Preview

Proceedings of Southwest State University. Series: History and Law

Advanced search

The use of Blockchain Technologies to Counter Illegal Influence on the Critical Information Infrastructure of the Russian Federation

Abstract

Relevance. The article examines the issues of countering attacks on the critical information infrastructure of the Russian Federation, which is a desirable target for the intelligence services of foreign states carrying out hostile actions against our country. Given the aggravated geopolitical situation, the likelihood of such threats being realized is now greater than ever. In such conditions, it becomes especially important to search for new ways to counter threats, including those involving blockchain technologies.
The purpose – development of scientifically substantiated proposals for the use of blockchain technologies to protect the critical information infrastructure of the Russian Federation from cyber-attacks.
Objectives. Identify the features of blockchain technologies that determine the possibility of their use in the information security system, based on the study of the world practice of using blockchain technologies in this area, determine the most promising areas of their application and consider the factors limiting the use of blockchain technologies.
Methodology. In the framework of the conducted research, we used logical, formal-legal, systemic-structural methods, case studies.
Results. The study revealed that the use of blockchain technologies can protect against vulnerabilities that were used in Stuxnet-like attacks, and in world practice there are examples of the implementation of blockchain technologies to protect critical information infrastructure.
Conclusion. The most promising use of blockchain is to ensure the security of Internet of Things device systems. This is due to such properties of blockchain systems as decentralized data storage, programmable smart contracts, and authorization. The obstacles to the full-scale implementation of the technology are information redundancy, scalability of performance and the integration of blockchain technologies into the existing infrastructure. Legal regulation of the use of blockchain technologies is required.

About the Author

Alexander A. Grebenkov
Southwest State University
Russian Federation

Candidate of Juridical Sciences, Associate Professor, Associate Professor of the Department of Criminal Law

50 Let Oktyabrya str. 94, Kursk 305040



References

1. Golovin A. Yu. Klassifikaciya i harakteristika lic, sovershayushchih prestupleniya v sfere komp'yuternoj informacii [Classification and characteristics of persons committing crimes in the field of computer information]. Organizovannaya prestupnost', migraciya, politika = Organized crime, migration, politics. Moscow, Ros. kriminolog. assoc. Publ., 2002, pp. 108–111.

2. Polyakov V. V., Popov L. A. Osobennosti lichnosti komp'yuternyh prestupnikov [Features of the personality of computer criminals]. Izvestiya Altayskogo gosudarstvennogo universiteta = News of the Altai State University, 2018, no. 6, pp. 256–259.

3. Aliev N. T., Borbat A. V. Transnacional'naya organizovannaya prestupnaya deyatel'nost' v epohu globalizacii [Transnational organized criminal activity in the era of globalization]. Vserossijskij kriminologicheskij zhurnal = All-Russian Journal of Criminology, 2020, vol. 14, no. 3, pp. 431–440.

4. Kutejnikov D. L., Izhaev O. A., Zenin S. S., Lebedev V. A. Kiberfizicheskie, kiberbiologicheskie i iskusstvennye kognitivnye sistemy: sushchnost' i yuridicheskie svojstva [Cyberphysical, cyberbiological, and artificial cognitive systems: Essence and legal properties]. Rossijskoe pravo: obrazovanie, praktika, nauka = Russian Law: Education, Practice, Science, 2019, no. 3, pp. 75–81.

5. Serdyuk V., Tarvi I. Nekotorye aspekty zashchity ASU TP [Some aspects of automated process control system protection]. Information Security, 2017, no. 6, pp. 12–13.

6. Begishev I. R., Khisamova Z. I., Mazitova G. I. Criminal legal ensuring of security of critical information infrastructure of the Russian Federation. Revista gênero e direito, 2019, vol. 8, no. 6, pp. 283–292.

7. Sánchez H. S., Rotondo D., Escobet T., Puig V. Bibliographical review on cyberattacks from a control-oriented perspective. Annual Reviews in Control, 2019, vol. 48, pp. 103–128.

8. Bencsáth B., Pek G., Buttyan L., Fellgyhaz M. The cousins of stuxnet: duqu, flame, and gauss. Future Internet, 2012, vol. 4, is. 4, pp. 971–1003.

