protect. Inside. 5(71), 57–63 (2016)Google Scholar
  35. 35.
    Petrenko, S.A.: Methods of ensuring the stability of the functioning of cyber systems under conditions of destructive effects. Proceedings of the ISA RAS. Risk Manag. Security, 52, 106–151 (2010)Google Scholar
  36. 36.
    Petrenko, S.A.: Methods of Information and Technical Impact on Cyber Systems and Possible Countermeasures. Proceedings of ISA RAS. Risk Manag. Security, 41, 104–146 (2009)Google Scholar
  37. 37.
    Petrenko, S.A., Kurbatov, V.A., Bugaev, I.A., Petrenko, A.S.: Cognitive system of early warning about computer attack. Protect. Inf. Inside. 3(69), 74–82 (2016)Google Scholar
  38. 38.
    Petrenko, S.A., Petrenko, A.A.: Ontology of cyber-security of self-healing SmartGrid. Protect. Inf. Inside. 2(68), 12–24 (2016)Google Scholar
  39. 39.
    Petrenko, S.A., Petrenko, A.S.: Creation of a cognitive supercomputer for the computer attacks prevention. Protect Inf. Inside. 3(75), 14–22 (2017)Google Scholar
  40. 40.
    Petrenko, S.A., Petrenko, A.S.: From detection to prevention: trends and prospects of development of situational centers in the Russian Federation. Intellect Technol. 1(12), 68–71 (2017)Google Scholar
  41. 41.
    Petrenko, S.A., Petrenko, A.S.: Lecture 12. Perspective tasks of information security. Intelligent information radiophysical systems. Introductory lectures [A. O. Armyakov and others; ed. S.F. Boev, D.D. Stupin, A.A. Kochkarova], pp. 155–166. MSTU them. N.E. Bauman, Moscow (2016)Google Scholar
  42. 42.
    Petrenko, S.A., Petrenko, A.S.: New doctrine as an impulse for the development of domestic information security technologies. Intellect Technol. 2(13), 70–75 (2017)Google Scholar
  43. 43.
    Petrenko, S.A., Petrenko, A.S.: New doctrine of information security of the Russian Federation. Inf. Protect. Inside. 1(73), 33–39 (2017)Google Scholar
  44. 44.
    Petrenko, S.A., Petrenko, A.S.: Practice of application of GOST R IEC 61508. Inf. Protect. Insider. 2(68), 42–49 (2016)Google Scholar
  45. 45.
    Petrenko, S.A., Shamsutdinov, T.I., Petrenko, A.S.: Scientific and technical problems of development of situational centers in the Russian Federation. Inf. Protect. Inside. 6(72), 37–43 (2016)Google Scholar
  46. 46.
    Petrenko, S.A., Simonov, S.V.: Management of Information Risks. Economically Justified Safety (Information technology for engineers), 384 p. DMK-Press, Moscow (2004)Google Scholar
  47. 47.
    Petrenko, S.A.: The concept of maintaining the efficiency of cyber system in the context of information and technical impacts. Proceedings of the ISA RAS. Risk Manag. Safety. 41, 175–193 (2009)Google Scholar
  48. 48.
    Petrenko, S.A.: The Cyber Threat model on innovation analytics DARPA. Trudy SPII RAN. 39, 26–41 (2015)Google Scholar
  49. 49.
    Petrenko, S.A.: The problem of the stability of the functioning of cyber systems under the conditions of destructive effects. Proceedings of the ISA RAS. Risk Manag. Security. 52, 68–105 (2010)Google Scholar
  50. 50.
    Petrenko, S.A., Kurbatov, V.A.: Information Security Policies (Information Technologies for Engineers), 400 p. DMK Press, Moscow (2005)Google Scholar
  51. 51.
    Petrenko, S.A.: Methods of detecting intrusions and anomalies of the functioning of cyber system, Proceedings of ISA RAS. Risk Manag. Safety. 41, 194–202 (2009)Google Scholar
  52. 52.
    About formal bases of OWL [Electronic resource]. Access mode: Accessed 20 Dec 2014
  53. 53.
    Ashby, U.R.: Principles of Self-Organization, pp. 314–343. Mir, Moscow (1966)Google Scholar
  54. 54.
    Bongard, M.M.: The Problem of Recognition. Fizmatgiz, Moscow (1967)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Sergei Petrenko
    • 1
  1. 1.Innopolis UniversityInnopolisRussia

Personalised recommendations