Vestnik of Samara State Technical University. Technical Sciences SeriesVestnik of Samara State Technical University. Technical Sciences Series1991-85422712-8938Samara State Technical University3484710.14498/tech.2020.3.2Research ArticleMethodology for distributing information protection tasks between computer devices of automated systems based on the branch and border methodGnutovMaxim S.<p>adjunct</p>monk666@bk.ruSizonenkoAlexander B.<p>Dr. Sci. Techn., Associate Professor</p>siz_al@mail.ruKrasnodar higher military school11122020283243425062020Copyright © 2020, Samara State Technical University2020<p class="a"><span lang="EN-US" style="font-style: normal;">The influence of software protection on various information systems is analyzed. Using set theory, the use of computational resources for the joint solution of direct tasks and information protection tasks in an automated system is described. A hybrid implementation of computing in a CPU + GPU system is proposed. The relevance of using the branch and bound method to compile a minimum schedule of information security tasks in a hybrid multiprocessor system is considered. The features of processing data structures by various types of calculators are indicated. The computational strategies of the branch and bound method with the greatest possibility of acceleration with limited resources are analyzed. The efficiency criterion is selected, the performance indicators are considered when applying the frontal and one-sided branching strategies depending on the complexity of the calculations and the amount of occupied memory. The generalized indicator of efficiency is defined. The prospects of applying the considered method in distributed systems through distributed programming are emphasized.</span></p>branch and bound methodGPUCPUschedule for a multiprocessor systemgreedydistributed programmingметод ветвей и границграфический процессорцентральный процессоррасписание для многопроцессорной системыжадный алгоритмраспределенное программирование[Resheniye zadachi kommivoyazhera algoritmom Littla s vizualizatsiyey na ploskosti [Solving the traveling salesman problem using the Little algorithm with visualization on the plane]. https://habr.com/en/post/332208 (accessed May 28, 2020).][Videokarta MSI GeForce RTX 2080 Ti Gaming Z Trio poluchila boleye bystruyu pamyat' GDDR6 [The MSI GeForce RTX 2080 Ti Gaming Z Trio graphics card received faster GDDR6 memory]. https://www.hardwareluxx.ru/index.php/news/hardware/grafikkarten/49422 - videokarta - msi - geforce - rtx - 2080 - ti - gaming - z - trio - poluchila - bolee-bystruyu - pamyat - gddr6.html (accessed June 03, 2020).][Antivirus & Securuty software Test. http://spkurdyumov.ru/economy/informacionnye-texnologii-sostoyanie-i-perspektivy (accessed October 02, 2020).][Sravneniye sertifitsirovannykh sredstv zashchity informatsii ot nesanktsionirovannogo dostupa dlya serv-erov i rabochikh stantsiy (SZI ot NSD) [Comparison of certified means of protecting information from unau-thorized access for servers and workstations (SZI from NSD)]. https://www.anti-malware.ru/compare/information-protection-unauthorized-access-fstek-certified#part1 (accessed February 05, 2020)][Sizonenko A.B. Logiko-matematicheskoye modelirovaniye i sintez algoritmov funktsionirovaniya sredstv i sistem zashchity informatsii: [Logical-mathematical modeling and synthesis of algorithms for the functioning of means and systems of information protection]. Krasnodar, Institute of the Ministry of the Interior of Rus-sia, 2013.146 p. (In Russian).][Cameron H., Tracy H. Parallel'noye i raspredelennoye programmirovaniye na C++ [Parallel and distributed programming in C ++]. Williams, 2004. 672 p.][Dostoinstva i nedostatki parallel'nogo programmirovaniya [Advantages and disadvantages of parallel pro-gramming]. http://web.snauka.ru/issues/2016/06/69538 (accessed June 06, 2020).][Informatsionnaya tekhnologiya. Metody i sredstva obespecheniya bezopasnosti. Menedzhment riska infor-matsionnoy bezopasnosti GOST R ISO/MEK 27005-2010 [Information technology. Security methods and tools. Information Security Risk Management GOST R ISO / IEC 27005-2010]. Standartinform, 2011. 47 p. (In Russian).][Kumar Jain A., Singh Y., Updhyay S. Information systems security: A review. Ind Jour Math & Comp Sc. Jhs., 2013, no. 2. Pp. 26-30.][Boreskov A.V., Sadovnichiy V.A. Parallel'nyye vychisleniya na GPU. Arkhitektura i programmnaya model' CUDA : ucheb. Posobiye [GPU parallel computing. Architecture and software model CUDA] Publishing house of Moscow University, 2012. 336 p. (In Russian).][Nvidia’s Next Generation CUDA Compute Architecture: KeplerTM GK110. http://www.nvidia.ru/content/PDF/kepler/NVIDIA-Kepler-GK110-Architecture-Whitepaper.pdf (accessed June 06, 2020).][Doktrina informatsionnoy bezopasnosti Rossiyskoy Federatsii, utv. Ukazom Prezidenta Rossiyskoy Feder-atsii [The doctrine of information security of the Russian Federation, approved. Decree of the President of the Russian Federation No. 646 dated 12.05.2016] http://www.consultant.ru (accessed June 10, 2020).][Sizonenko A.B. Modeli i algoritmy sinteza logikovychislitel'nykh podsistem zashchity informatsii sistem kriticheskogo primeneniya [Models and algorithms for the synthesis of logic-computing subsystems of in-formation protection of critical application systems]. Voronezh, 2016. 32 p. (In Russian).][Informatsionnaya tekhnologiya. Metody i sredstva obespecheniya bezopasnosti. Menedzhment riska infor-matsionnoy bezopasnosti. Kriterii otsenki bezopasnosti informatsionnykh tekhnologiy. Chast' 1 - Vvedeniye i obshchaya model' [Information technology. Security methods and tools. Information Security Risk Man-agement. Criteria for assessing the security of information technology. Part 1 - Introduction and general model. GOST R ISO / IEC 15408-1-2012] Standartinform, 2013. 75 p. (In Russian).][Informatsionnaya tekhnologiya. Metody i sredstva obespecheniya bezopasnosti. Kriterii otsenki bezopasnosti informatsionnykh tekhnologiy. Chast' 2 – Funktsional'nyye komponenty bezopasnosti [Information technol-ogy. Security methods and tools. Criteria for assessing the security of information technology. Part 2 – Functional safety components. GOST R ISO / IEC 15408-2-2013] Standartinform, 2014. 224 p. (In Rus-sian).][Informatsionnaya tekhnologiya. Metody i sredstva obespecheniya bezopasnosti. Kriterii otsenki bezopasnosti informatsionnykh tekhnologiy. Chast' 3 – Komponenty doveriya k bezopasnosti [Information technology. Security methods and tools. Criteria for assessing the security of information technology. Part 3 – Security Trust Components. GOST R ISO / IEC 15408-3-2013] Standartinform, 2014. 214 p. (In Russian).]