9. Langner R. Stuxnet: dissecting a cyberwarfare weapon. IEEE Security & Privacy, 2011, vol. 9, no. 3, pp. 49–51.

10. Reshetnikov A. Yu., Russkevich E. V. Ob ugolovnoj otvetstvennosti za nepravomer-noe vozdejstvie na kriticheskuyu informacionnuyu infrastrukturu Rossijskoj Federacii (st. 274¹ UK Rossii) [On Criminal Liability for Unlawful Influence on the Critical Information Infrastructure of the Russian Federation (Article 2741 of the Criminal Code of Russia)]. Zakony Rossii: opyt, analiz, praktika = Laws of Russia: experience, analysis, practice, 2018, no. 2, pp. 51–55.

11. Piggin R. Cyber security trends: What should keep CEOs awake at night. International Journal of Critical Infrastructure Protection, 2016, vol. 13, pp. 36–38.

12. Begishev I. Komp'yuternye ataki na KII Rossii: pravovye mery zashchity [Computer attacks on Russian CII: Legal protection measures]. Information Security, 2019, no. 5, pp. 8–10.

13. Meshcheryakov R. V., Iskhakov A. Yu., Evsyutin O. O. Sovremennye metody obespecheniya celostnosti dannyh v protokolah upravleniya kiberfizicheskih sistem [Modern methods of ensuring data integrity in control protocols of cyberphysical systems]. Informatika i avtomatizaciya = Informatics and Automation, 2020, vol. 19, no. 5, pp. 1089–1122.

14. Chen T. M., Abu-Nimeh S. Lessons from Stuxnet. Computer, 2011, vol. 44, is. 4, pp. 91–93.

15. Kendzierskyj S., Jahankhani H. The role of Blockchain in supporting critical national. 2019 IEEE 12th International conference on global security, safety and sus-tainability (ICGS3). IEEE, 2019, pp. 208–212. https://doi.org/10.1109/icgs3.2019.8688026.

16. Aryukov A., Begishev I., Mal'cev N. Nekotorye aspekty informacionnoj bezopasnosti tekhnologii blokchejn [Some aspects of information security of blockchain technology]. Information Security, 2018, no. 6, pp. 18–19.

17. Georgescu A., Cîrnu C. E. Blockchain and critical infrastructures-challenges and opportunities. Romanian Cyber Security Journal, 2019, vol. 1, no. 1, pp. 93–100.

18. Gorodnichev M. G., Mahrov S. S., Denisova E. N., Buldin I. D. Zashchita dannyh v ustrojstvah interneta veshchej posredstvom primeneniya tekhnologii blokchejna [Data protection in Internet of Things devices through the use of blockchain technology]. Fundamental'nye problemy radioelektronnogo priborostroeniya = Fundamental problems of radio-electronic instrumentation, 2018, vol. 18, no. 4, pp. 879–883.

19. Shackelford S. J., Myers S. Block-by-block: leveraging the power of blockchain technology to build trust and promote cyber peace. Yale Journal of Law & Technology, 2017, vol. 19, pp. 334–388.

20. Zavorina L. D., Erohina A. A., Makarova D. G. Postroenie yuridicheski znachimogo zashchishchennogo dokumentooborota na osnove blokchejn v informacionnyh sistemah [Building a legally significant secure document flow based on blockchain in information systems]. Interekspo GEO-Sibir' = Interexpo GEO-Siberia, 2019, vol. 9, pp. 42–46.

21. Dong Z., Luo F., Liang G. Blockchain: a secure, decentralized, trusted cyber infrastructure solution for future energy systems. Journal of Modern Power Systems and Clean Energy, 2018, vol. 6, no. 5, pp. 958–967. https://doi.org/10.1007/s40565-018-0418-0.


Review

For citations:


Grebenkov A.A. The use of Blockchain Technologies to Counter Illegal Influence on the Critical Information Infrastructure of the Russian Federation. Proceedings of Southwest State University. Series: History and Law. 2021;11(3):109-119. (In Russ.)

Views: 245


Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 License.


ISSN 2223-1501 (Print)